Deck 5: Networking Security

Full screen (f)
exit full mode
Question
Social engineering is a form of hacking that has a social or political agenda behind it.
Use Space or
up arrow
down arrow
to flip the card.
Question
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
Question
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
Question
The network that connects the computers in a school's study center or library is considered a LAN.
Question
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
Question
A network allows users to communicate and share information between computers and various devices.
Question
An MIS system can provide different types of information or summaries to managers at different levels.
Question
Power failures are the primary cause of component failure in computer systems.
Question
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
Question
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
Question
Monitors should be cleaned routinely using regular glass cleaners and paper towels.
Question
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
Question
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
Question
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
Question
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
Question
The two parts of a packet are the certificate and the key.
Question
The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.
Question
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
Question
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
Question
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
Question
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
Question
A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.

A) LAN
B) intranet
C) extranet
D) WAN
Question
Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

A) MIS
B) DSS
C) Ethernet
D) Wi-Fi
Question
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
Question
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
Question
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
Question
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
Question
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
Question
Data moves though networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

A) packets
B) bytes
C) media
D) VPNs
Question
_________ networks use radio signals that travel through the air to transmit data.

A) Star
B) Ring
C) Mesh
D) Wireless
Question
_________ refers to the loss of intensity and clarity of the data signal being transmitted.

A) Attenuation
B) Scalability
C) Redundancy
D) Validation
Question
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

A) hub
B) access point
C) extranet
D) adapter
Question
_________ cable normally consists of four pairs of wires that are twisted around each other.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
Question
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

A) authentication
B) topology
C) attenuation
D) bandwidth
Question
A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

A) hub
B) gateway
C) repeater
D) switch
Question
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

A) LAN
B) WAN
C) protocol
D) extranet
Question
Which of the following is NOT one of the specifications of Wi-Fi technology?

A) 802.11g
B) 802.11n
C) 802.11x
D) 802.11ac
Question
The means used to link together parts of a computer network are referred to as network:

A) points
B) hotspots
C) topologies
D) media
Question
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

A) fiber-optic
B) twisted-pair
C) coaxial
D) bluetooth
Question
A(n) _________ is a connection point in a network.

A) node
B) hotspot
C) intranet
D) TPS
Question
A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.

A) TPS
B) MIS
C) office automation system
D) DSS
Question
A _________ is a node on a network that serves as an entrance to another network.

A) repeater
B) hub
C) switch
D) gateway
Question
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

A) DSS
B) RAID
C) DDoS
D) tape library
Question
_________ is the ability of each organization's information system to work with the other, sharing both data and services.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
Question
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

A) interoperability
B) bandwidth
C) protocol
D) topology
Question
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

A) repeater
B) hub
C) bridge
D) router
Question
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

A) mission-critical
B) uninterruptable
C) expert systems
D) MIS
Question
The information system that handles the processing and tracking of transactions is called a(n):

A) TPS
B) MIS
C) office automation system
D) DSS
Question
A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.

A) data mining
B) data warehousing
C) expert
D) fault-tolerant
Question
A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.

A) RAID
B) DDoS
C) data mine
D) data warehouse
Question
_________ computers are able to continue their operation even when problems are present.

A) DSS
B) Uninterruptable
C) Scalable
D) Fault-tolerant
Question
A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information.

A) TPS
B) MIS
C) office automation system
D) DSS
Question
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

A) DSS
B) nodes
C) protocols
D) topologies
Question
_________ is the discovery of new patterns or relationships between data.

A) Scalability
B) Data validation
C) Data mining
D) Data warehousing
Question
_________ computers are ones that have multiple hardware systems performing the same task at the same time.

A) Expert
B) Data mining
C) Redundant
D) Scalable
Question
A _________ provides multiple ports for connecting nodes.

A) repeater
B) hub
C) bridge
D) gateway
Question
A _________ is a device that connects two LANs or two segments of the same LAN.

A) repeater
B) hub
C) bridge
D) router
Question
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
Question
A _________ is used to prevent attenuation when packets are traveling long distances.

A) repeater
B) hub
C) switch
D) router
Question
In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

A) TPS
B) MIS
C) office automation system
D) DSS
Question
_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

A) Hotspots
B) Worms
C) Trojans
D) Botnets
Question
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

A) The probability of a threat
B) The degree of vulnerability
C) The likelihood of user compliance
D) The penalty or injury that may occur if the threat succeeds in causing harm
Question
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

A) What you know
B) What you have
C) Who you know
D) Who you are
Question
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

A) fluctuations
B) failures
C) vulnerabilities
D) redundancies
Question
_________ is a type of malware which is designed to report activity on your computer to another party.

A) DDoS
B) Ransomware
C) Trojan horse
D) Spyware
Question
The _________ lock can make it difficult for thieves to steal a laptop.

A) Kensington
B) Ethernet
C) DSS
D) TPS
Question
A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

A) surge protector
B) RAID
C) switch
D) gateway
Question
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

A) Risk assessment
B) Data validation
C) Data mining
D) Interoperability
Question
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

A) virus
B) zombie
C) worm
D) Trojan horse
Question
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

A) virus
B) zombie
C) worm
D) Trojan horse
Question
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

A) virus
B) zombie
C) worm
D) Trojan horse
Question
The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

A) DDoS
B) RAID
C) pretexting
D) scareware
Question
Any step you take to ward off a threat is called a:

A) risk
B) countermeasure
C) vulnerability
D) TPS
Question
_________ involves luring individuals into entering personal information into a website controlled by the hacker.

A) Switching
B) Phishing
C) Pretexting
D) Striping
Question
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

A) Strong
B) Encrypted
C) Fault-tolerant
D) Cyber
Question
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

A) surge protector
B) NIC
C) UPS
D) office automation system
Question
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

A) DDoS
B) phishing
C) pretexting
D) scareware
Question
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

A) VPN
B) WAN
C) gateway
D) bridge
Question
Large organizations often use a(n) _________ library for backups and archives of their data.

A) intranet
B) redundant
C) fiber-optic
D) tape
Question
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

A) zombie
B) hacker
C) Trojan
D) worm
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Networking Security
1
Social engineering is a form of hacking that has a social or political agenda behind it.
False
2
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
True
3
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
False
4
The network that connects the computers in a school's study center or library is considered a LAN.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
A network allows users to communicate and share information between computers and various devices.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
An MIS system can provide different types of information or summaries to managers at different levels.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Power failures are the primary cause of component failure in computer systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Monitors should be cleaned routinely using regular glass cleaners and paper towels.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
The two parts of a packet are the certificate and the key.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.

A) LAN
B) intranet
C) extranet
D) WAN
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

A) MIS
B) DSS
C) Ethernet
D) Wi-Fi
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Data moves though networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

A) packets
B) bytes
C) media
D) VPNs
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
_________ networks use radio signals that travel through the air to transmit data.

A) Star
B) Ring
C) Mesh
D) Wireless
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
_________ refers to the loss of intensity and clarity of the data signal being transmitted.

A) Attenuation
B) Scalability
C) Redundancy
D) Validation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

A) hub
B) access point
C) extranet
D) adapter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
_________ cable normally consists of four pairs of wires that are twisted around each other.

A) Fiber-optic
B) Coaxial
C) Twisted-pair
D) Wi-Fi
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

A) authentication
B) topology
C) attenuation
D) bandwidth
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

A) hub
B) gateway
C) repeater
D) switch
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

A) LAN
B) WAN
C) protocol
D) extranet
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is NOT one of the specifications of Wi-Fi technology?

A) 802.11g
B) 802.11n
C) 802.11x
D) 802.11ac
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
The means used to link together parts of a computer network are referred to as network:

A) points
B) hotspots
C) topologies
D) media
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

A) fiber-optic
B) twisted-pair
C) coaxial
D) bluetooth
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
A(n) _________ is a connection point in a network.

A) node
B) hotspot
C) intranet
D) TPS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.

A) TPS
B) MIS
C) office automation system
D) DSS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
A _________ is a node on a network that serves as an entrance to another network.

A) repeater
B) hub
C) switch
D) gateway
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

A) DSS
B) RAID
C) DDoS
D) tape library
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
_________ is the ability of each organization's information system to work with the other, sharing both data and services.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

A) interoperability
B) bandwidth
C) protocol
D) topology
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

A) repeater
B) hub
C) bridge
D) router
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

A) mission-critical
B) uninterruptable
C) expert systems
D) MIS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The information system that handles the processing and tracking of transactions is called a(n):

A) TPS
B) MIS
C) office automation system
D) DSS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.

A) data mining
B) data warehousing
C) expert
D) fault-tolerant
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.

A) RAID
B) DDoS
C) data mine
D) data warehouse
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
_________ computers are able to continue their operation even when problems are present.

A) DSS
B) Uninterruptable
C) Scalable
D) Fault-tolerant
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information.

A) TPS
B) MIS
C) office automation system
D) DSS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

A) DSS
B) nodes
C) protocols
D) topologies
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
_________ is the discovery of new patterns or relationships between data.

A) Scalability
B) Data validation
C) Data mining
D) Data warehousing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
_________ computers are ones that have multiple hardware systems performing the same task at the same time.

A) Expert
B) Data mining
C) Redundant
D) Scalable
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
A _________ provides multiple ports for connecting nodes.

A) repeater
B) hub
C) bridge
D) gateway
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
A _________ is a device that connects two LANs or two segments of the same LAN.

A) repeater
B) hub
C) bridge
D) router
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

A) Scalability
B) Interoperability
C) Data mining
D) Data warehousing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
A _________ is used to prevent attenuation when packets are traveling long distances.

A) repeater
B) hub
C) switch
D) router
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

A) TPS
B) MIS
C) office automation system
D) DSS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

A) Hotspots
B) Worms
C) Trojans
D) Botnets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

A) The probability of a threat
B) The degree of vulnerability
C) The likelihood of user compliance
D) The penalty or injury that may occur if the threat succeeds in causing harm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

A) What you know
B) What you have
C) Who you know
D) Who you are
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

A) fluctuations
B) failures
C) vulnerabilities
D) redundancies
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
_________ is a type of malware which is designed to report activity on your computer to another party.

A) DDoS
B) Ransomware
C) Trojan horse
D) Spyware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
The _________ lock can make it difficult for thieves to steal a laptop.

A) Kensington
B) Ethernet
C) DSS
D) TPS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

A) surge protector
B) RAID
C) switch
D) gateway
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

A) Risk assessment
B) Data validation
C) Data mining
D) Interoperability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

A) virus
B) zombie
C) worm
D) Trojan horse
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

A) virus
B) zombie
C) worm
D) Trojan horse
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

A) virus
B) zombie
C) worm
D) Trojan horse
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

A) DDoS
B) RAID
C) pretexting
D) scareware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Any step you take to ward off a threat is called a:

A) risk
B) countermeasure
C) vulnerability
D) TPS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
_________ involves luring individuals into entering personal information into a website controlled by the hacker.

A) Switching
B) Phishing
C) Pretexting
D) Striping
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

A) Strong
B) Encrypted
C) Fault-tolerant
D) Cyber
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

A) surge protector
B) NIC
C) UPS
D) office automation system
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

A) DDoS
B) phishing
C) pretexting
D) scareware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

A) VPN
B) WAN
C) gateway
D) bridge
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Large organizations often use a(n) _________ library for backups and archives of their data.

A) intranet
B) redundant
C) fiber-optic
D) tape
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

A) zombie
B) hacker
C) Trojan
D) worm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.