CH 5 - Networking and security

¡Supera tus tareas y exámenes ahora con Quizwiz!

The large volumes of data that are constantly being generated by our devices and digital transactions

- Big Data

Refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks

- Botnets

A_____ is any step you take to ward off a threat

- Countermeasure

Today, the term ____ generally refers to an individual who uses a computer and/or network to commit a variety of crimes

- Hacker

A ____ is a set of softtware tools that enables managers to gather, organize, and evaluate information

- MIS

A ____ Uniquely identifies every network connected device in the world

- Mac address

Data____ is the discovery of new patterns or relationships between data.

- Mining

Allows users to communicate and share information between computers and various devices

- Networks

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system

- Trojan horse

A____ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails

- UPS

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a

- VPN

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself

- Virus

A ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area

- WAN ( wide area network )

What type of malware consists of a fully contained program that self-replicates and spreads through computers and networks

- Worm

All nodes connect to a wireless ____ in order to communicate wirelessley

- access point

Networks use media to carry data from one ___, or connection point to another

- node

_____ Are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

- packets

machines that communicate over a network must follow certain fules, or ____ to ensure that the packets are sent, recieved, and interpreted properly

- protocols

_____ is a feature that requires 2 forms of identification, such as a password and possession of your phone, to log into an account

- two-factor authentication

There are 3 general strategies used to authenticate indiviuals

- what you have - who you are - what you know

Name some specification of wi-fi technology

-802.11g -802.11n -802.11ac

A popular type of network attack, known as a ____ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them w/ requests

- DDoS

____ Can clog cooling systems such as fans, which in turn may cause hardware to overheat

- Dust

_____ Is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

- Ethernet

A ____ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base

- Expert

Systems known as ____ are able to continue their operation even when problems are present

- Fault - Tolerant

Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric

- Fiber optic

Many Thieves use the temptation of free (illegal) software on services to lure individuals into downloading malware

- File sharing

involves luring individuals into entering personal information into a website controlled by the hacker.

- Phishing

The wireless access points that are used in homes contain integrated _____, as do the devices that ISPs typically provide for internet connectivity

- Routers

_____ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/ or software when the need arises

- Scalable

The scam referred to as ____ typically comes in form of an alert message that claims to be from the FBI or your security software

- Scareware

____ Is a form of hacking that focuses on deceiving individuals into giving away information that the thief needs

- Social Engineering

Which type of malware is designed to report activity on your computer to another party ?

- Spyware

What device can guard connected equipment against large power spikes or surges that may infrequently occur

- Surge Protector

Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?

- Switch

The _____ of a network is the logical layout of the cables and devices that coonnect the nodes of the network

- Topology

Typically measured in Mbps Or Gbps, ______ is the amount of data that can be transmitted over a given amount of time.

- bandwidth


Conjuntos de estudio relacionados

Machine Learning True False questions

View Set

MGT 2180 Exam 4 Multiple Choice Questions

View Set

Chapter 1: General Concepts and Administrative Issues

View Set

Microeconomics HW Questions Ch. 5-8

View Set

CPR Online Portion Study Guide 2021 January

View Set

The Radicals Take Control Chapter 2 Lesson 2

View Set