13-16 quizzes and stuff
what characteristic describes a dos attack
an attack that slows or crashes a device or network service
what characteristic describes phishing
an email pretending to represent a legitimate organization asking for personal information
Which of the following is installed on an end-user workstation or server to detect, block, or remove malicious software designed to capture information or deliver adware?
antispyware
which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop up ads on a user computer
antispyware
Which of the following is software installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email?
antivirus
what is the primary means for mitigating virus and trojan horse attacks
antivirus software
what characteristic describes a trojan horse
malicious software or code running on an end device
what characteristic describes a virus
malicious software or code running on an end device
what characteristic describes adware
software that is installed on a user device and collects information about the user
what characteristic describes spyware
software that is installed on a user device and collects information about the user
Which of the following is software installed on an end-user workstation or server to identify and remove unwanted emails?
spam filter
What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
spyware
what type of DpS attack originates from a malicious host that has an invalid source IP address and that requests a client connection
syn flooding
what are the two radio frequency bands used in home wireless LANs?
5GHz and 2.4GHz
a student is attempting to access an 802.11n wireless network. what method is used to manage contention based access on this wireless network?
CSMA/CA
what is the method used to create a reservation on the channel for a specific conversation between devices
CSMA/CA
what type of attack is the ping of death
Denial of service—either DoS, or DDoS, depending on the number of computers involved
T/F: A home router typically only provides wired access to the network. You have to buy a separate device for wireless access.
False
what type of device is commonly connected to the ethernet ports on a home wireless router
LAN device
what characteristic describes a firewall appliance
a network device that filters access and traffic coming into a network
Which cloud model provides services for a specific organization or entity?
a private cloud
what characteristic describes antivirus software
applications that protect end devices from becoming infected with malicious software
what are patches and updates
applied to an OS or application to correct a known security vulnerability or add functionality
what technology enables a cell phone to be used as a hands free device
bluetooth
which type of network technology is used for lowspeed communication between peripheral devices?
bluetooth
what is a service that provided an internet data signal on the same network that delivers broadcast television and phone service
cable internet
what is an internet service that uses mobile phone networks to transmit data
cellular data plan
what is created when you divide up the available radio frequency spectrum
channel
which wired network technology has an inner wire surrounded by a tubular insulating layer that is then surrounded by a tubular conducting shield
coaxial cable
what kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss of manipulation
what kind of threat is described when a threat actor alters data records
data loss or manipulation
which type of attack attempts to overwhelm network links and devices with useless data
denial of service
what is a service that provides high bandwidth, always on, connection using existing land line telephone wires
digital subscriber line(DSL)
what kind of threat is described when a threat actor overloads a network to deny other users network access
disruption of service
what kind of threat is described when a threat actor prevents legal users from accessing data services
disruption of service
how does a phisher typically contact a victim
Which of the following is used to connect a wired device to the internal switch of the home router
ethernet port
T/F: a botnet is an individual infected computer that can be controlled by a command and control server
false
T/F: if you have devices on your wireless network that are using a variety of different 802.11 standards then you should set your network to the highest standard to get the best throughput
false
T/F: wifi, bluetooth, and cordless phones all use the same frequency ranges
false
which technology provides a solution for PC virtualization
hypervisor
what kind of threat is described when a threat actor impersonates another person to obtain credit information about that person
identity theft
what kind of threat is described when a threat actor makes illegal online purchases using stolen credit information
identity theft
what kind of threat is described when a threat actor is stealing the user database of a company
information theft
what kind of threat is described when a threat actor steals scientific research data
information theft
which is a characteristic of type 1 hypervisior
installed directly on a server
what is virus protection
installed on an end-user workstation or server to detect and remove malware from files and email
which term is used to describe the process of establishing a connection between any two bluetooth devices?
pairing
what is the term used when a malicious party sends a fraud email disguised as being from a legitimate trusted source
phishing
Which of the following is software installed on an end-user workstation to prevent an advertisement windows from displaying?
popup blocker
what can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the internet
quest SSID
during the reservation process what does the client send to the ap to reserve a channel
request to send
what type of internet connection would be best for a residences in a remote area without mobile phone coverage or wired connectivity
satellite
which technology virtualizes the network control plane and moves it to a centralized controller
sdn
an unidentified person claiming to be a technician collecting user information from employees is an example of what?
social engineering
a company uses a cloud based payroll system which cloud computing technology is this company using?
software as a service (Saas)
define popup blocker
software installed to prevent unwanted advertisements from displaying on your computer
define firewall
software that controls traffic to and from your network
what characteristic describes antispam
software that identifies email spam and automatically deletes or places them in a junk folder
what happens when a device sends an acknowledgement message to a wireless AP?
the ap releases the channel
what is used to identify a specific wireless network
the service set identifier (SSID)
what characteristic describes identity theft
the use of stolen credentials to access private data
what purpose would a home user have for implementing wifi?
to create a wireless network usable by other devices
what malicious program appears to be as a legitimate program to deceive the victim but is in fact an attack tool that can contain malicious code
trojan horse
your grandma was surfing the internet when she got a pop up that claimed she had won a prize. After clicking to see what prize she had won, a program was unknowingly installed on her computer which allowed an intruder to access her hard drive and all her personal information. what is this an example of ?
trojan horse
T/F: applications can be accessed over the internet through a subscription is a characteristic of cloud computing
true
T/F: certain areas of the electromagnetic spectrum can be used without a permit
true
T/F: spyware is a program that gathers personal information from your computer without your permission or knowledge
true
what would a technician require in order to install a hypervisor on a client machine
virtualization software
person A downloaded a file from the internet and after opening the file their hard drive crashed and all information on the computer was lost. what is this an example of?
virus
name two characteristics of wireless network security
when ssid broadcast is disabled an attacker must know the ssid to connect and using the default ip address on an access point hacking easier
which type of wireless communication is based on 802.11 standards
wifi
which organization is responsible for testing wireless LAN devices?
wifi alliance
person A opened an email sent to them by a family member and a few hours later their friends contact them saying that they received emails from person A that they did not knowingly send. what is this an example of?
worms