1. Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send. virus worm Trojan horse 2. Noah downloaded a file from the internet. …
1. What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? data loss or manipulation disruption of service identify theft information theft 2. What kind of threat is described when a threat actor makes illegal online purchases using …
1. What is a service that provides an internet data signal on the same network that delivers broadcast television and phone service? Cable internet Cellular data plan Digital Subscriber Line (DSL) Guest access 2. What is a service that provides high bandwidth, always on, connection using existing land-line …
1. What is created when you divide up the available radio frequency spectrum? network SSID channel medium 2. What is the method used to create a reservation on the channel for a specific conversation between devices? CSMA/CA CTS SSID ACK
1. Which organization is responsible for testing wireless LAN devices? IEEE Wi-Fi Alliance IETF TIA/EIA 2. What is used to identify a specific wireless network? the Service Set Identifier (SSID) the network address the IP address of the router the network mode 3. True or False? If you …
1. True or false? Certain areas of the electromagnetic spectrum can be used without a permit. true false 2. True or false? Wi-Fi, Bluetooth, and cordless phones all use the same frequency ranges. true false 3. Which wired network technology has an inner wire surrounded by a tubular …
1. True or False? A home router typically only provides wired access to the network. You have to buy a separate device for wireless access. true false 2. Which of the following is used to connect a wired device to the internal switch of the home router? Ethernet …
1. This protocol is used by a client to send email to a mail server. POP SMTP IMAP HTTP 2. Which is a feature of IMAP? It uploads email messages to a server. It listens passively on port 110 for client requests. It downloads a copy of email …
1. Which application protocol is used to automatically configure IP addressing information? DNS IMAP DHCP FTP 2. Which application protocols are used to by clients to retrieve email messages? (Choose two.) DNS SMTP POP IMAP HTTP FTP 3. Which application protocol is used to resolve web addresses to …
1. A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting? IMAP DHCP FTP HTTPS 2. A client packet is received by a server. The packet has a destination port number of 22. What service …