CGS Ch 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is NOT one of the specifications of Wi-Fi technology? 802.11g 802.11n 802.11x 802.11ac

802.11x

We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions. Big data Data validation Data mining Data warehouse

Big data

___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. Hotspots Worms Trojans Botnets

Botnets

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests. DDoS phishing pretexting scareware

DDoS

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices. MIS DSS Ethernet Wi-Fi

Ethernet

Social engineering is a form of hacking that has a social or political agenda behind it. True False

False

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers. True False

False

Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world. MAC VPN gateway Ethernet

MAC

___ involves luring individuals into entering personal information into a website controlled by the hacker. Switching Phishing Pretexting Striping

Phishing

___ is a type of malware which is designed to report activity on your computer to another party. DDoS Ransomware Scareware Spyware

Spyware

___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period. Strong Encrypted Fault-tolerant Cyber

Strong

A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. virus zombie worm Trojan horse

Trojan horse

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat. True False

True

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services. True False

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity. True False

True

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account. User validation Two-factor authentication Authorization VPN

Two-factor authentication

When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time. surge protector NIC UPS office automation system

UPS

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection. VPN WAN gateway bridge

VPN

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations. LAN WAN protocol extranet

WAN

Which of the following is NOT one of the three general strategies that are used to authenticate individuals? What you know What you have Who you know Who you are

Who you know

A wireless ___ is the device that all nodes connect to in order communicate wirelessly. hub access point extranet adapter

access point

Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat. botnets anti-malware encryption backups

backups

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps). authentication topology attenuation bandwidth

bandwidth

Any step you take to ward off a threat is called a: risk countermeasure vulnerability TPS

countermeasure

In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data. data validation data analytics MIS social engineering

data analytics

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. fiber-optic twisted-pair coaxial bluetooth

fiber-optic

Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes. zombie hacker Trojan worm

hacker

Wireless ___ networks, where nodes connect directly to each other, may be used in large homes or businesses to easily cover the entire area. fiber mesh bridge star

mesh

Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device. packets bytes media VPNs

packets

The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software. DDoS RAID pretexting scareware

scareware

A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur. surge protector RAID switch gateway

surge protector

A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it. hub gateway repeater switch

switch

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself. virus zombie worm Trojan horse

virus

A ___ is a fully-contained program that self-replicates and spreads through computers and networks. virus zombie worm Trojan horse

worm


Conjuntos de estudio relacionados

PEDIATRIC SUCCESS HEMATOLOGICAL OR IMMUNOLOGICAL DISORDERS CHAPTER 7

View Set

Chapter 8: Nutritional and Global health

View Set

Psych- learnsmart chapter 8: Thinking, Intelligence, and language

View Set

Strategic Management Chapter 12 (ss16)

View Set

PEDs Chapt 27 Nursing Care of the Child with an Endocrine Disorder

View Set

504 Ch. 2 Quiz - Financial Statements, Taxes, and Cash Flows

View Set

Spellingbee 2013 Semifinals wordList

View Set