CIS Test 3
Conventional dial-up connects to the Internet at a maximum of ______.
56 Kbps
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
Access control systems
Free or low-cost software that is supported by on-screen advertising. Some of has a malicious intent; some doesn't.
Adware
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
Backup
____ refers to the amount of data that can be transferred (such as via a bus or over a certain type of networking medium) in a given time period.
Bandwidth
Direct Internet connections are typically ____ connections.
Broadband
Public key encryption, also called asymmetric key encryption, utilizes a pair of encryption keys obtained through ____ .
Certificate authority
Many Web pages today use ____-small text files that are stored on your hard drive by a Web server-to identify return visitors and their preferences.
Cookies
____________________ Internet access is a type of direct connection that transmits via standard telephone lines.
DSL
____________________ speeds are slower than cable speeds and the speed of the connection degrades as the distance between the modem and the switching station gets closer to the three-mile limit.
DSL
In ____________________ connections, your computer dials up and connects to your ISP's computer only when needed.
Dial-up
To supplement backup procedures, businesses and other organizations should have a/an ____.
Disaster recovery plan
A fraud or scam carried out through the Internet
Dot con
A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data
False
All Wi-Fi hotspots are free.
False
Wi-Fi is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.
False
In ____, data can move in both directions at the same time, such as with a telephone.
Full-duplex transmission
In ____, data can travel in either direction, but only in one direction at a time.
Half-duplex transmission
A generic term that refers to any type of malicious software. Malware programs are intentionally written to perform unwanted, often destructive acts, such as damaging programs, deleting files, erasing hard drives, or slowing down the performance of computers.
Malware
In a ____ network, each computer or device is connected to multiple (sometimes all of the other) devices on the network.
Mesh
____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles.
Microwave stations
____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network.
Mobile wireless internet access
Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.
Multimedia messaging service
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.
Network interface card NIC
The technique used for data sent over the Internet is ____.
Packet switching
A scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.
Pharming
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____-essentially typing more than one keyword in a keyword search.
Phrase searching
One advantage of a dial-up connection is ____.
Security
Monitoring systems may use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted.
Sensors
With ____, data is sent one bit at a time, one after the other along a single path.
Serial transmission
Any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection.
Spyware
____ is the use of networking technology to provide medical information and services.
Telemedicine
Companies that provide mobile phone services are commonly called wireless providers.
True
For extended power outages, generators are needed.
True
In its early years, the Internet was used primarily by the government, scientists, and educational institutions.
True
A ______________ is a networking cable consisting of wire strands twisted in sets of two and bound into a cable. Among the names it may be referred to: CAT-5, CAT-6, or Ethernet cable.
Twisted-pair cable
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.
Video surveillance
Robert is a medical writer for a pharmaceutical company. The company allows Robert to telecommute. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.
Videoconferencing
An intentionally designed self-replicating program that causes unwanted, often destructive results. A virus will typically try to spread itself to other media and/or computers before delivering its payload.
Virus
An example of a Wi-Fi security standard is ____.
WPA
Gabrielle is planning to connect selected devices to the network wirelessly with a ____.
Wireless access point
Similar to a virus, a worm advantage of network connections to copy itself to other systems on a network.
Worm
A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.
hub
There are many options for protecting yourself against computer monitoring by your employer or the government.
False
Transferring data from a client to a server is called downloading.
False
____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.
ICANN internet corporation for assigned names and numbers
Due to the issue of wireless carriers potentially running out of bandwidth available for customers, many of them have eliminated unlimited data plans and implemented mobile data caps.
True
Fixed wireless Internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
True
Identity theft occurs when someone obtains enough information about a person to be able to masquerade as that person - usually to buy products or services in that person's name or on that person's account.
True
Numeric passwords are often called PINs.
True
The World Wide Web Consortium is an international community of over 400 organizations dedicated to developing new protocols and specifications to be used with the Web and to ensure its interoperability.
True
The most common type of mobile phones is a cellular (cell) phones.
True
To comply with truth-in-advertising laws, a/an unsubscribe e-mail address included in an unsolicited e-mail must be a working address.
True
Videoconferencing is the use of computers, video cameras, microphones, and networking technologies to conduct real-time, face-to-face meetings between individuals physically located in different places.
True
When parallel transmission is used, a group of bits are sent at the same time, and each bit takes a separate path.
True
With a peer-to-peer (P2P) network, a central server is not used.
True
_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.
Encryption
_________________ is a protocol used by local area networks (LANs) to deliver data to computers attached to a network. This type of network is typically configured in a star topology and can be used with twisted-pair, coaxial, or fiber-optic ability.
Ethernet
Most tracking software do not ____.
Automatically send videos and photos of possible suspects to law enforcement
A relatively new type of very fast direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building is generically called ____.
Broadband over fiber BoF
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
Codes of conduct
An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.
Dual-mode
Online shopping and online investing are examples of ____.
E-commerce
One common way to deal with spam that makes it to your computer is to use a/an ____.
E-mail filter
Collecting in-depth information about an individual is known as ____. It can be considered a privacy risk.
Electronic profiling
Cellular phones have better coverage in remote areas than a satellite phone.
False
_____ refers to the rights of individuals and companies to control how information about them is collected and used.
Information privacy
____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.
Internet 2
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
Internet backbone
The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.
Internet of things IoT
There are a number of options available today for listening to online music, including ____ such as Pandora.
Internet radio stations
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
Internet service providers ISPs
Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?
Kill switch hard drive
A/An __________tends to use privately owned media to carry signals. It usually covers a small geographical area such as between computers within an office, between rooms within a building, or between buildings located on the same site.
LAN
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the LAN for which the data is intended and sends the data to that device only.
Switch
In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
Throw-away
For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
Throw-away e-mail address
The ____________________ of a computer network indicates how the devices in the network are physically arranged.
Topology
A program that pretends to do one thing while having an legitimate and often destructive actual purpose. These programs are not self replicating and rely on the user downloading it and/or sharing it with others.
Trojan horse
A computer network is a connected system of computing devices linked together for the purpose of sharing resources.
True
Bluetooth is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.
True
Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
True
With telesurgery, at least one of the surgeons performs the operation by controlling the robot remotely over the Internet or another network.
True
Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.
VolP
The Internet and the Web are technically the same.
False
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
AEPANET
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.
Coaxial cable
Application service providers (ASPs) supply the information that is available through the Internet.
False
Client-server networks are also referred to as peer-to-peer networks.
False
Conventional (land-based) telephone systems use digital signals.
False
Dial-up Connections are typically faster than dial-up connections.
False
Most networking media send data using analog signals.
False
Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more.
False
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
Firewall
____ satellites travel at a speed and direction that keeps pace with the earth's rotation, so they appear (from earth) to remain stationary over a given spot.
Geosynchronous
The _____ network consists of 24 Department of Defense satellites. This network uses data from four satellites to determine a particular geographic location. It is often used by individuals while hiking and to obtain driving directions while traveling.
Global positioning system (GPS)
By ____, you instruct companies with whom you do business not to share your personal information with third parties. Alas, the process can be confusing and time consuming and doesn't always work.
Opting out
Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa.
Modem
Occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but is not as represented.
Online auction fraud
The use of a spoofed communication (typically an e-mail message appearing to come from a well-known legitimate organization but that is actually sent from a phisher) to trick the recipient into revealing sensitive personal information (such as Web site logon information or credit card numbers)
Phishing
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.
Phrase searching
__________________ as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.
Privacy
Most businesses and Web sites that collect personal information have a/an ____ that discloses how the personal information you provide will be used.
Privacy policy
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.
Privacy policy
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
Proximity cards
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.
Public
____ Web sites provide access to specic types of useful information, such as maps and driving directions.
Reference
Gabrielle would like to purchase a new ____, which would be used to connect the company's LAN and the Internet.
Router
____ are designed to withstand much more physical abuse than conventional devices.
Ruggedized devices
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.
Security slot
A hard drive that uses FDE is often referred to as a/an ____.
Self-encrypting hard drive
____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.
Simplex transmission
____ networks use a central device to connect each device directly to the network.
Star
Encryption that uses 16-character keys is known as ____.
Strong 128-bit encryption
One advantage of using a biometric access system is its very high accuracy.
True
Smartphones are prone to attacks and are known to have OS flaws.
True
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software. _________________________
True
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
True
TCP/IP is the protocol used for transferring data over the Internet.
True
TCP/IP uses packet switching to transmit data.
True
The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.
True
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a/an ____, which contains a built-in battery, can be used.
UPS
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
USB security tokens
A/An ______tends to use public carriers such as the phone company, cable company, or satellite company to relay signals over a long distance. (Large companies may be able to provide their own media and satellite.) It usually covers a large geographical area such as across town, across the state, between states, or even around the world.
WAN
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
Web 2.0
____ refers to any instruction delivered via the Web.
Web-based training WBT