Chap 5 & 6 // Powerpoint

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests. A. DDoS B. phishing C. pretexting D. scareware

A. DDoS

The _________ lock can make it difficult for thieves to steal a laptop. A. Kensington B. Ethernet C. DSS D. TPS

A. Kensington

The information system that handles the processing and tracking of transactions is called a(n): A. TPS B. MIS C. office automation system D. DSS

A. TPS

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection. A. VPN B. WAN C. gateway D. bridge

A. VPN

_________ software helps to protect your computer from various types of malware. A. Anti-malware B. Firewall C. Encryption D. Backup

A. anti-malware

_________ refers to the loss of intensity and clarity of the data signal being transmitted. A. Attenuation B. Scalability C. Redundancy D. Validation

A. attenuation

No form of hacking is as dangerous as ________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure. A. cyberterrorism B. data mining C. hacktivism D. social engineering

A. cyberterrorism

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. A. fiber-optic B. twisted-pair C. coaxial D. bluetooth

A. fiber-optic

While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building. A. fluctuations B. failures C. vulnerabilities D. redundancies

A. fluctuations

In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do. A. hacker B. cyberterrorist C. rogue D. hacktivist

A. hacker

A type of spyware known as _________ can record the individual keystrokes of a user. A. keyloggers B. ransomware C. pay-per-click D. Trojans

A. keyloggers

Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure. A. mission-critical B. uninterruptable C. expert systems D. MIS

A. mission-critical

A(n) _________ is a connection point in a network. A. node B. hotspot C. intranet D. TPS

A. node

Data moves though networks in structures known as ________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device. A. packets B. bytes C. media D. VPNs

A. packets

A _________ is used to prevent attenuation when packets are traveling long distances. A. repeater B. hub C. switch D. router

A. repeater

_________ is the capacity to provide increasing amounts of computing power, storage, and/or software. A. Scalability B. Interoperability C. Data mining D. Data warehousing

A. scalability

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period. A. Strong B. Encrypted C. Fault-tolerant D. Cyber

A. strong

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur. A. surge protector B. RAID C. switch D. gateway

A. surge protector

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself. A. virus B. zombie C. worm D. Trojan horse

A. virus

_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield. A. Fiber-optic B. Coaxial C. Twisted-pair D. Wi-Fi

B. Coaxial

A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information. A. TPS B. MIS C. office automation system D. DSS

B. MIS

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk. A. DSS B. RAID C. DDoS D. tape library

B. RAID

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations. A. LAN B. WAN C. protocol D. extranet

B. WAN

A wireless _________ is the device that all nodes connect to in order communicate wirelessly. A. hub B. access point C. extranet D. adapter

B. access point

The security principle known as _________ requires that individuals must confirm their identity. A. attenuation B. authentication C. authorization D. validation

B. authentication

Any step you take to ward off a threat is called a: A. risk B. countermeasure C. vulnerability D. TPS

B. countermeasure

_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered. A. Risk assessment B. Data validation C. Data mining D. Interoperability

B. data validation

A(n) _________ examines and blocks Internet traffic in order to protect your private network. A. antivirus B. firewall C. encryption utility D. VPN

B. firewall

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes. A. zombie B. hacker C. Trojan D. worm

B. hacker

A _________ provides multiple ports for connecting nodes. A. repeater B. hub C. bridge D. gateway

B. hub

_________ is the ability of each organization's information system to work with the other, sharing both data and services. A. Scalability B. Interoperability C. Data mining D. Data warehousing

B. interoperability

A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint. A. LAN B. intranet C. extranet D. WAN

B. intranet

The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users. A. bugs B. malware C. phishing D. hacker

B. malware

_________ involves luring individuals into entering personal information into a website controlled by the hacker. A. Switching B. Phishing C. Pretexting D. Striping

B. phishing

Computers which are under the external control of a hacker are known as: A. worms B. zombies C. nodes D. extranets

B. zombies

Which of the following is NOT one of the specifications of Wi-Fi technology? A. 802.11g B. 802.11n C. 802.11x D. 802.11ac

C. 802.11x

_________ cable normally consists of four pairs of wires that are twisted around each other. A. Fiber-optic B. Coaxial C. Twisted-pair D. Wi-Fi

C. Twisted-pair

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time. A. surge protector B. NIC C. UPS D. office automation system

C. UPS

The security principle known as _________ gives individuals a certain level of access based on who they are. A. attenuation B. authentication C. authorization D. validation

C. authorization

A _________ is a device that connects two LANs or two segments of the same LAN. A. repeater B. hub C. bridge D. router

C. bridge

Actions ranging from creating viruses to disrupting computer networks are often referred to as: A. data mining B. scareware C. cybercrimes D. social engineering

C. cybercrimes

_________ is the discovery of new patterns or relationships between data. A. Scalability B. Data validation C. Data mining D. Data warehousing

C. data mining

Many types of software and devices use _________ to scramble your data or communication. A. attenuation B. RAIDs C. encryption D. WAPs

C. encryption

Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices. A. MIS B. DSS C. Ethernet D. Wi-Fi

C. ethernet

A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human. A. data mining B. data warehousing C. expert D. fault-tolerant

C. expert

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications. A. TPS B. MIS C. office automation system D. DSS

C. office automation system

_________ is gaining someone's trust by pretending you are someone else. A. Switching B. Phishing C. Pretexting D. Authentication

C. pretexting

Systems follow certain rules, or ________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed. A. DSS B. nodes C. protocols D. topologies

C. protocols

_________ computers are ones that have multiple hardware systems performing the same task at the same time. A. Expert B. Data mining C. Redundant D. Scalable

C. redundant

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat? A. The probability of a threat B. The degree of vulnerability C. The likelihood of user compliance D. The penalty or injury that may occur if the threat succeeds in causing harm

C. the likelihood of user compliance

Which of the following is NOT one of the three general strategies that are used to authenticate individuals? A. What you know B. What you have C. Who you know D. Who you are

C. who you know

A _________ is a fully-contained program that self-replicates and spreads through computers and networks. A. virus B. zombie C. worm D. Trojan horse

C. worm

________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. A. Hotspots B. Worms C. Trojans D. Botnets

D. Botnets

A(n) ________, which is a special application that collects and reports certain types of data, can help managers make better decisions. A. TPS B. MIS C. office automation system D. DSS

D. DSS

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. A. virus B. zombie C. worm D. Trojan horse

D. Trojan horse

Very few countermeasures are as effective as ________, which can help you to recover data that was lost to almost any type of threat. A. botnets B. anti-malware C. encryption D. backups

D. backups

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps). A. authentication B. topology C. attenuation D. bandwidth

D. bandwidth

A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases. A. RAID B. DDoS C. data mine D. data warehouse

D. data warehouse

_________ computers are able to continue their operation even when problems are present. A. DSS B. Uninterruptable C. Scalable D. Fault-tolerant

D. fault-tolerant

A _________ is a node on a network that serves as an entrance to another network. A. repeater B. hub C. switch D. gateway

D. gateway

The means used to link together parts of a computer network are referred to as network: A. points B. hotspots C. topologies D. media

D. media

Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point. A. botnets B. Trojan horses C. nodes D. rogue hotspots

D. rogue hotspots

A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. A. repeater B. hub C. bridge D. router

D. router

The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software. A. DDoS B. RAID C. pretexting D. scareware

D. scareware

_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs. A. Cyberterrorism B. Data mining C. Authentication D. Social engineering

D. social engineering

_________ is a type of malware which is designed to report activity on your computer to another party. A. DDoS B. Ransomware C. Trojan horse D. Spyware

D. spyware

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it. A. hub B. gateway C. repeater D. switch

D. switch

Large organizations often use a(n) _________ library for backups and archives of their data. A. intranet B. redundant C. fiber-optic D. tape

D. tape

The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network. A. interoperability B. bandwidth C. protocol D. topology

D. topology

_________ networks use radio signals that travel through the air to transmit data. A. Star B. Ring C. Mesh D. Wireless

D. wireless

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

False

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.

False

Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.

False

An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.

False

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

False

Copyright protection lasts 20 years after the date of publication or release.

False

In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.

False

Monitors should be cleaned routinely using regular glass cleaners and paper towels.

False

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.

False

Power failures are the primary cause of component failure in computer systems.

False

Social engineering is a form of hacking that has a social or political agenda behind it.

False

The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.

False

The two parts of a packet are the certificate and the key.

False

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

False

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

True

A network allows users to communicate and share information between computers and various devices.

True

A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.

True

A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.

True

An MIS system can provide different types of information or summaries to managers at different levels.

True

Creative works such as books, songs, and photographs are protected by copyright law.

True

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

True

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

True

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

True

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

True

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

True

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

True

The network that connects the computers in a school's study center or library is considered a LAN.

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

True

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

True

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

True


Ensembles d'études connexes

Vocab list two - antonyms and synonyms

View Set

Biochemistry Learning Curve Chapter 5.1, 5.2

View Set

Personal and Community Health Chapters 3 & 4

View Set

Chapter 57: Drugs Affecting Gastrointestinal Secretions

View Set

Lesson 2: Job Opportunities for Entrepreneurship as a Career

View Set