Ch8/Networking and Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

_________ refers to the loss of intensity and clarity of the data signal being transmitted

Attenuation

A _________ is a device that connects two LANs or two segments of the same LAN.

Bridge

_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield

Coaxial

Monitors should be cleaned routinely using regular glass cleaners and paper towels.

False

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.

False

Power failures are the primary cause of component failure in computer systems.

False

Social engineering is a form of hacking that has a social or political agenda behind it.

False

A _________ provides multiple ports for connecting nodes.

Hub

The means used to link together parts of a computer network are referred to as network:

Media

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

RAID

_________ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

A _________ is used to prevent attenuation when packets are traveling long distances.

Repeater

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan Horse

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

True

A network allows users to communicate and share information between computers and various devices.

True

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

True

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

True

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

True

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

True

The network that connects the computers in a school's study center or library is considered a LAN.

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

True

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

True

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

WAN

_________ networks use radio signals that travel through the air to transmit data

Wireless

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

access point

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

bandwidth

No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.

cyberterrorism

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

office automation system

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus

Computers which are under the external control of a hacker are known as:

zombies


Ensembles d'études connexes

Virginia Plan vs. New Jersey Plan

View Set

Unit 3: Lesson 2: Igneous Rocks Assessment, p. 74

View Set

Strategic Managemnet Chapter 13

View Set