Chapter 5 - Networking & Security
Which of the following Wi-Fi standards is the fastest?
AC
_________ is the amount of data that can be transmitted over a given amount of time.
Bandwidth
A(n) _________ is a type of information system that performs analytical tasks traditionally down by a human.
Expert System
A Kenisngton lock is an effective countermeasure against phishing threats.
False
For mission-critical systems, technology companies construct computer hardware and software that can never fail.
False
Scalability is the ability of each organization's informaiton system to work with the other, sharing both data and services.
False
A(n) _________ cable consists of a thin stand of glass that transmits pulsating beams of light rather than electric current.
Fiber-Optic
In its simplest form, a(n) _________ is a node on a network that serves as an entrance to another network.
Gateway
The network standard known as _________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Hub
A(n) _________ is a complex system for acquiring, storing, organizing, using, and sharing data and information.
Information System
Some organizations offer an internal version of the Internt, called a(n):
Intranet
Network media helps carry data from one _________, or connection point, to another.
Node
Data moves through networks in structures know as _________, which are pieces of a message broken down into small units by the sending device reassembled by the receiving device.
Packets
Networks must follow rules, knows as communication _________, to ensure that data is sent, received, and interpreted properly.
Protocol
A(n) _________ is a storage system that links any number of disk drives so that they act as a single disk.
RAID
_________ Computers are one that have multiple hardware systems performing the same task at the same time.
Redundant
Hackers often set up their own wireless access point in popular areas with the hope that users connect to them. These are known as:
Rogue Hotspots
The _________ topology, where nodes connect to a hub, is the most common type used today.
Star
A _________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attaced to it.
Switch
Which type of information system handles the prcessing and tracking of transactions?
TPS
A decision support system can include or access other types of data, such as stock market reports or data about competitiors.
True
Wireless networks use radio signals that travel through the air in order to transmit.
True
A(n) _________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the internet.
Virtual Private Network
A(n) _________ is the device that all nodes connect to in order to communicate wirelessly.
Wireless Access Point
Which type of malware is a fully contained program that self-replicates and spreads through networks?
Worm