The CS201 Exam Module 10: Networking provides a detailed exploration of the principles, technologies, and applications of computer networks. Networking forms the backbone of modern communication and information sharing, connecting devices, systems, and people globally. This module covers key concepts such as network types, protocols, architecture, and the essential components that enable seamless connectivity in today’s interconnected world.
A modem can also function as what other piece of hardware? (536470)
Answer:
C:A router
A network administrator is usually not required on a _____ network. (536049)
Answer:
A:peer-to-peer
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? (536342)
Answer:
D:It contained typos and other grammatical errors.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? (535959)
Answer:
B:Encrypt the data in the report.
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? (536260)
Answer:
B:Extranet
Computers communicating on a network must follow a _____, a common set of rules for exchanging information. (535882)
Answer:
B:protocol
Devices on a _____ area network are connected via Bluetooth. (536297)
Answer:
D:personal
How does a wireless network key work with an encrypted wireless network? (536478)
Answer:
B:The sending and receiving devices must know the wireless network key to communicate.
If you want to share information with individuals who are internal to your organization, which type of network would you want to use? (535708)
Answer:
B:Intranet
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. (535661)
Answer:
C:Star
In a connected network, how are hubs and switches similar to one another? (536433)
Answer:
B:They provide a central point for cables in a network.
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? (535499)
Answer:
A:mobile hotspot
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. (535591)
Answer:
C:standards
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? (536329)
Answer:
B:The network connection is probably not secure.
To access the Internet, a router must be connected to a _____. (536366)
Answer:
D:modem
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. (535523)
Answer:
B:firewall
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? (535967)
Answer:
D:Virtual private network
What does a DSL modem use to send and receive digital data? (535608)
Answer:
A:Copper telephone wiring
What hardware is essential to creating a home Wi-Fi network? (536323)
Answer:
B:Router
What internal device does a computer use to connect to a wired or a wireless network? (536206)
Answer:
D:Network interface card
What is a MAC address? (536030)
Answer:
A:A unique hardware address for your device
What is an ISP? (535901)
Answer:
A:A telecommunications company that sells Internet access.
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? (536292)
Answer:
A:Social engineering
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? (535573)
Answer:
C:They disguise the network as an evil twin.
What is the U.S. Federal Communication Commission’s role in regard to Internet access? (535830)
Answer:
D:To release rules surrounding Internet access
What type of network sends signals through airwaves and usually does not require cables? (535639)
Answer:
C:Wireless network
When describing a client/server network, which of the following would be considered a client? (536447)
Answer:
C:Laptop
When it comes to secure data storage on a network, which of the following statements is true? (536198)
Answer:
C:Roles can be granted to individuals to view files and make changes to files on a network.
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? (535691)
Answer:
C:Bluetooth
Which of the following could indicate a DoS attack on your company server? (536368)
Answer:
C:Customers cannot view the website on their device because the page will not load.
Which of the following describes an evil twin? (535706)
Answer:
B:A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Which of the following is a disadvantage of using cloud computing to share files? (535469)
Answer:
B:The inability to access your files if you lose your Internet connection.
Which of the following is an authentication method to keep your data safe? (535468)
Answer:
A:Fingerprint scanner
Which of the following is an example of a personal area network? (535921)
Answer:
C:smartwatch and phone connected via Bluetooth
Which of the following is true about broadband connections? (535968)
Answer:
B:Broadband connections are “always-on” with devices connected to them.
Which of the following network standards applies to cellular networks? (535960)
Answer:
B:LTE
Which of the following statements do opponents of net neutrality agree with? (535897)
Answer:
D:ISPs should charge more for high-bandwidth connections.
<P ALIGN="LEFT"><FONT>Which of the following statements is NOT true about a local firewall?</FONT></P> (536428)
Answer:
A:It is a physical device that acts as a protective barrier.
Which of the following statements is true about public networks? (536187)
Answer:
A:Many public networks are not secure.
Which of the following would be considered a strong password? (535491)
Answer:
D:Wbcm2!4!820!
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? (536095)
Answer:
A:My Verizon VPN
Why is a cable modem classified as a digital model? (535694)
Answer:
B:It sends and receives digital data over a digital line.
Why would you want to connect your computer to a network? (536485)
Answer:
C:to access shared resources
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? (535594)
Answer:
C:She has a home network with smart home devices.
4G and 5G networks provide slower data transmission speeds than 3G networks. (535565)
Answer:
False
A router is a system of two or more devices linked by wires or cables. (536015)
Answer:
False
Bandwidth is a term that describes the number of devices connected to a network. (536249)
Answer:
False
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. (536445)
Answer:
False
If you upload photos to a NAS device, everyone on the network can access them. (536355)
Answer:
True
RFIDis a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. (535595)
Answer:
False
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots. (536028)
Answer:
True
A foundational aspect of this module is understanding the types of networks and their scope. It introduces learners to Local Area Networks (LANs), which operate within a limited geographical area such as homes or offices, and Wide Area Networks (WANs), which span larger regions and connect multiple LANs. The module also delves into the characteristics and uses of other network types, such as Metropolitan Area Networks (MANs), Personal Area Networks (PANs), and wireless networks, emphasizing their roles in various contexts.
Another critical topic in the module is network architecture and design. Learners are introduced to client-server and peer-to-peer models, highlighting their respective advantages and applications. It also explores network topologies, including star, bus, ring, and mesh layouts, discussing how these configurations impact network performance, scalability, and reliability. Through these concepts, learners gain a deeper appreciation of how networks are structured and managed to meet diverse needs.
Protocols are a cornerstone of networking, and the module provides a comprehensive overview of their importance. It explains how protocols such as TCP/IP, HTTP, FTP, and DNS govern data transmission, ensuring accurate and secure communication between devices. The module also touches on IP addressing, including IPv4 and IPv6, and their role in identifying and routing information across the internet. Security protocols, such as SSL/TLS and VPNs, are highlighted for their role in protecting sensitive data during transmission.
The module further explores the hardware components essential for building and maintaining networks. Learners are introduced to devices like routers, switches, modems, and access points, understanding their functions and how they work together to create reliable connections. Wireless technologies, including Wi-Fi and cellular networks, are also discussed, with a focus on their growing relevance in providing flexible and mobile connectivity.
Networking concepts are brought to life through real-world applications. The module discusses how networks facilitate online communication, cloud computing, e-commerce, and remote work. It highlights the transformative impact of the internet and emerging trends such as the Internet of Things (IoT), where interconnected devices enable smarter and more efficient living.
By the end of this module, learners develop a solid understanding of networking fundamentals, preparing them to navigate and troubleshoot network environments effectively. The knowledge gained is crucial for anyone pursuing a career in information technology, as networking skills are essential for system administrators, network engineers, and cybersecurity professionals. This module inspires learners to explore further advancements in networking and their potential to revolutionize the way the world connects and communicates.
If you have any doubts, Please let me know