Computer Concepts Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ force you to practice safe computing and thus prevent a lot of potential problems from affecting the systems. BitLockers Keychains EFSs AUPs

AUPs

A(n) ________ account is used for making changes, installing software, configuring settings, and completing other tasks. guest standard user administrator

Administrator

________ hack into systems for malicious purposes, such as theft or vandalism. Black hat Red hat White hat Gray hat

Black hat

In a network configured with a ________ topology, the nodes are all connected using a single cable. star hybrid bus ring

Bus

Encryption converts unencrypted, plain text into code called ________. ciphertext keychains decrypted WPA2 encryption

Ciphertext

________ occurs when a social network user clicks a link and enables malware to post unwanted links on their page. Malicious script scams Adware Phishing Clickjacking

Clickjacking

A ________ is two or more computers that share resources. network resource computer network peer-to-peer network client

Computer network

______ is the protocol that resolves a domain name such as ebay.com to an IP address. HTTP IP DHCP DNS

DNS

________ is the protocol used to transfer files between computers. FTP SMTP TCP POP

FTP

A guest account is used for everyday computing. True False

False

A wireless LAN has a very limited range of only about 10 to 100 meters, roughly 30 to 300 feet. True False

False

Black-hat hackers are also known as sneakers. True False

False

Cellular networks use encryption to ensure the data is secure as it travels through the public network. True False

False

Devices on a local area network are connected by using nodes. True False

False

Phishing redirects you to a phony website. True False

False

Routers make up the backbone of the Internet. True False

False

Which type of user account should be used for temporary access to a system? Default Administrator Guest Standard

Guest

________ can be categorized as white-hat, gray-hat, or black-hat depending on their motivation. Keyloggers Identity thieves Cyberstalkers Hackers

Hackers

Which of the following is NOT true about securing a network? In a network, the first layer of defense is the hardware at the access point to the network. In a network, the network configuration determines what is shared and who is granted access to it. In a home network, the hardware firewall is established by protocols. A firewall prevents unauthorized access to a network.

In a home network, the hardware firewall is established by protocols.

By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information. hackers cyberstalkers identity thieves keyloggers

Keyloggers

A ________ is a network that has all connected devices located in the same physical location. local area network Wireless local area network wide area network personal area network

Local area network

A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ________. wide area network personal area network wireless local area network local area network

Personal Area Network

________ redirects you to a phony website. Cyberbullying Pharming Phishing Spoofing

Pharming

________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network. Spoofing Cyberbullying Pharming Phishing

Phishing

________ define the rules for communication between devices. Routers Network operating systems Protocols Domain controllers

Protocols

A service set identifier is known as a(n) ________. SAN SSID VPN WPA2

SSID

Which type of user account should be used for everyday computing? Standard Administrator Guest Default

Standard

A home LAN uses the same network standards and equipment as those used in larger business networks. True False

True

A switch connects multiple devices on a local area network. True False

True

A wireless access point resembles a switch. True False

True

Biometric scanners measure human characteristics such as fingerprints. True False

True

Computer networks save both time and money and make it easier to work True False

True

Computers running Windows 7 or later can belong to a workgroup. True False

True

Cybercrime is any criminal activity on the Internet True False

True

Devices on a network must have an IP address. True False

True

Each device that connects to a network must have some type of network adapter. True False

True

Identity theft is when someone poses as you, using your name, Social Security number, or other personal information. True False

True

In a client-server network, users log in to the network instead of their local computers and are granted access to resources based on that login. True False

True

On a Windows computer, UAC will notify you before changes are made to your computer. True False

True

Servers range from very small to massive enterprise-level systems that serve hundreds of thousands of clients. True False

True

TCP/IP is the default protocol stack installed on Windows, Mac, and Linux computers. True False

True

The U.S. Cyber Command reported that the Pentagon systems are attacked 250,000 times an hour. True False

True

The physical layout of a LAN is called its topology True False

True

To prevent your network from being seen on other devices, disable the service set identifier. True False

True

Wi-Fi Protected Setup adds security to a wireless network by encrypting transmitted data. True False

True

Server ________ is when multiple versions of server software on the same computer. capabilities virtualization configuration infrastructure

Virtualization

One way to have a high level of security on your network is to use ________ encryption and a difficult passphrase. WEP WPA2 EAP SSID

WPA2

________ hackers are security experts that are paid to hack systems to find security holes for the purpose of preventing future hacking. Black-hat Gray-hat Red-hat White-hat

White-hat

A 3G or 4G cellular adapter built into a smartphone or notebook computer is an example of a(n) ________. network adapter router wireless adapter Ethernet adapter

Wireless adapter

A 3G or 4G cellular adapter built into a smartphone or notebook computer is an example of a(n) ________. network adapter router wireless adapter Ethernet adapter

Wireless adapter

When two wireless devices connect to each other directly, they create a(n) ________. ad hoc network infrastructure wireless network optical network terminal firewall

ad hoc network

Before opening email attachments, have the ________ scan the file to search for known viruses. security suite antivirus software antispyware software SSID

antivirus software

In a ________ network users log in to the network instead of their local computers and are granted access to resources based on that login. server peer-to-peer client-server local area

client server

An unlawful attack against computers or networks that is done to intimidate a government or its people for a political or social agenda is known as ________. cybercrime cyberbullying cyberstalking cyberterrorism

cyberterrorism

A ________ blocks unauthorized access to a network. router wireless access point firewall datapocket

firewall

To share resources with computers running Windows 7 or later, you must use a ________. peer-to-peer network workgroup homegroup computer network

homegroup

The ________ enables multiple client devices to communicate with the server and each other, to share resources, to run applications, and to send messages. protocol router network operating system domain controller

network operating system

Which of the following is NOT true about peer-to-peer networks? Computers in a P2P network belong to a workgroup. A P2P network does not require a network operating system. P2P networks are only found in homes. There is no centralized authority in a P2P network.

p2p networks are only found in homes

A ________ is a multiuser computer system that runs a network operating system and provides services to client systems. peer-to-peer network virtualized network client-server network server

server

In a network configured with a ________ topology, every node on the network is attached to a central device such as a switch or wireless access point. bus star hybrid ring

star

Which of the following is NOT a rule for creating strong passwords? Use at least six characters. Use different passwords for different accounts. Do not use any words that can be found in a dictionary. Change your passwords regularly.

use six characters


Ensembles d'études connexes

Chapter 14, Section 14.2: Computing Partial Derivatives Algebraically

View Set

Evidence for Evolution and Speciation

View Set

SPANISH 201 Lección 10 | Lesson Test

View Set

Financial Lit - Midterm - Credit

View Set

Ch. 29- Structure and Function of Respiratory Function

View Set

Capítulo 13 Corazón partido y 14 Detrás del volante

View Set