computer chapter 5 exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

ddos

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

worm

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

ups

A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system

virus

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

switch

A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

Kensigton

The ___ lock can make it difficult for thieves to steal a laptop.

bonets

which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

countermeaure

Any step you take to ward off a threat is called a:

vpn

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

packets

Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

wan

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

ethernet

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

true

The network that connects the computers in a school's study center or library is considered a LAN.

true

True or False: The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

spyware

is a type of malware which is designed to report activity on your computer to another party.


Conjuntos de estudio relacionados

Rel/Phil with some Social Science

View Set

Умножение и деление натуральных чисел 5 класс

View Set

Human Body Tissues - Locations and Functions

View Set

Marketing Chapter 4 Video Domino's Pizza

View Set

VYC1 Accounting Principles Review

View Set

Chapter 42, Loss, Grief, and Dying

View Set