Chap 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

t

The network that connects the computers in a school's study center or library is considered a LAN.

t

______, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Botnets

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

UPS

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

Who you know

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

access point

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

bandwidth

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

arge organizations often use a(n) _________ library for backups and archives of their data. 1/1 tape tape 14 Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

worm

The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

scareware

he wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

t

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

trojan

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11x

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethernet

________ involves luring individuals into entering personal information into a website controlled by the hacker.

Phishing

____ is a type of malware which is designed to report activity on your computer to another party.

Spyware

____ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Strong

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection

VPN

ny step you take to ward off a threat is called a:

countermeasure

Social engineering is a form of hacking that has a social or political agenda behind it.

f

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

surge protector

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

switch

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

t

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

wan


Set pelajaran terkait

Absolute Value, Classifying Numbers, Adding Integers

View Set

Business Ethics Chapter 04: Video Case - Sarbanes-Oxley

View Set