CGS Chapter 5
switch
A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
access point
A wireless ___ is the device to which all nodes connect in order to communicate wirelessly.
DDoS
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
fiber optic
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
worm
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
trojan horse
A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
virus
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself
countermeasure
Any step you take to ward off a threat is called a
packets
Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
ethernet
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
scareware
The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
phishing
___ involves luring individuals into entering personal information into a website controlled by the hacker.
spyware
___ is a type of malware which is designed to report activity on your computer to another party.
UPS
When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.