Computer Concepts Chapter 4
________ force you to practice safe computing and thus prevent a lot of potential problems from affecting the systems. BitLockers Keychains EFSs AUPs
AUPs
A(n) ________ account is used for making changes, installing software, configuring settings, and completing other tasks. guest standard user administrator
Administrator
________ hack into systems for malicious purposes, such as theft or vandalism. Black hat Red hat White hat Gray hat
Black hat
In a network configured with a ________ topology, the nodes are all connected using a single cable. star hybrid bus ring
Bus
Encryption converts unencrypted, plain text into code called ________. ciphertext keychains decrypted WPA2 encryption
Ciphertext
________ occurs when a social network user clicks a link and enables malware to post unwanted links on their page. Malicious script scams Adware Phishing Clickjacking
Clickjacking
A ________ is two or more computers that share resources. network resource computer network peer-to-peer network client
Computer network
______ is the protocol that resolves a domain name such as ebay.com to an IP address. HTTP IP DHCP DNS
DNS
________ is the protocol used to transfer files between computers. FTP SMTP TCP POP
FTP
A guest account is used for everyday computing. True False
False
A wireless LAN has a very limited range of only about 10 to 100 meters, roughly 30 to 300 feet. True False
False
Black-hat hackers are also known as sneakers. True False
False
Cellular networks use encryption to ensure the data is secure as it travels through the public network. True False
False
Devices on a local area network are connected by using nodes. True False
False
Phishing redirects you to a phony website. True False
False
Routers make up the backbone of the Internet. True False
False
Which type of user account should be used for temporary access to a system? Default Administrator Guest Standard
Guest
________ can be categorized as white-hat, gray-hat, or black-hat depending on their motivation. Keyloggers Identity thieves Cyberstalkers Hackers
Hackers
Which of the following is NOT true about securing a network? In a network, the first layer of defense is the hardware at the access point to the network. In a network, the network configuration determines what is shared and who is granted access to it. In a home network, the hardware firewall is established by protocols. A firewall prevents unauthorized access to a network.
In a home network, the hardware firewall is established by protocols.
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information. hackers cyberstalkers identity thieves keyloggers
Keyloggers
A ________ is a network that has all connected devices located in the same physical location. local area network Wireless local area network wide area network personal area network
Local area network
A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ________. wide area network personal area network wireless local area network local area network
Personal Area Network
________ redirects you to a phony website. Cyberbullying Pharming Phishing Spoofing
Pharming
________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network. Spoofing Cyberbullying Pharming Phishing
Phishing
________ define the rules for communication between devices. Routers Network operating systems Protocols Domain controllers
Protocols
A service set identifier is known as a(n) ________. SAN SSID VPN WPA2
SSID
Which type of user account should be used for everyday computing? Standard Administrator Guest Default
Standard
A home LAN uses the same network standards and equipment as those used in larger business networks. True False
True
A switch connects multiple devices on a local area network. True False
True
A wireless access point resembles a switch. True False
True
Biometric scanners measure human characteristics such as fingerprints. True False
True
Computer networks save both time and money and make it easier to work True False
True
Computers running Windows 7 or later can belong to a workgroup. True False
True
Cybercrime is any criminal activity on the Internet True False
True
Devices on a network must have an IP address. True False
True
Each device that connects to a network must have some type of network adapter. True False
True
Identity theft is when someone poses as you, using your name, Social Security number, or other personal information. True False
True
In a client-server network, users log in to the network instead of their local computers and are granted access to resources based on that login. True False
True
On a Windows computer, UAC will notify you before changes are made to your computer. True False
True
Servers range from very small to massive enterprise-level systems that serve hundreds of thousands of clients. True False
True
TCP/IP is the default protocol stack installed on Windows, Mac, and Linux computers. True False
True
The U.S. Cyber Command reported that the Pentagon systems are attacked 250,000 times an hour. True False
True
The physical layout of a LAN is called its topology True False
True
To prevent your network from being seen on other devices, disable the service set identifier. True False
True
Wi-Fi Protected Setup adds security to a wireless network by encrypting transmitted data. True False
True
Server ________ is when multiple versions of server software on the same computer. capabilities virtualization configuration infrastructure
Virtualization
One way to have a high level of security on your network is to use ________ encryption and a difficult passphrase. WEP WPA2 EAP SSID
WPA2
________ hackers are security experts that are paid to hack systems to find security holes for the purpose of preventing future hacking. Black-hat Gray-hat Red-hat White-hat
White-hat
A 3G or 4G cellular adapter built into a smartphone or notebook computer is an example of a(n) ________. network adapter router wireless adapter Ethernet adapter
Wireless adapter
A 3G or 4G cellular adapter built into a smartphone or notebook computer is an example of a(n) ________. network adapter router wireless adapter Ethernet adapter
Wireless adapter
When two wireless devices connect to each other directly, they create a(n) ________. ad hoc network infrastructure wireless network optical network terminal firewall
ad hoc network
Before opening email attachments, have the ________ scan the file to search for known viruses. security suite antivirus software antispyware software SSID
antivirus software
In a ________ network users log in to the network instead of their local computers and are granted access to resources based on that login. server peer-to-peer client-server local area
client server
An unlawful attack against computers or networks that is done to intimidate a government or its people for a political or social agenda is known as ________. cybercrime cyberbullying cyberstalking cyberterrorism
cyberterrorism
A ________ blocks unauthorized access to a network. router wireless access point firewall datapocket
firewall
To share resources with computers running Windows 7 or later, you must use a ________. peer-to-peer network workgroup homegroup computer network
homegroup
The ________ enables multiple client devices to communicate with the server and each other, to share resources, to run applications, and to send messages. protocol router network operating system domain controller
network operating system
Which of the following is NOT true about peer-to-peer networks? Computers in a P2P network belong to a workgroup. A P2P network does not require a network operating system. P2P networks are only found in homes. There is no centralized authority in a P2P network.
p2p networks are only found in homes
A ________ is a multiuser computer system that runs a network operating system and provides services to client systems. peer-to-peer network virtualized network client-server network server
server
In a network configured with a ________ topology, every node on the network is attached to a central device such as a switch or wireless access point. bus star hybrid ring
star
Which of the following is NOT a rule for creating strong passwords? Use at least six characters. Use different passwords for different accounts. Do not use any words that can be found in a dictionary. Change your passwords regularly.
use six characters