CGS chapter 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

If a company has its corporate headquarters in one city but its manufacturing plant in another, it would likely be set up in __ to connect

WAN

we use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions

big data

_____ which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, conduct orchestrated network attacks

bontnet

Data moves through networks in structures known as _______, which are pieces of a message broken down into small units by the sending device and reassembled.

packets

_________ is a type of malware designed to report activity on your computer to another.

spyware

_____ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol.

strong

A _____ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

surge protector

A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of nodes.

switch

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

true

which of the following is not one of the specifications of Wi-Fi technology?

802.11x

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

Bandwidth

A _____ attack allows hackers to shut down or block access to websites and other networks by overwhelming requests

DDOS

Most network installations use an ________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethernet

Each device with a NIC contains contains a unique identifier, known as a ______ address, which distinguishes it from any other network-connected device in the world.

MAC

wireless __ networks, where nodes connect with each other, used in large homes/ businesses to easily cover entire area

Mesh

A ______________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan horse

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

VPN

A ______ is a fully-contained program that self-replicates and spreads through computers and networks.

Worm

A wireless _____ device with all nodes connect to in order communicate wirelessly

access point

very few countermeasures are effective as _____ which are to help recover data lost to any threat

backups

Any step you take to ward off a threat is called a:

countermeasure

In the field known as ________, experts use modeling software and statistics to extract knowledge from large volumes of data.

data analytics

Social engineering is a form of hacking that has a social or political agenda behind it.

false

when is comes to the best security for wireless routers, WEP encryption ensures transmissions are unreadable by hackers

false

A ____ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current

fiber-optic

Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

Which is not three general strategies to authenticate individuals

who you know

_____ involves luring individuals into entering personal information into websites by hackers

phishing

the scam known as ____ typically comes in form of an alert message claiming to be FBI or security software

scareware

the wireless access point used in homes contain integrated routers, as do ISP internet connect.

true

__________________, is a feature that requires two forms of identification, such as passwords and possession of your phone to login.

two-factor authentication

a ____ is a type of malware that is attached to a file and has the ability to copy or replicate itself

virus

When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.

UPS


Conjuntos de estudio relacionados

genetics 3, bio exam 4, genetics 2, genetics test 1

View Set

Ati and book questions adv pharm 3

View Set

CH 13 - Fluid and Electrolyte Imbalance

View Set

Percy Jackson: True or False Quiz

View Set

Chemistry Exam #2 (Practice Exams)

View Set

techniques of Therapeutic communication

View Set