CGS HW 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.

Expert

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

False

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

False

Power failures are the primary cause of component failure in computer systems.

False

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

False

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

RAID

________ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.

Rogue Hotspots

_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Scalability

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

True

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

True

The means used to link together parts of a computer network are referred to as network:

Media

A(n) _________ is a connection point in a network.

Node

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

Office Automation System

_________ is gaining someone's trust by pretending you are someone else.

Pretexting

Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

Protocols

_________ software helps protect your computer from various types of malware.

Anti-Malware

_________ refers to the loss of intensity and clarity of the data signal being transmitted.

Attenuation

The security principle known as _________ gives individuals a certain level of access based on who they are.

Authorization

_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Botnets

A _________ is a device that connects two LANs or two segments of the same LAN.

Bridge

No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.

Cyberterrorism

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.

DSS

_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

Data Validation

Many types of software and devices use _________ to scramble your data or communication.

Encryption

A(n) _________ examines and blocks Internet traffic in order to protect your private network.

Firewall

A _________ is a node on a network that serves as an entrance to another network.

Gateway

In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.

Hacker

A _________ provides multiple ports for connecting nodes.

Hub

A type of spyware known as _________ can record the individual keystrokes of a user.

Keyloggers

The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users.

Malware

A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

Router

_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Social Engineering

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Strong

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

The likelihood of user compliance

The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

Topology

A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.

True

An MIS system can provide different types of information or summaries to managers at different levels.

True

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

True

The network that connects the computers in a school's study center or library is considered a LAN.

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

True

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

True

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

True

_________ cable normally consists of four pairs of wires that are twisted around each other.

Twisted-Pair

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

VPN

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

Virus

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

Who you know

_________ networks use radio signals that travel through the air to transmit data.

Wireless

Computers which are under the external control of a hacker are known as:

Zombies


Ensembles d'études connexes

Energy storage: batteries and capacitors

View Set

Tarsiers, Strepsirrhini Primates, New World Primates - Taxonomy

View Set

Exam 4 (Chapter 50) Assessment and MGMT of Pt's w/Biliary Disorders

View Set