CIS 312 FINAL EXAM
CIS 312 Final Exam
1. A ______ is a device
that provides a connection between two LANs, or it can separate them into two
sections.
2. The ______ command is
a network tool used to test TCP/IP and Internet connections for proper
connection.
3. A ______ is a computer
on the network that provides other computers within the network with access to
resources, such as disk drives, folders, printers, modems, scanners, and
Internet access.
4. What cable type is
known for transmitting signal through light rather than electrical signals?
5. What protocol is used
by both web browsers or specialized programs to exchange and manipulate files
over an Internet protocol computer network?
6. Which of the following
Internet access methods represents broadband Internet service?
7. A ______ is a network
node that provides a connection between a LAN and a WAN or the Internet.
8. An IPV4 address
consists of ______ numbers that range from 0 to 255.
9. What network protocol
enables data to be exchanged between two computers over a secure channel?
10. What is the maximum
distance 1000BASET can travel per segment?
11. Windows XP can be
installed on either _____ or ______ file systems.
12. Social engineering is
composed of a variety of methods to manipulate users into performing actions or
providing information. Which of the following are among the many methods used
during social engineering?
13. Login Authentication
involves verifying which of the following? (Choose all that apply.)
14. All the following are
standards for wireless encryption except ________?
15. Two-way firewalls
provide protection against unauthorized ______ and ______ traffic.
16. Which of the following
features can be used as a simple firewall within wireless routers and WAPs?
17. What types of Local
Security Policies can be applied to protect data residing on a system?
18. A software ______ is a
program designed to block unauthorized data packers while permitting authorized
data packets on a network.
19. To prevent an attacker
from detecting your wireless network signals, what should be changed from the
manufacturer defaults?
20. Which of the following
wireless encryption standards uses AES encryption?
No comments:
Post a Comment