CIS 110 - Module 5 Quiz
___ computers are able to continue their operation even when problems are present.
Fault-tolerant
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
Fiber-optic
While storms could be a cause, power ___ are more likely to be caused by disturbances from high-demand equipment in a home or building
Fluctuations
Which of the following is NOT one of the specifications of Wi-Fi technology?
802.11x
___ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
Coaxial
A ___ is a node on a network that serves as an entrance to another network.
Gateway
A ___ provides multiple ports for connecting nodes.
Hub
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
True
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
True
The network that connects the computers in a school's study center or library is considered a LAN.
True
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
VPN
Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.
Backups
A(n) ___ is a connection point in a network.
Node
___ computers are ones that have multiple hardware systems performing the same task at the same time.
Redundant
___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
Botnets
Hacking on the largest possible scale, often referred to as ___, is conducted by countries, terrorist organizations, and large independent hacking groups.
Cyber Warfare
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Ethernet
A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.
Expert
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
False
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
False
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
False
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
False
Organizations create an extranet in order to allow their systems to have access to the rest of the internet.
False
Social engineering is a form of hacking that has a social or political agenda behind it.
False
The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.
False
The two parts of a packet are the certificate and the key.
False
___ is the ability of each organization's information system to work with the other, sharing both data and services.
Interoperability
Wireless ___ networks, where nodes connect directly to each other, may be used in large homes or businesses to easily cover the entire area.
Mesh
Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure.
Mission Critical
Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
Packets
Systems follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
Protocols
The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
Ransomware
A ___ is used to prevent attenuation when packets are traveling long distances.
Repeater
___ is the capacity to provide increasing amounts of computing power, storage, and/or software.
Scalability
___ is a type of malware which is designed to report activity on your computer to another party.
Spyware
In a(n) ___ topology, all nodes are connected to a hub or switch and communicate through it.
Star
A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
Surge Protector
Large organizations often use a(n) ___ library for backups and archives of their data.
Tape
The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network.
Topology
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
True
___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.
Two-factor authentication
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
WAN