CGS HW 5
A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.
Expert
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
False
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
False
Power failures are the primary cause of component failure in computer systems.
False
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
False
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.
RAID
________ computers are ones that have multiple hardware systems performing the same task at the same time.
Redundant
Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.
Rogue Hotspots
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.
Scalability
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
True
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
True
The means used to link together parts of a computer network are referred to as network:
Media
A(n) _________ is a connection point in a network.
Node
In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.
Office Automation System
_________ is gaining someone's trust by pretending you are someone else.
Pretexting
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
Protocols
_________ software helps protect your computer from various types of malware.
Anti-Malware
_________ refers to the loss of intensity and clarity of the data signal being transmitted.
Attenuation
The security principle known as _________ gives individuals a certain level of access based on who they are.
Authorization
_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
Botnets
A _________ is a device that connects two LANs or two segments of the same LAN.
Bridge
No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.
Cyberterrorism
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.
DSS
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.
Data Validation
Many types of software and devices use _________ to scramble your data or communication.
Encryption
A(n) _________ examines and blocks Internet traffic in order to protect your private network.
Firewall
A _________ is a node on a network that serves as an entrance to another network.
Gateway
In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.
Hacker
A _________ provides multiple ports for connecting nodes.
Hub
A type of spyware known as _________ can record the individual keystrokes of a user.
Keyloggers
The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users.
Malware
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.
Router
_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Social Engineering
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Strong
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?
The likelihood of user compliance
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.
Topology
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
True
An MIS system can provide different types of information or summaries to managers at different levels.
True
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
True
The network that connects the computers in a school's study center or library is considered a LAN.
True
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
True
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
True
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
True
_________ cable normally consists of four pairs of wires that are twisted around each other.
Twisted-Pair
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.
VPN
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
Virus
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
Who you know
_________ networks use radio signals that travel through the air to transmit data.
Wireless
Computers which are under the external control of a hacker are known as:
Zombies