computer chapter 5 exam
ddos
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
worm
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
ups
A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system
virus
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
switch
A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
Kensigton
The ___ lock can make it difficult for thieves to steal a laptop.
bonets
which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
countermeaure
Any step you take to ward off a threat is called a:
vpn
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
packets
Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device
wan
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
true
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
ethernet
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
true
The network that connects the computers in a school's study center or library is considered a LAN.
true
True or False: The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
spyware
is a type of malware which is designed to report activity on your computer to another party.