Chap 5 & 6 // Powerpoint
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests. A. DDoS B. phishing C. pretexting D. scareware
A. DDoS
The _________ lock can make it difficult for thieves to steal a laptop. A. Kensington B. Ethernet C. DSS D. TPS
A. Kensington
The information system that handles the processing and tracking of transactions is called a(n): A. TPS B. MIS C. office automation system D. DSS
A. TPS
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection. A. VPN B. WAN C. gateway D. bridge
A. VPN
_________ software helps to protect your computer from various types of malware. A. Anti-malware B. Firewall C. Encryption D. Backup
A. anti-malware
_________ refers to the loss of intensity and clarity of the data signal being transmitted. A. Attenuation B. Scalability C. Redundancy D. Validation
A. attenuation
No form of hacking is as dangerous as ________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure. A. cyberterrorism B. data mining C. hacktivism D. social engineering
A. cyberterrorism
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. A. fiber-optic B. twisted-pair C. coaxial D. bluetooth
A. fiber-optic
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building. A. fluctuations B. failures C. vulnerabilities D. redundancies
A. fluctuations
In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do. A. hacker B. cyberterrorist C. rogue D. hacktivist
A. hacker
A type of spyware known as _________ can record the individual keystrokes of a user. A. keyloggers B. ransomware C. pay-per-click D. Trojans
A. keyloggers
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure. A. mission-critical B. uninterruptable C. expert systems D. MIS
A. mission-critical
A(n) _________ is a connection point in a network. A. node B. hotspot C. intranet D. TPS
A. node
Data moves though networks in structures known as ________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device. A. packets B. bytes C. media D. VPNs
A. packets
A _________ is used to prevent attenuation when packets are traveling long distances. A. repeater B. hub C. switch D. router
A. repeater
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software. A. Scalability B. Interoperability C. Data mining D. Data warehousing
A. scalability
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period. A. Strong B. Encrypted C. Fault-tolerant D. Cyber
A. strong
A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur. A. surge protector B. RAID C. switch D. gateway
A. surge protector
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself. A. virus B. zombie C. worm D. Trojan horse
A. virus
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield. A. Fiber-optic B. Coaxial C. Twisted-pair D. Wi-Fi
B. Coaxial
A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information. A. TPS B. MIS C. office automation system D. DSS
B. MIS
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk. A. DSS B. RAID C. DDoS D. tape library
B. RAID
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations. A. LAN B. WAN C. protocol D. extranet
B. WAN
A wireless _________ is the device that all nodes connect to in order communicate wirelessly. A. hub B. access point C. extranet D. adapter
B. access point
The security principle known as _________ requires that individuals must confirm their identity. A. attenuation B. authentication C. authorization D. validation
B. authentication
Any step you take to ward off a threat is called a: A. risk B. countermeasure C. vulnerability D. TPS
B. countermeasure
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered. A. Risk assessment B. Data validation C. Data mining D. Interoperability
B. data validation
A(n) _________ examines and blocks Internet traffic in order to protect your private network. A. antivirus B. firewall C. encryption utility D. VPN
B. firewall
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes. A. zombie B. hacker C. Trojan D. worm
B. hacker
A _________ provides multiple ports for connecting nodes. A. repeater B. hub C. bridge D. gateway
B. hub
_________ is the ability of each organization's information system to work with the other, sharing both data and services. A. Scalability B. Interoperability C. Data mining D. Data warehousing
B. interoperability
A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint. A. LAN B. intranet C. extranet D. WAN
B. intranet
The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users. A. bugs B. malware C. phishing D. hacker
B. malware
_________ involves luring individuals into entering personal information into a website controlled by the hacker. A. Switching B. Phishing C. Pretexting D. Striping
B. phishing
Computers which are under the external control of a hacker are known as: A. worms B. zombies C. nodes D. extranets
B. zombies
Which of the following is NOT one of the specifications of Wi-Fi technology? A. 802.11g B. 802.11n C. 802.11x D. 802.11ac
C. 802.11x
_________ cable normally consists of four pairs of wires that are twisted around each other. A. Fiber-optic B. Coaxial C. Twisted-pair D. Wi-Fi
C. Twisted-pair
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time. A. surge protector B. NIC C. UPS D. office automation system
C. UPS
The security principle known as _________ gives individuals a certain level of access based on who they are. A. attenuation B. authentication C. authorization D. validation
C. authorization
A _________ is a device that connects two LANs or two segments of the same LAN. A. repeater B. hub C. bridge D. router
C. bridge
Actions ranging from creating viruses to disrupting computer networks are often referred to as: A. data mining B. scareware C. cybercrimes D. social engineering
C. cybercrimes
_________ is the discovery of new patterns or relationships between data. A. Scalability B. Data validation C. Data mining D. Data warehousing
C. data mining
Many types of software and devices use _________ to scramble your data or communication. A. attenuation B. RAIDs C. encryption D. WAPs
C. encryption
Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices. A. MIS B. DSS C. Ethernet D. Wi-Fi
C. ethernet
A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human. A. data mining B. data warehousing C. expert D. fault-tolerant
C. expert
In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications. A. TPS B. MIS C. office automation system D. DSS
C. office automation system
_________ is gaining someone's trust by pretending you are someone else. A. Switching B. Phishing C. Pretexting D. Authentication
C. pretexting
Systems follow certain rules, or ________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed. A. DSS B. nodes C. protocols D. topologies
C. protocols
_________ computers are ones that have multiple hardware systems performing the same task at the same time. A. Expert B. Data mining C. Redundant D. Scalable
C. redundant
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat? A. The probability of a threat B. The degree of vulnerability C. The likelihood of user compliance D. The penalty or injury that may occur if the threat succeeds in causing harm
C. the likelihood of user compliance
Which of the following is NOT one of the three general strategies that are used to authenticate individuals? A. What you know B. What you have C. Who you know D. Who you are
C. who you know
A _________ is a fully-contained program that self-replicates and spreads through computers and networks. A. virus B. zombie C. worm D. Trojan horse
C. worm
________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. A. Hotspots B. Worms C. Trojans D. Botnets
D. Botnets
A(n) ________, which is a special application that collects and reports certain types of data, can help managers make better decisions. A. TPS B. MIS C. office automation system D. DSS
D. DSS
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. A. virus B. zombie C. worm D. Trojan horse
D. Trojan horse
Very few countermeasures are as effective as ________, which can help you to recover data that was lost to almost any type of threat. A. botnets B. anti-malware C. encryption D. backups
D. backups
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps). A. authentication B. topology C. attenuation D. bandwidth
D. bandwidth
A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases. A. RAID B. DDoS C. data mine D. data warehouse
D. data warehouse
_________ computers are able to continue their operation even when problems are present. A. DSS B. Uninterruptable C. Scalable D. Fault-tolerant
D. fault-tolerant
A _________ is a node on a network that serves as an entrance to another network. A. repeater B. hub C. switch D. gateway
D. gateway
The means used to link together parts of a computer network are referred to as network: A. points B. hotspots C. topologies D. media
D. media
Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point. A. botnets B. Trojan horses C. nodes D. rogue hotspots
D. rogue hotspots
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. A. repeater B. hub C. bridge D. router
D. router
The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software. A. DDoS B. RAID C. pretexting D. scareware
D. scareware
_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs. A. Cyberterrorism B. Data mining C. Authentication D. Social engineering
D. social engineering
_________ is a type of malware which is designed to report activity on your computer to another party. A. DDoS B. Ransomware C. Trojan horse D. Spyware
D. spyware
A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it. A. hub B. gateway C. repeater D. switch
D. switch
Large organizations often use a(n) _________ library for backups and archives of their data. A. intranet B. redundant C. fiber-optic D. tape
D. tape
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network. A. interoperability B. bandwidth C. protocol D. topology
D. topology
_________ networks use radio signals that travel through the air to transmit data. A. Star B. Ring C. Mesh D. Wireless
D. wireless
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
False
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
False
Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material.
False
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
False
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
False
Copyright protection lasts 20 years after the date of publication or release.
False
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
False
Monitors should be cleaned routinely using regular glass cleaners and paper towels.
False
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
False
Power failures are the primary cause of component failure in computer systems.
False
Social engineering is a form of hacking that has a social or political agenda behind it.
False
The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.
False
The two parts of a packet are the certificate and the key.
False
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
False
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
True
A network allows users to communicate and share information between computers and various devices.
True
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
True
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
True
An MIS system can provide different types of information or summaries to managers at different levels.
True
Creative works such as books, songs, and photographs are protected by copyright law.
True
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
True
Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
True
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
True
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
True
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
True
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
True
The network that connects the computers in a school's study center or library is considered a LAN.
True
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
True
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
True
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
True