Deck 5: Networking Security

ملء الشاشة (f)
exit full mode
سؤال
Social engineering is a form of hacking that has a social or political agenda behind it.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
سؤال
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
سؤال
The network that connects the computers in a school's study center or library is considered a LAN.
سؤال
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
سؤال
A network allows users to communicate and share information between computers and various devices.
سؤال
An MIS system can provide different types of information or summaries to managers at different levels.
سؤال
Power failures are the primary cause of component failure in computer systems.
سؤال
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
سؤال
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
سؤال
Monitors should be cleaned routinely using regular glass cleaners and paper towels.
سؤال
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
سؤال
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
سؤال
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
سؤال
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
سؤال
The two parts of a packet are the certificate and the key.
سؤال
The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.
سؤال
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
سؤال
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
سؤال
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
سؤال
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
سؤال
A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.

A) LAN
B) intranet
C) extranet
D) WAN
سؤال
Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

A) MIS
B) DSS
C) Ethernet
D) Wi-Fi
سؤال
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
سؤال
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
سؤال
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
سؤال
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
سؤال
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
سؤال
Data moves though networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

A) packets
B) bytes
C) media
D) VPNs
سؤال
_________ networks use radio signals that travel through the air to transmit data.

A) Star
B) Ring
C) Mesh
D) Wireless
سؤال
_________ refers to the loss of intensity and clarity of the data signal being transmitted.

A) Attenuation
B) Scalability
C) Redundancy
D) Validation
سؤال
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

A) hub
B) access point
C) extranet
D) adapter
سؤال
_________ cable normally consists of four pairs of wires that are twisted around each other.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
سؤال
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

A) authentication
B) topology
C) attenuation
D) bandwidth
سؤال
A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

A) hub
B) gateway
C) repeater
D) switch
سؤال
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

A) LAN
B) WAN
C) protocol
D) extranet
سؤال
Which of the following is NOT one of the specifications of Wi-Fi technology?

A) 802.11g
B) 802.11n
C) 802.11x
D) 802.11ac
سؤال
The means used to link together parts of a computer network are referred to as network:

A) points
B) hotspots
C) topologies
D) media
سؤال
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

A) fiber-optic
B) twisted-pair
C) coaxial
D) bluetooth
سؤال
A(n) _________ is a connection point in a network.

A) node
B) hotspot
C) intranet
D) TPS
سؤال
A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.

A) TPS
B) MIS
C) office automation system
D) DSS
سؤال
A _________ is a node on a network that serves as an entrance to another network.

A) repeater
B) hub
C) switch
D) gateway
سؤال
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

A) DSS
B) RAID
C) DDoS
D) tape library
سؤال
_________ is the ability of each organization's information system to work with the other, sharing both data and services.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
سؤال
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

A) interoperability
B) bandwidth
C) protocol
D) topology
سؤال
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

A) repeater
B) hub
C) bridge
D) router
سؤال
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

A) mission-critical
B) uninterruptable
C) expert systems
D) MIS
سؤال
The information system that handles the processing and tracking of transactions is called a(n):

A) TPS
B) MIS
C) office automation system
D) DSS
سؤال
A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.

A) data mining
B) data warehousing
C) expert
D) fault-tolerant
سؤال
A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.

A) RAID
B) DDoS
C) data mine
D) data warehouse
سؤال
_________ computers are able to continue their operation even when problems are present.

A) DSS
B) Uninterruptable
C) Scalable
D) Fault-tolerant
سؤال
A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information.

A) TPS
B) MIS
C) office automation system
D) DSS
سؤال
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

A) DSS
B) nodes
C) protocols
D) topologies
سؤال
_________ is the discovery of new patterns or relationships between data.

A) Scalability
B) Data validation
C) Data mining
D) Data warehousing
سؤال
_________ computers are ones that have multiple hardware systems performing the same task at the same time.

A) Expert
B) Data mining
C) Redundant
D) Scalable
سؤال
A _________ provides multiple ports for connecting nodes.

A) repeater
B) hub
C) bridge
D) gateway
سؤال
A _________ is a device that connects two LANs or two segments of the same LAN.

A) repeater
B) hub
C) bridge
D) router
سؤال
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
سؤال
A _________ is used to prevent attenuation when packets are traveling long distances.

A) repeater
B) hub
C) switch
D) router
سؤال
In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

A) TPS
B) MIS
C) office automation system
D) DSS
سؤال
_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

A) Hotspots
B) Worms
C) Trojans
D) Botnets
سؤال
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

A) The probability of a threat
B) The degree of vulnerability
C) The likelihood of user compliance
D) The penalty or injury that may occur if the threat succeeds in causing harm
سؤال
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

A) What you know
B) What you have
C) Who you know
D) Who you are
سؤال
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

A) fluctuations
B) failures
C) vulnerabilities
D) redundancies
سؤال
_________ is a type of malware which is designed to report activity on your computer to another party.

A) DDoS
B) Ransomware
C) Trojan horse
D) Spyware
سؤال
The _________ lock can make it difficult for thieves to steal a laptop.

A) Kensington
B) Ethernet
C) DSS
D) TPS
سؤال
A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

A) surge protector
B) RAID
C) switch
D) gateway
سؤال
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

A) Risk assessment
B) Data validation
C) Data mining
D) Interoperability
سؤال
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

A) virus
B) zombie
C) worm
D) Trojan horse
سؤال
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

A) virus
B) zombie
C) worm
D) Trojan horse
سؤال
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

A) virus
B) zombie
C) worm
D) Trojan horse
سؤال
The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

A) DDoS
B) RAID
C) pretexting
D) scareware
سؤال
Any step you take to ward off a threat is called a:

A) risk
B) countermeasure
C) vulnerability
D) TPS
سؤال
_________ involves luring individuals into entering personal information into a website controlled by the hacker.

A) Switching
B) Phishing
C) Pretexting
D) Striping
سؤال
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

A) Strong
B) Encrypted
C) Fault-tolerant
D) Cyber
سؤال
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

A) surge protector
B) NIC
C) UPS
D) office automation system
سؤال
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

A) DDoS
B) phishing
C) pretexting
D) scareware
سؤال
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

A) VPN
B) WAN
C) gateway
D) bridge
سؤال
Large organizations often use a(n) _________ library for backups and archives of their data.

A) intranet
B) redundant
C) fiber-optic
D) tape
سؤال
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

A) zombie
B) hacker
C) Trojan
D) worm
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Networking Security
1
Social engineering is a form of hacking that has a social or political agenda behind it.
False
2
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
True
3
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
False
4
The network that connects the computers in a school's study center or library is considered a LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
A network allows users to communicate and share information between computers and various devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
An MIS system can provide different types of information or summaries to managers at different levels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
Power failures are the primary cause of component failure in computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
Monitors should be cleaned routinely using regular glass cleaners and paper towels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
The two parts of a packet are the certificate and the key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.

A) LAN
B) intranet
C) extranet
D) WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

A) MIS
B) DSS
C) Ethernet
D) Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
Data moves though networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

A) packets
B) bytes
C) media
D) VPNs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
_________ networks use radio signals that travel through the air to transmit data.

A) Star
B) Ring
C) Mesh
D) Wireless
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
_________ refers to the loss of intensity and clarity of the data signal being transmitted.

A) Attenuation
B) Scalability
C) Redundancy
D) Validation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

A) hub
B) access point
C) extranet
D) adapter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
_________ cable normally consists of four pairs of wires that are twisted around each other.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

A) authentication
B) topology
C) attenuation
D) bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

A) hub
B) gateway
C) repeater
D) switch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

A) LAN
B) WAN
C) protocol
D) extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is NOT one of the specifications of Wi-Fi technology?

A) 802.11g
B) 802.11n
C) 802.11x
D) 802.11ac
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
The means used to link together parts of a computer network are referred to as network:

A) points
B) hotspots
C) topologies
D) media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

A) fiber-optic
B) twisted-pair
C) coaxial
D) bluetooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n) _________ is a connection point in a network.

A) node
B) hotspot
C) intranet
D) TPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.

A) TPS
B) MIS
C) office automation system
D) DSS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
A _________ is a node on a network that serves as an entrance to another network.

A) repeater
B) hub
C) switch
D) gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

A) DSS
B) RAID
C) DDoS
D) tape library
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ is the ability of each organization's information system to work with the other, sharing both data and services.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

A) interoperability
B) bandwidth
C) protocol
D) topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

A) repeater
B) hub
C) bridge
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

A) mission-critical
B) uninterruptable
C) expert systems
D) MIS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
The information system that handles the processing and tracking of transactions is called a(n):

A) TPS
B) MIS
C) office automation system
D) DSS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.

A) data mining
B) data warehousing
C) expert
D) fault-tolerant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.

A) RAID
B) DDoS
C) data mine
D) data warehouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
_________ computers are able to continue their operation even when problems are present.

A) DSS
B) Uninterruptable
C) Scalable
D) Fault-tolerant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information.

A) TPS
B) MIS
C) office automation system
D) DSS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

A) DSS
B) nodes
C) protocols
D) topologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
_________ is the discovery of new patterns or relationships between data.

A) Scalability
B) Data validation
C) Data mining
D) Data warehousing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
_________ computers are ones that have multiple hardware systems performing the same task at the same time.

A) Expert
B) Data mining
C) Redundant
D) Scalable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
A _________ provides multiple ports for connecting nodes.

A) repeater
B) hub
C) bridge
D) gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
A _________ is a device that connects two LANs or two segments of the same LAN.

A) repeater
B) hub
C) bridge
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
A _________ is used to prevent attenuation when packets are traveling long distances.

A) repeater
B) hub
C) switch
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

A) TPS
B) MIS
C) office automation system
D) DSS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

A) Hotspots
B) Worms
C) Trojans
D) Botnets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

A) The probability of a threat
B) The degree of vulnerability
C) The likelihood of user compliance
D) The penalty or injury that may occur if the threat succeeds in causing harm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

A) What you know
B) What you have
C) Who you know
D) Who you are
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

A) fluctuations
B) failures
C) vulnerabilities
D) redundancies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
_________ is a type of malware which is designed to report activity on your computer to another party.

A) DDoS
B) Ransomware
C) Trojan horse
D) Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
The _________ lock can make it difficult for thieves to steal a laptop.

A) Kensington
B) Ethernet
C) DSS
D) TPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

A) surge protector
B) RAID
C) switch
D) gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

A) Risk assessment
B) Data validation
C) Data mining
D) Interoperability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

A) virus
B) zombie
C) worm
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

A) virus
B) zombie
C) worm
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

A) virus
B) zombie
C) worm
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

A) DDoS
B) RAID
C) pretexting
D) scareware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
Any step you take to ward off a threat is called a:

A) risk
B) countermeasure
C) vulnerability
D) TPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
_________ involves luring individuals into entering personal information into a website controlled by the hacker.

A) Switching
B) Phishing
C) Pretexting
D) Striping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

A) Strong
B) Encrypted
C) Fault-tolerant
D) Cyber
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

A) surge protector
B) NIC
C) UPS
D) office automation system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

A) DDoS
B) phishing
C) pretexting
D) scareware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

A) VPN
B) WAN
C) gateway
D) bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
Large organizations often use a(n) _________ library for backups and archives of their data.

A) intranet
B) redundant
C) fiber-optic
D) tape
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

A) zombie
B) hacker
C) Trojan
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.