CIS Test 3

Ace your homework & exams now with Quizwiz!

Conventional dial-up connects to the Internet at a maximum of ______.

56 Kbps

____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

Access control systems

Free or low-cost software that is supported by on-screen advertising. Some of has a malicious intent; some doesn't.

Adware

Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

Backup

____ refers to the amount of data that can be transferred (such as via a bus or over a certain type of networking medium) in a given time period.

Bandwidth

Direct Internet connections are typically ____ connections.

Broadband

Public key encryption, also called asymmetric key encryption, utilizes a pair of encryption keys obtained through ____ .

Certificate authority

Many Web pages today use ____-small text files that are stored on your hard drive by a Web server-to identify return visitors and their preferences.

Cookies

____________________ Internet access is a type of direct connection that transmits via standard telephone lines.

DSL

____________________ speeds are slower than cable speeds and the speed of the connection degrades as the distance between the modem and the switching station gets closer to the three-mile limit.

DSL

In ____________________ connections, your computer dials up and connects to your ISP's computer only when needed.

Dial-up

To supplement backup procedures, businesses and other organizations should have a/an ____.

Disaster recovery plan

A fraud or scam carried out through the Internet

Dot con

A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data

False

All Wi-Fi hotspots are free.

False

Wi-Fi is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.

False

In ____, data can move in both directions at the same time, such as with a telephone.

Full-duplex transmission

In ____, data can travel in either direction, but only in one direction at a time.

Half-duplex transmission

A generic term that refers to any type of malicious software. Malware programs are intentionally written to perform unwanted, often destructive acts, such as damaging programs, deleting files, erasing hard drives, or slowing down the performance of computers.

Malware

In a ____ network, each computer or device is connected to multiple (sometimes all of the other) devices on the network.

Mesh

____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles.

Microwave stations

____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network.

Mobile wireless internet access

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Multimedia messaging service

A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.

Network interface card NIC

The technique used for data sent over the Internet is ____.

Packet switching

A scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

Pharming

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____-essentially typing more than one keyword in a keyword search.

Phrase searching

One advantage of a dial-up connection is ____.

Security

Monitoring systems may use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted.

Sensors

With ____, data is sent one bit at a time, one after the other along a single path.

Serial transmission

Any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection.

Spyware

____ is the use of networking technology to provide medical information and services.

Telemedicine

Companies that provide mobile phone services are commonly called wireless providers.

True

For extended power outages, generators are needed.

True

In its early years, the Internet was used primarily by the government, scientists, and educational institutions.

True

A ______________ is a networking cable consisting of wire strands twisted in sets of two and bound into a cable. Among the names it may be referred to: CAT-5, CAT-6, or Ethernet cable.

Twisted-pair cable

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

Video surveillance

Robert is a medical writer for a pharmaceutical company. The company allows Robert to telecommute. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.

Videoconferencing

An intentionally designed self-replicating program that causes unwanted, often destructive results. A virus will typically try to spread itself to other media and/or computers before delivering its payload.

Virus

An example of a Wi-Fi security standard is ____.

WPA

Gabrielle is planning to connect selected devices to the network wirelessly with a ____.

Wireless access point

Similar to a virus, a worm advantage of network connections to copy itself to other systems on a network.

Worm

A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.

hub

There are many options for protecting yourself against computer monitoring by your employer or the government.

False

Transferring data from a client to a server is called downloading.

False

____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.

ICANN internet corporation for assigned names and numbers

Due to the issue of wireless carriers potentially running out of bandwidth available for customers, many of them have eliminated unlimited data plans and implemented mobile data caps.

True

Fixed wireless Internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites.

True

Identity theft occurs when someone obtains enough information about a person to be able to masquerade as that person - usually to buy products or services in that person's name or on that person's account.

True

Numeric passwords are often called PINs.

True

The World Wide Web Consortium is an international community of over 400 organizations dedicated to developing new protocols and specifications to be used with the Web and to ensure its interoperability.

True

The most common type of mobile phones is a cellular (cell) phones.

True

To comply with truth-in-advertising laws, a/an unsubscribe e-mail address included in an unsolicited e-mail must be a working address.

True

Videoconferencing is the use of computers, video cameras, microphones, and networking technologies to conduct real-time, face-to-face meetings between individuals physically located in different places.

True

When parallel transmission is used, a group of bits are sent at the same time, and each bit takes a separate path.

True

With a peer-to-peer (P2P) network, a central server is not used.

True

_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.

Encryption

_________________ is a protocol used by local area networks (LANs) to deliver data to computers attached to a network. This type of network is typically configured in a star topology and can be used with twisted-pair, coaxial, or fiber-optic ability.

Ethernet

Most tracking software do not ____.

Automatically send videos and photos of possible suspects to law enforcement

A relatively new type of very fast direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building is generically called ____.

Broadband over fiber BoF

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

Codes of conduct

An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.

Dual-mode

Online shopping and online investing are examples of ____.

E-commerce

One common way to deal with spam that makes it to your computer is to use a/an ____.

E-mail filter

Collecting in-depth information about an individual is known as ____. It can be considered a privacy risk.

Electronic profiling

Cellular phones have better coverage in remote areas than a satellite phone.

False

_____ refers to the rights of individuals and companies to control how information about them is collected and used.

Information privacy

____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

Internet 2

The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.

Internet backbone

The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.

Internet of things IoT

There are a number of options available today for listening to online music, including ____ such as Pandora.

Internet radio stations

____ are businesses or other organizations that provide Internet access to others, typically for a fee.

Internet service providers ISPs

Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

Kill switch hard drive

A/An __________tends to use privately owned media to carry signals. It usually covers a small geographical area such as between computers within an office, between rooms within a building, or between buildings located on the same site.

LAN

Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the LAN for which the data is intended and sends the data to that device only.

Switch

In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

Throw-away

For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

Throw-away e-mail address

The ____________________ of a computer network indicates how the devices in the network are physically arranged.

Topology

A program that pretends to do one thing while having an legitimate and often destructive actual purpose. These programs are not self replicating and rely on the user downloading it and/or sharing it with others.

Trojan horse

A computer network is a connected system of computing devices linked together for the purpose of sharing resources.

True

Bluetooth is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.

True

Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.

True

With telesurgery, at least one of the surgeons performs the operation by controlling the robot remotely over the Internet or another network.

True

Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.

VolP

The Internet and the Web are technically the same.

False

One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.

AEPANET

____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.

Coaxial cable

Application service providers (ASPs) supply the information that is available through the Internet.

False

Client-server networks are also referred to as peer-to-peer networks.

False

Conventional (land-based) telephone systems use digital signals.

False

Dial-up Connections are typically faster than dial-up connections.

False

Most networking media send data using analog signals.

False

Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more.

False

A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

Firewall

____ satellites travel at a speed and direction that keeps pace with the earth's rotation, so they appear (from earth) to remain stationary over a given spot.

Geosynchronous

The _____ network consists of 24 Department of Defense satellites. This network uses data from four satellites to determine a particular geographic location. It is often used by individuals while hiking and to obtain driving directions while traveling.

Global positioning system (GPS)

By ____, you instruct companies with whom you do business not to share your personal information with third parties. Alas, the process can be confusing and time consuming and doesn't always work.

Opting out

Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa.

Modem

Occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but is not as represented.

Online auction fraud

The use of a spoofed communication (typically an e-mail message appearing to come from a well-known legitimate organization but that is actually sent from a phisher) to trick the recipient into revealing sensitive personal information (such as Web site logon information or credit card numbers)

Phishing

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

Phrase searching

__________________ as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.

Privacy

Most businesses and Web sites that collect personal information have a/an ____ that discloses how the personal information you provide will be used.

Privacy policy

Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

Privacy policy

For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

Proximity cards

When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

Public

____ Web sites provide access to specic types of useful information, such as maps and driving directions.

Reference

Gabrielle would like to purchase a new ____, which would be used to connect the company's LAN and the Internet.

Router

____ are designed to withstand much more physical abuse than conventional devices.

Ruggedized devices

To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

Security slot

A hard drive that uses FDE is often referred to as a/an ____.

Self-encrypting hard drive

____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.

Simplex transmission

____ networks use a central device to connect each device directly to the network.

Star

Encryption that uses 16-character keys is known as ____.

Strong 128-bit encryption

One advantage of using a biometric access system is its very high accuracy.

True

Smartphones are prone to attacks and are known to have OS flaws.

True

Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software. _________________________

True

System failure can occur because of a hardware problem, a software problem, or computer sabotage.

True

TCP/IP is the protocol used for transferring data over the Internet.

True

TCP/IP uses packet switching to transmit data.

True

The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.

True

To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a/an ____, which contains a built-in battery, can be used.

UPS

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

USB security tokens

A/An ______tends to use public carriers such as the phone company, cable company, or satellite company to relay signals over a long distance. (Large companies may be able to provide their own media and satellite.) It usually covers a large geographical area such as across town, across the state, between states, or even around the world.

WAN

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0

____ refers to any instruction delivered via the Web.

Web-based training WBT


Related study sets

Chapter 1 Understanding Healthcare Settings

View Set

Chapter 15: Respiratory Emergencies

View Set

Ch 41: Management of Patients with Musculoskeletal Disorders (3)

View Set

expert session chapter 8 email marketing in the digital age

View Set

Health Assessment EAQ's (JG Orig)

View Set

Chapter 12 Spirituality and Religious Practices

View Set

Chapter 49: Endocrine Problems Lewis: Medical-Surgical Nursing, 10th Edition

View Set

Ch. 8 Microbiology Assignment Questions

View Set