CIS 110 - Module 5 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

___ computers are able to continue their operation even when problems are present.

Fault-tolerant

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Fiber-optic

While storms could be a cause, power ___ are more likely to be caused by disturbances from high-demand equipment in a home or building

Fluctuations

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11x

___ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

Coaxial

A ___ is a node on a network that serves as an entrance to another network.

Gateway

A ___ provides multiple ports for connecting nodes.

Hub

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

True

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

True

The network that connects the computers in a school's study center or library is considered a LAN.

True

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

VPN

Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.

Backups

A(n) ___ is a connection point in a network.

Node

___ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Botnets

Hacking on the largest possible scale, often referred to as ___, is conducted by countries, terrorist organizations, and large independent hacking groups.

Cyber Warfare

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethernet

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.

Expert

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

False

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.

False

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

False

In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.

False

Organizations create an extranet in order to allow their systems to have access to the rest of the internet.

False

Social engineering is a form of hacking that has a social or political agenda behind it.

False

The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.

False

The two parts of a packet are the certificate and the key.

False

___ is the ability of each organization's information system to work with the other, sharing both data and services.

Interoperability

Wireless ___ networks, where nodes connect directly to each other, may be used in large homes or businesses to easily cover the entire area.

Mesh

Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure.

Mission Critical

Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

Packets

Systems follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

Protocols

The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.

Ransomware

A ___ is used to prevent attenuation when packets are traveling long distances.

Repeater

___ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Scalability

___ is a type of malware which is designed to report activity on your computer to another party.

Spyware

In a(n) ___ topology, all nodes are connected to a hub or switch and communicate through it.

Star

A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

Surge Protector

Large organizations often use a(n) ___ library for backups and archives of their data.

Tape

The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network.

Topology

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

True

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Two-factor authentication

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.

WAN


संबंधित स्टडी सेट्स

Exam 1 - Fundamentals of Nursing Didactic

View Set

Accounting // Ch. 3"Beginning the Accounting Cycle"

View Set

ACTG 307 - Auditing - Audit of Internal Control and Control Risk (Chapter 10)

View Set

Strategic Management - Chapter 1

View Set