.
True
False
True
False
True
False
True
False
True
False
True
False
True
False
True
False
True
False
True
False
4 Hrs
40 Hrs
400 Hrs
0.4 Hrs
A technical paper defining details of a technology
A kind of a router
The standard number for VOIP
An encryption method
Physical security
Logical security
Disaster recovery
Error prevention
Network availability data
Graphs of daily/monthly usage
Comparison of activity between today and a similar previous period
All of the above are correct
Is first generation mobile technology
Uses TDMA
Is digital technology
Is both (b) and (c)
Occurs when a very powerful radio frequency (RF) signal cuts off the signals from access points and clients in a wireless LAN
Can happen unintentionally
Can be found with spectrum analysers
Is all of the above
The hacker acts as a middle man between the wireless AP and the client
The hacker causes the client to disconnect from the legitimate access point and connect to his rogue access point
The hacker installs his own NIC with stolen MAC information
The hacker does none of the above
Parallel processing occurs in CPUs that are shared across a network
All computers need very high specification CPUs
A large mainframe computer provides very high processing capability for other computers
Computers do not have any CPU
Cost of laying coaxial cables
Cost of laying fibre optic cable
Cost of PSTN to the user
Cost of satellite links
WPA
Directional antennas
Changing the default SSID of the access point you purchase
All of the above
True
False
True
False
True
False
True
False
True
False
True
False
True
False
True
False
True
False
True
False
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.