Download presentation
Presentation is loading. Please wait.
Published byVincent Ball Modified over 9 years ago
2
Study Guide – Week #7 – Networks and Security Start the Game
3
Network Components Network Terminology Network Architecture Network Security $100 $200$200$200$200 $300$300$300$300 $400$400 $ 400$400 To End the Game, press the Esc key on your keyboard at any time.
4
RIGHT ANSWER Return to the Game
5
Sorry – Try Again Return to the Game
6
Network Components - 100 The following device is NOT a component of a network a) Personal Computer Personal Computer b) Printer Printer c) Mouse Mouse d) Switch Switch
7
Network Components - 200 The network device responsible for distributing and directing packets over a network is a: a) Switch Switch b) Connector Connector c) RJ-45 RJ-45 d) Ring Ring
8
The address scheme used to direct and distribute packets over a network is a) Machine address Machine address b) IP Address IP Address c) Both a) & b) Both a) & b) d) Neither a) or b) Neither a) or b) Network Components - 300
9
Of the following network devices the ROUTER is considered the workhorse for distribution of packets. HUB ROUTER Network Components - 400 TrueFalse
10
A LAN is generally limited to a small area Network Terminology - 100 TrueFalse
11
The MAN terminology is used to describe a computer network limited to a city or a city and its nearby suburbs Network Terminology - 200 TrueFalse
12
The major difference between a LAN, MAN, and WAN is the size of the area of coverage. Network Terminology - 300 TrueFalse
13
The backbone communications media for a WAN is the PSTN. Network Terminology - 400 TrueFalse
14
Network Topology refers to the speed of bits and bytes passing through the network Network Architecture - 100 TrueFalse
15
The Internet network is based primarily on the _________ Network Architecture a) STAR STAR b) RING RING c) BUS BUS d) All of the above All of the above Network Architecture - 200
16
Computer Networks can connect the devices using a) Wireline cables Wireline cables b) Wireless transmissions Wireless transmissions c) Combination of a) and b) Combination of a) and b) d) All of the above All of the above Network Architecture - 300
17
The following Device(s) can be referred to as the node a) Personal Computer Personal Computer b) Server Server c) Router Router d) All of the above All of the above Network Architecture - 400
18
Firewalls help internet security by imposing restrictions on incoming and outgoing packets. Network Security - 100 TrueFalse
19
Anti Virus programs provide internet security by protecting your computer from malware. Network Security - 200 TrueFalse
20
The following software is not considered one of the primary anti-virus programs a) Norton Norton b) MacAfee MacAfee c) Linux Linux d) Kaspersky Kaspersky Network Security - 300
21
Phishing is an attempt to gain information from a source by a) Pretending to be a legitimate entity Pretending to be a legitimate entity b) Embedding a cookie into your browser Embedding a cookie into your browser c) Embedding a Trojan Horse into your browser Embedding a Trojan Horse into your browser d) All of the above All of the above Network Security - 400
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.