CNT4603 Final
node
A(n) _________ is a connection point in a network.
RAID
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.
Wireless
_________ networks use radio signals that travel through the air to transmit data.
Strong
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Anti-malware
_________ software helps protect your computer from various types of malware.
Botnets
_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
gateway
A _________ is a node on a network that serves as an entrance to another network.
Trojan horse
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
repeater
A _________ is used to prevent attenuation when packets are traveling long distances.
DDoS (distributed denial-of-service)
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
Fiber-optic
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
bridge
A _________ is a device that connects two LANs or two segments of the same LAN.
coaxial cable
A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
authorization
A security measure used to give individuals a certain level of access based on who they are.
keyloggers
A type of spyware known as _________ can record the individual keystrokes of a user.
access point
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.
firewall
A(n) _________ examines and blocks Internet traffic in order to protect your private network.
mission-critical
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.
zombies
Computers which are under the external control of a hacker are known as:
bandwidth
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
rogue hotspots
Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.
WAN
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.
tape
Large organizations often use a(n) _________ library for backups and archives of their data.
protocols
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
topology
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.
attenuation
The loss of intensity and clarity of a transmitted data signal.
backups
Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.
Attenuation
_________ refers to the loss of intensity and clarity of the data signal being transmitted.
VPN
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.
packets
Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
encryption
Many types of software and devices use _________ to scramble your data or communication.
Ethernet
Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
cyberterrorism
No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.
topologies
The means used to link together parts of a computer network are referred to as network:
scareware
The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.
authorization
The security principle known as _________ gives individuals a certain level of access based on who they are.
authentication
The security principle known as _________ requires that individuals must confirm their identity.
Coaxial
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
Twisted-pair
_________ cable normally consists of four pairs of wires that are twisted around each other. A. Fiber-optic
Redundant
_________ computers are ones that have multiple hardware systems performing the same task at the same time.
Social engineering
_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Phishing
involves luring individuals into entering personal information into a website controlled by the hacker.
router
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.
switch
A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
hub
A _________ provides multiple ports for connecting nodes.
malware
The term _________ encompasses several types of malicious computer programs that are created to harm computer systems and their users.
False
The two parts of a packet are the certificate and the key.
hacker
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
True
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
Spyware
_________ is a type of malware which is designed to report activity on your computer to another party.
scalability
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.
Data mining
_________ is the discovery of new patterns or relationships between data.