ITEC 1001 - quiz 5 - networking, information systems, and security
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
Coaxial
Power failures are the primary cause of component failure in computer systems.
False
Social engineering is a form of hacking that has a social or political agenda behind it.
False
_________ computers are ones that have multiple hardware systems performing the same task at the same time.
Redundant
_________ is a type of malware which is designed to report activity on your computer to another party.
Spyware
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Strong
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Trojan horse
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
True
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
True
An MIS system can provide different types of information or summaries to managers at different levels.
True
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.
access point
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
True
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
True
The network that connects the computers in a school's study center or library is considered a LAN.
True
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
True
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
True
Any step you take to ward off a threat is called a:
countermeasure
A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.
data warehouse
A(n) _________ examines and blocks Internet traffic in order to protect your private network.
firewall
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.
fluctuations
In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.
hacker
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
hacker
A(n) _________ is a connection point in a network.
node
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
virus
A _________ is used to prevent attenuation when packets are traveling long distances.
repeater