13-16 quizzes and stuff

Ace your homework & exams now with Quizwiz!

what characteristic describes a dos attack

an attack that slows or crashes a device or network service

what characteristic describes phishing

an email pretending to represent a legitimate organization asking for personal information

Which of the following is installed on an end-user workstation or server to detect, block, or remove malicious software designed to capture information or deliver adware?

antispyware

which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop up ads on a user computer

antispyware

Which of the following is software installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email?

antivirus

what is the primary means for mitigating virus and trojan horse attacks

antivirus software

what characteristic describes a trojan horse

malicious software or code running on an end device

what characteristic describes a virus

malicious software or code running on an end device

what characteristic describes adware

software that is installed on a user device and collects information about the user

what characteristic describes spyware

software that is installed on a user device and collects information about the user

Which of the following is software installed on an end-user workstation or server to identify and remove unwanted emails?

spam filter

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

spyware

what type of DpS attack originates from a malicious host that has an invalid source IP address and that requests a client connection

syn flooding

what are the two radio frequency bands used in home wireless LANs?

5GHz and 2.4GHz

a student is attempting to access an 802.11n wireless network. what method is used to manage contention based access on this wireless network?

CSMA/CA

what is the method used to create a reservation on the channel for a specific conversation between devices

CSMA/CA

what type of attack is the ping of death

Denial of service—either DoS, or DDoS, depending on the number of computers involved

T/F: A home router typically only provides wired access to the network. You have to buy a separate device for wireless access.

False

what type of device is commonly connected to the ethernet ports on a home wireless router

LAN device

what characteristic describes a firewall appliance

a network device that filters access and traffic coming into a network

Which cloud model provides services for a specific organization or entity?

a private cloud

what characteristic describes antivirus software

applications that protect end devices from becoming infected with malicious software

what are patches and updates

applied to an OS or application to correct a known security vulnerability or add functionality

what technology enables a cell phone to be used as a hands free device

bluetooth

which type of network technology is used for lowspeed communication between peripheral devices?

bluetooth

what is a service that provided an internet data signal on the same network that delivers broadcast television and phone service

cable internet

what is an internet service that uses mobile phone networks to transmit data

cellular data plan

what is created when you divide up the available radio frequency spectrum

channel

which wired network technology has an inner wire surrounded by a tubular insulating layer that is then surrounded by a tubular conducting shield

coaxial cable

what kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss of manipulation

what kind of threat is described when a threat actor alters data records

data loss or manipulation

which type of attack attempts to overwhelm network links and devices with useless data

denial of service

what is a service that provides high bandwidth, always on, connection using existing land line telephone wires

digital subscriber line(DSL)

what kind of threat is described when a threat actor overloads a network to deny other users network access

disruption of service

what kind of threat is described when a threat actor prevents legal users from accessing data services

disruption of service

how does a phisher typically contact a victim

email

Which of the following is used to connect a wired device to the internal switch of the home router

ethernet port

T/F: a botnet is an individual infected computer that can be controlled by a command and control server

false

T/F: if you have devices on your wireless network that are using a variety of different 802.11 standards then you should set your network to the highest standard to get the best throughput

false

T/F: wifi, bluetooth, and cordless phones all use the same frequency ranges

false

which technology provides a solution for PC virtualization

hypervisor

what kind of threat is described when a threat actor impersonates another person to obtain credit information about that person

identity theft

what kind of threat is described when a threat actor makes illegal online purchases using stolen credit information

identity theft

what kind of threat is described when a threat actor is stealing the user database of a company

information theft

what kind of threat is described when a threat actor steals scientific research data

information theft

which is a characteristic of type 1 hypervisior

installed directly on a server

what is virus protection

installed on an end-user workstation or server to detect and remove malware from files and email

which term is used to describe the process of establishing a connection between any two bluetooth devices?

pairing

what is the term used when a malicious party sends a fraud email disguised as being from a legitimate trusted source

phishing

Which of the following is software installed on an end-user workstation to prevent an advertisement windows from displaying?

popup blocker

what can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the internet

quest SSID

during the reservation process what does the client send to the ap to reserve a channel

request to send

what type of internet connection would be best for a residences in a remote area without mobile phone coverage or wired connectivity

satellite

which technology virtualizes the network control plane and moves it to a centralized controller

sdn

an unidentified person claiming to be a technician collecting user information from employees is an example of what?

social engineering

a company uses a cloud based payroll system which cloud computing technology is this company using?

software as a service (Saas)

define popup blocker

software installed to prevent unwanted advertisements from displaying on your computer

define firewall

software that controls traffic to and from your network

what characteristic describes antispam

software that identifies email spam and automatically deletes or places them in a junk folder

what happens when a device sends an acknowledgement message to a wireless AP?

the ap releases the channel

what is used to identify a specific wireless network

the service set identifier (SSID)

what characteristic describes identity theft

the use of stolen credentials to access private data

what purpose would a home user have for implementing wifi?

to create a wireless network usable by other devices

what malicious program appears to be as a legitimate program to deceive the victim but is in fact an attack tool that can contain malicious code

trojan horse

your grandma was surfing the internet when she got a pop up that claimed she had won a prize. After clicking to see what prize she had won, a program was unknowingly installed on her computer which allowed an intruder to access her hard drive and all her personal information. what is this an example of ?

trojan horse

T/F: applications can be accessed over the internet through a subscription is a characteristic of cloud computing

true

T/F: certain areas of the electromagnetic spectrum can be used without a permit

true

T/F: spyware is a program that gathers personal information from your computer without your permission or knowledge

true

what would a technician require in order to install a hypervisor on a client machine

virtualization software

person A downloaded a file from the internet and after opening the file their hard drive crashed and all information on the computer was lost. what is this an example of?

virus

name two characteristics of wireless network security

when ssid broadcast is disabled an attacker must know the ssid to connect and using the default ip address on an access point hacking easier

which type of wireless communication is based on 802.11 standards

wifi

which organization is responsible for testing wireless LAN devices?

wifi alliance

person A opened an email sent to them by a family member and a few hours later their friends contact them saying that they received emails from person A that they did not knowingly send. what is this an example of?

worms


Related study sets

Psychology Final Exam REAL QUESTIONS

View Set

PSYCH 7A CHAPTER 14: SOCIAL PSYCHOLOGY

View Set

Mastering Bio - Membrane structure and function

View Set

U60: World War I Begins: Practice quiz

View Set

BSCC 1084 Exam 2 Study Ch 9 - 16

View Set

Apparel 1: Industrial Revolution Notes

View Set