BISM 1200 Chapter 5 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. A. fiber-optic B. twisted-pair C. coaxial D. bluetooth

A

A(n) _________ is a connection point in a network. A. nodeB. hotspotC. intranetD. TPS

A

Data moves though networks in structures known as ________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device. A. packets B. bytes C. media D. VPNs

A

________ refers to the loss of intensity and clarity of the data signal being transmitted. A. Attenuation B. Scalability C. Redundancy D. Validation

A

A wireless _________ is the device that all nodes connect to in order communicate wirelessly. A. hub B. access point C. extranetD. adapter

B

A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint. A. LAN B. intranet C. extranet D. WAN

B

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations. A. LAN B. WAN C. protocol D. extranet

B

Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices. A. MIS B. DSS C. Ethernet D. Wi-Fi

C

Which of the following is NOT one of the specifications of Wi-Fi technology? A. 802.11g B. 802.11n C. 802.11x D. 802.11ac

C

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it. A. hub B. gateway C. repeater D. switch

D

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps). A. authentication B. topology C. attenuation D. bandwidth

D

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

T

A network allows users to communicate and share information between computers and various devices.

T

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

T

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests. A. DDoSB. phishingC. pretextingD. scareware

a

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself. A. virusB. zombieC. wormD. Trojan horse

a

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period. A. StrongB. EncryptedC. Fault-tolerantD. Cyber

a

_________ software helps to protect your computer from various types of malware. A. Anti-malwareB. FirewallC. EncryptionD. Backup

a

A _________ provides multiple ports for connecting nodes. A. repeaterB. hubC. bridgeD. gateway

b

A(n) _________ examines and blocks Internet traffic in order to protect your private network. A. antivirusB. firewallC. encryption utilityD. VPN

b

A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information. A. TPSB. MISC. office automation systemD. DSS

b

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk. A. DSSB. RAIDC. DDoSD. tape library

b

Any step you take to ward off a threat is called a: A. riskB. countermeasureC. vulnerabilityD. TPS

b

Computers which are under the external control of a hacker are known as: A. wormsB. zombiesC. nodesD. extranets

b

The security principle known as _________ requires that individuals must confirm their identity. A. attenuationB. authenticationC. authorizationD. validation

b

The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users. A. bugsB. malwareC. phishingD. hacker

b

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes. A. zombieB. hackerC. TrojanD. worm

b

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat? A. The probability of a threatB. The degree of vulnerabilityC. The likelihood of user complianceD. The penalty or injury that may occur if the threat succeeds in causing harm

c

Which of the following is NOT one of the three general strategies that are used to authenticate individuals? A. What you knowB. What you haveC. Who you knowD. Who you are

c

_______ computers are ones that have multiple hardware systems performing the same task at the same time. A. ExpertB. Data miningC. RedundantD. Scalable

c

_________ cable normally consists of four pairs of wires that are twisted around each other. A. Fiber-opticB. CoaxialC. Twisted-pairD. Wi-Fi

c

_________ is gaining someone's trust by pretending you are someone else. A. SwitchingB. PhishingC. PretextingD. Authentication

c

_________ is the discovery of new patterns or relationships between data. A. ScalabilityB. Data validationC. Data miningD. Data warehousing

c

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

t

The means used to link together parts of a computer network are referred to as network: A. points B. hotspots C. topologies D. media

D

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

F

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.

F

An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.

F

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

F

In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.

F

Monitors should be cleaned routinely using regular glass cleaners and paper towels.

F

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.

F

Power failures are the primary cause of component failure in computer systems.

F

Social engineering is a form of hacking that has a social or political agenda behind it.

F

The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.

F

The two parts of a packet are the certificate and the key.

F

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

F

A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.

T

A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.

T

An MIS system can provide different types of information or summaries to managers at different levels.

T

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

T

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

T

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

T

The network that connects the computers in a school's study center or library is considered a LAN.

T

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

T

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

T

A _________ is used to prevent attenuation when packets are traveling long distances. A. repeaterB. hubC. switchD. router

a

A type of spyware known as _________ can record the individual keystrokes of a user. A. keyloggersB. ransomwareC. pay-per-clickD. Trojans

a

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur. A. surge protectorB. RAIDC. switchD. gateway

a

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection. A. VPNB. WANC. gatewayD. bridge

a

Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure. A. mission-criticalB. uninterruptableC. expert systemsD. MIS

a

In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do. A. hackerB. cyberterroristC. rogueD. hacktivist

a

No form of hacking is as dangerous as ________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure. A. cyberterrorismB. data miningC. hacktivismD. social engineering

a

The _________ lock can make it difficult for thieves to steal a laptop. A. KensingtonB. EthernetC. DSSD. TPS

a

The information system that handles the processing and tracking of transactions is called a(n): A. TPSB. MISC. office automation systemD. DSS

a

While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building. A. fluctuationsB. failuresC. vulnerabilitiesD. redundancies

a

________ is the capacity to provide increasing amounts of computing power, storage, and/or software. A. ScalabilityB. InteroperabilityC. Data miningD. Data warehousing

a

______ is the ability of each organization's information system to work with the other, sharing both data and services. A. ScalabilityB. InteroperabilityC. Data miningD. Data warehousing

b

________ involves luring individuals into entering personal information into a website controlled by the hacker. A. SwitchingB. PhishingC. PretextingD. Striping

b

_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield. A. Fiber-opticB. CoaxialC. Twisted-pairD. Wi-Fi

b

_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered. A. Risk assessmentB. Data validationC. Data miningD. Interoperability

b

A _________ is a device that connects two LANs or two segments of the same LAN. A. repeaterB. hubC. bridgeD. router

c

A _________ is a fully-contained program that self-replicates and spreads through computers and networks. A. virusB. zombieC. wormD. Trojan horse

c

A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human. A. data miningB. data warehousingC. expertD. fault-tolerant

c

Actions ranging from creating viruses to disrupting computer networks are often referred to as: A. data miningB. scarewareC. cybercrimesD. social engineering

c

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications. A. TPSB. MISC. office automation systemD. DSS

c

Many types of software and devices use _________ to scramble your data or communication. A. attenuationB. RAIDsC. encryptionD. WAPs

c

Systems follow certain rules, or ________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed. A. DSSB. nodesC. protocolsD. topologies

c

The security principle known as _________ gives individuals a certain level of access based on who they are. A. attenuationB. authenticationC. authorizationD. validation

c

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time. A. surge protectorB. NICC. UPSD. office automation system

c

A _________ is a node on a network that serves as an entrance to another network. A. repeaterB. hubC. switchD. gateway

d

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. A. virusB. zombieC. wormD. Trojan horse

d

A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. A. repeaterB. hubC. bridgeD. router

d

A(n) ________, which is a special application that collects and reports certain types of data, can help managers make better decisions. A. TPSB. MISC. office automation systemD. DSS

d

A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases. A. RAIDB. DDoSC. data mineD. data warehouse

d

Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point. A. botnetsB. Trojan horsesC. nodesD. rogue hotspots

d

Large organizations often use a(n) _________ library for backups and archives of their data. A. intranetB. redundantC. fiber-opticD. tape

d

The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network. A. interoperabilityB. bandwidthC. protocolD. topology

d

The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software. A. DDoSB. RAIDC. pretextingD. scareware

d

Very few countermeasures are as effective as ________, which can help you to recover data that was lost to almost any type of threat. A. botnetsB. anti-malwareC. encryptionD. backups

d

________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs. A. CyberterrorismB. Data miningC. AuthenticationD. Social engineering

d

________ networks use radio signals that travel through the air to transmit data. A. StarB. RingC. MeshD. Wireless

d

________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. A. HotspotsB. WormsC. TrojansD. Botnets

d

_________ computers are able to continue their operation even when problems are present. A. DSSB. UninterruptableC. ScalableD. Fault-tolerant

d

_________ is a type of malware which is designed to report activity on your computer to another party. A. DDoSB. RansomwareC. Trojan horseD. Spyware

d


Set pelajaran terkait

Pharmacology Final + Practice Quizzes

View Set

International Business Chapter Midterm

View Set

AP US History: Chapter 25 Review

View Set

Community Health Exam 3 Practice Questions

View Set

CSCI 464 (Multiple Choice) Midterm Review

View Set

Health Assessment in Nursing Weber & Kelley 5th edition Ch 1-34

View Set