CNT4603 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

node

A(n) _________ is a connection point in a network.

RAID

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

Wireless

_________ networks use radio signals that travel through the air to transmit data.

Strong

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Anti-malware

_________ software helps protect your computer from various types of malware.

Botnets

_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

gateway

A _________ is a node on a network that serves as an entrance to another network.

Trojan horse

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

repeater

A _________ is used to prevent attenuation when packets are traveling long distances.

DDoS (distributed denial-of-service)

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

Fiber-optic

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

bridge

A _________ is a device that connects two LANs or two segments of the same LAN.

coaxial cable

A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

authorization

A security measure used to give individuals a certain level of access based on who they are.

keyloggers

A type of spyware known as _________ can record the individual keystrokes of a user.

access point

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

firewall

A(n) _________ examines and blocks Internet traffic in order to protect your private network.

mission-critical

Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

zombies

Computers which are under the external control of a hacker are known as:

bandwidth

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

rogue hotspots

Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.

WAN

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

tape

Large organizations often use a(n) _________ library for backups and archives of their data.

protocols

Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

topology

The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

attenuation

The loss of intensity and clarity of a transmitted data signal.

backups

Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.

Attenuation

_________ refers to the loss of intensity and clarity of the data signal being transmitted.

VPN

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

packets

Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

encryption

Many types of software and devices use _________ to scramble your data or communication.

Ethernet

Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

cyberterrorism

No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.

topologies

The means used to link together parts of a computer network are referred to as network:

scareware

The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

authorization

The security principle known as _________ gives individuals a certain level of access based on who they are.

authentication

The security principle known as _________ requires that individuals must confirm their identity.

Coaxial

_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

Twisted-pair

_________ cable normally consists of four pairs of wires that are twisted around each other. A. Fiber-optic

Redundant

_________ computers are ones that have multiple hardware systems performing the same task at the same time.

Social engineering

_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Phishing

involves luring individuals into entering personal information into a website controlled by the hacker.

router

A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

switch

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

hub

A _________ provides multiple ports for connecting nodes.

malware

The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users.

False

The two parts of a packet are the certificate and the key.

hacker

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

True

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

Spyware

_________ is a type of malware which is designed to report activity on your computer to another party.

scalability

_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Data mining

_________ is the discovery of new patterns or relationships between data.


Set pelajaran terkait

Intermediate Accounting II EXAM 4 Smartbook

View Set

CompTIA Security+ (SY0-601) Practice Exam #6

View Set

Ch. 16 & 17 review questions Injury

View Set

Genetics and medicine Practice test

View Set

BIOS Chapter 6 and 7 Study Guide

View Set

Strategic Communications Comp Exam

View Set

MCAT: questions i missed on exams

View Set

évaluation de la santé 1-1 (communication)

View Set