Chapter 8 Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat. T or F?

True

_________ refers to the loss of intensity and clarity of the data signal being transmitted. A. Attenuation B. Scalability C. Redundancy D. Validation

A: Attenuation

No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure. A. cyberterrorism B. data mining C. hacktivism D. social engineering

A: Cyberterrorism

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. A. fiber-optic B. twisted-pair C. coaxial D. bluetooth

A: Fiber-optic

A _________ is used to prevent attenuation when packets are traveling long distances. A. repeater B. hub C. switch D. router

A: Repeater

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself. A. virus B. zombie C. worm D. Trojan horse

A: Virus

A wireless _________ is the device that all nodes connect to in order communicate wirelessly. A. hub B. access point C. extranet D. adapter

B: Access point

_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield. A. Fiber-optic B. Coaxial C. Twisted-pair D. Wi-Fi

B: Coaxial

A _________ provides multiple ports for connecting nodes. A. repeater B. hub C. bridge D. gateway

B: Hub

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk. A. DSS B. RAID C. DDoS D. tape library

B: RAID

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations. A. LAN B. WAN C. protocol D. extranet

B: WAN

Computers which are under the external control of a hacker are known as: A. worms B. zombies C. nodes D. extranets

B: Zombies

A _________ is a device that connects two LANs or two segments of the same LAN. A. repeater B. hub C. bridge D. router

C: Bridge

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications. A. TPS B. MIS C. office automation system D. DSS

C: Office automation system

_________ computers are ones that have multiple hardware systems performing the same task at the same time. A. Expert B. Data mining C. Redundant D. Scalable

C: Redundant

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps). A. authentication B. topology C. attenuation D. bandwidth

D: Bandwidth

The means used to link together parts of a computer network are referred to as network: A. points B. hotspots C. topologies D. media

D: Media

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. A. virus B. zombie C. worm D. Trojan horse

D: Trojan horse

_________ networks use radio signals that travel through the air to transmit data. A. Star B. Ring C. Mesh D. Wireless

D: Wireless

Monitors should be cleaned routinely using regular glass cleaners and paper towels. T or F?

False

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet. T or F?

False

Power failures are the primary cause of component failure in computer systems. T or F?

False

Social engineering is a form of hacking that has a social or political agenda behind it. T or F?

False

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet. T or F?

True

A network allows users to communicate and share information between computers and various devices. T or F?

True

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk. T or F?

True

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services. T or F?

True

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point. T or F?

True

The network that connects the computers in a school's study center or library is considered a LAN. T or False

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity. T or F?

True

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name. T or F?

True


Ensembles d'études connexes

Chapter 2 - Strategy of Compensation Plans

View Set

Leadership and Politics Quiz: 2nd for Management

View Set

A&P Chapter 8 The Appendicular Skeletal system

View Set