Computing Exam 3
What is the approximate range of a personal area network?
30 feet
wireless network key
A broadband technology that uses infrared light or radio-frequency signals to communicate with devices that are physically connected to a network or the Internet.
social engineering
A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.
Worm
A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
zombie
A device infected with malware that an attacker uses to control the device remotely.
password manager
A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.
biometric security
A way to verify your identity based on physical characteristics.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
address spoofing
An attack that changes the device's address so that data is sent to the attacker's computer.
How can an attacker execute malware through a script?
An attacker can attach a script to a program that you download which then infects your computer.
cyberterrorists
An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.
attackers
An individual who launches attacks against other users and their computers, also known as a threat actor.
hactivists
Attackers who are strongly motivated by principles or beliefs.
Which government agency is responsible for releasing the rules surrounding Internet access?
Federal Communications Commission (FCC)
Which of the following is not a web browser setting for managing cookies?
Have all cookies automatically expire after 45 days.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
wide area network (WAN)
Network that connects devices in a large geographic region, such as a multinational company or national retail chain.
attackers who want to attack computers but lack the knowledge needed to do so.
Script kiddies
data mining
The process of sifting through big data to find the important questions that will yield fruitful results.
Which of the following is not a common network topology? a. star network b. mesh network c. client/server network d. bus network
client/server network
is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."
encryption
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
Which describes a normal-looking, yet fraudulent Wi-Fi network?
evil twin
In which of the following real-life situations would it be useful to use a digital certificate?
if you were signing a rental lease
Which of the following is a private network used by organizations to communicate internally?
intranet
Each of the following is a factor that causes repetitive strain injury (RSI) except uninterrupted intensity b. improper technique c. repetitive activity d. lack of restful sleep
lack of restful sleep
When creating a strong password _____ is the most important element.
length
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.
spike
A DSL modem uses existing standard copper telephone wiring to send and receive digital data.
true
Networks allow computers to share resources, such as hardware, software, data, and information.
true
The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.
true
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.
true
A _______ is a malicious program that uses a computer network to replicate.
worm