Computing Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the approximate range of a personal area network?

30 feet

wireless network key

A broadband technology that uses infrared light or radio-frequency signals to communicate with devices that are physically connected to a network or the Internet.

social engineering

A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.

Worm

A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.

zombie

A device infected with malware that an attacker uses to control the device remotely.

password manager

A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.

TCP/IP (Transmission Control Protocol/Internet Protocol)

A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.

biometric security

A way to verify your identity based on physical characteristics.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

address spoofing

An attack that changes the device's address so that data is sent to the attacker's computer.

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer.

cyberterrorists

An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.

attackers

An individual who launches attacks against other users and their computers, also known as a threat actor.

hactivists

Attackers who are strongly motivated by principles or beliefs.

Which government agency is responsible for releasing the rules surrounding Internet access?

Federal Communications Commission (FCC)

Which of the following is not a web browser setting for managing cookies?

Have all cookies automatically expire after 45 days.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

wide area network (WAN)

Network that connects devices in a large geographic region, such as a multinational company or national retail chain.

attackers who want to attack computers but lack the knowledge needed to do so.

Script kiddies

data mining

The process of sifting through big data to find the important questions that will yield fruitful results.

Which of the following is not a common network topology? a. star network b. mesh network c. client/server network d. bus network

client/server network

is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."

encryption

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

Which describes a normal-looking, yet fraudulent Wi-Fi network?

evil twin

In which of the following real-life situations would it be useful to use a digital certificate?

if you were signing a rental lease

Which of the following is a private network used by organizations to communicate internally?

intranet

Each of the following is a factor that causes repetitive strain injury (RSI) except uninterrupted intensity b. improper technique c. repetitive activity d. lack of restful sleep

lack of restful sleep

When creating a strong password _____ is the most important element.

length

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.

spike

A DSL modem uses existing standard copper telephone wiring to send and receive digital data.

true

Networks allow computers to share resources, such as hardware, software, data, and information.

true

The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.

true

Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.

true

A _______ is a malicious program that uses a computer network to replicate.

worm


Ensembles d'études connexes

Chapter 4: Eukaryotic Cells & Microorganisms

View Set

Intro to Criminal Law, Ch.1-5, Exam 1

View Set

U.S. History II- Chapter 12.1: "Expansion in the Pacific" Vocabulary

View Set

Daphne et Apollo, Met 1.553-567 in ordine

View Set

PEDs Chapt 21 Nursing Care of the Child with a Genitourinary Disorder

View Set

chapter 18:Health Problems of the Adolescent-exam 3 peds

View Set