Ch 5 Networking and Security Review

Ace your homework & exams now with Quizwiz!

true

A VPN employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

RAID

A ____ is a storage system that links any number of disk drives so that they act as a single disk.

fiber-optic cable

A _____-_____ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

switch

A ______ is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

wireless access point (WAP)

A ________ ______ _____ (___) is the device that all nodes connect to in order to communicate wirelessly.

true

A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.

false

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

true

An MIS system can provide different types of information or summaries to managers at different levels.

expert system

An ______ ______ is a type of information system that performs analytical tasks traditionally done by a human.

information system (IS)

An ___________ ______ (__) is a complex system for acquiring, storing, organizing, using, and sharing data and information.

false

An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.

packets

Data moves through networks in structures known as _______, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

true

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

rogue hotspots

Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:

false

In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.

gateway

In its simplest form, a _______ is a node on a network that serves as an entrance to another network.

true

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

node

Network media helps carry data from one ____, or connection point, to another.

protocols

Networks must follow rules, known as communication _________, to ensure that data is sent, received, and interpreted properly.

intranet

Some organizations offer an internal version of the Internet, called an:

false

T/F: A Kensington lock is an effective countermeasure against phishing threats.

true

T/F: A decision support system can include or access other types of data, such as stock market reports or data about competitors.

false

T/F: For mission-critical systems, technology companies construct computer hardware and software that can never fail.

false

T/F: Monitors should be cleaned routinely using regular glass cleaners and paper towels.

false

T/F: Scalability is the ability of each organization's information system to work with the other, sharing both data and services.

true

T/F: Wireless networks use radio signals that travel through the air in order to transmit data.

star

The ____ topology, where nodes connect to a hub, is the most common type used today.

ethernet

The network standard known as ________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

ac

Which of the following Wi-Fi standards is the fastest?

transaction-processing system (TPS)

Which type of information system handles the processing and tracking of transactions?

worm

Which type of malware is a fully contained program that self-replicates and spreads through networks?

redundant

_________ computers are ones that have multiple hardware systems performing the same task at the same time.

bandwidth

__________ is the amount of data that can be transmitted over a given amount of time.

virtual private network (VPN)

A _______ _______ _______ (___) employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

true

A network allows users to communicate and share information between computers and various devices.


Related study sets

Anatomy & Physiology Chapter 11 Homework

View Set

Chapter 13 Culture and Diversity

View Set

Web Final (Ch.5-ch.11) (No chapter 9)

View Set

Ch. 11-The Strategy of International Business

View Set