CH 5 - Networking and security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The large volumes of data that are constantly being generated by our devices and digital transactions

- Big Data

Refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks

- Botnets

A_____ is any step you take to ward off a threat

- Countermeasure

Today, the term ____ generally refers to an individual who uses a computer and/or network to commit a variety of crimes

- Hacker

A ____ is a set of softtware tools that enables managers to gather, organize, and evaluate information

- MIS

A ____ Uniquely identifies every network connected device in the world

- Mac address

Data____ is the discovery of new patterns or relationships between data.

- Mining

Allows users to communicate and share information between computers and various devices

- Networks

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system

- Trojan horse

A____ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails

- UPS

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a

- VPN

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself

- Virus

A ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area

- WAN ( wide area network )

What type of malware consists of a fully contained program that self-replicates and spreads through computers and networks

- Worm

All nodes connect to a wireless ____ in order to communicate wirelessley

- access point

Networks use media to carry data from one ___, or connection point to another

- node

_____ Are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

- packets

machines that communicate over a network must follow certain fules, or ____ to ensure that the packets are sent, recieved, and interpreted properly

- protocols

_____ is a feature that requires 2 forms of identification, such as a password and possession of your phone, to log into an account

- two-factor authentication

There are 3 general strategies used to authenticate indiviuals

- what you have - who you are - what you know

Name some specification of wi-fi technology

-802.11g -802.11n -802.11ac

A popular type of network attack, known as a ____ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them w/ requests

- DDoS

____ Can clog cooling systems such as fans, which in turn may cause hardware to overheat

- Dust

_____ Is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

- Ethernet

A ____ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base

- Expert

Systems known as ____ are able to continue their operation even when problems are present

- Fault - Tolerant

Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric

- Fiber optic

Many Thieves use the temptation of free (illegal) software on services to lure individuals into downloading malware

- File sharing

involves luring individuals into entering personal information into a website controlled by the hacker.

- Phishing

The wireless access points that are used in homes contain integrated _____, as do the devices that ISPs typically provide for internet connectivity

- Routers

_____ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/ or software when the need arises

- Scalable

The scam referred to as ____ typically comes in form of an alert message that claims to be from the FBI or your security software

- Scareware

____ Is a form of hacking that focuses on deceiving individuals into giving away information that the thief needs

- Social Engineering

Which type of malware is designed to report activity on your computer to another party ?

- Spyware

What device can guard connected equipment against large power spikes or surges that may infrequently occur

- Surge Protector

Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?

- Switch

The _____ of a network is the logical layout of the cables and devices that coonnect the nodes of the network

- Topology

Typically measured in Mbps Or Gbps, ______ is the amount of data that can be transmitted over a given amount of time.

- bandwidth


Kaugnay na mga set ng pag-aaral

Machine Learning True False questions

View Set

MGT 2180 Exam 4 Multiple Choice Questions

View Set

Chapter 1: General Concepts and Administrative Issues

View Set

Microeconomics HW Questions Ch. 5-8

View Set

CPR Online Portion Study Guide 2021 January

View Set

The Radicals Take Control Chapter 2 Lesson 2

View Set