CGS1060 Chapter 5 – Flashcards
Unlock all answers in this set
Unlock answersquestion
attenuation
answer
The loss of intensity and clarity of a transmitted data signal.
question
authentication
answer
A security measure used to confirm an individual's identity.
question
authorization
answer
A security measure used to give individuals a certain level of access based on who they are.
question
bandwidth
answer
In networks, it refers to the amount of data that can be transmitted over a given amount of time.
question
botnet
answer
Massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
question
bridge
answer
A device that connects two LANs or two segments of the same LAN; looks at the information in each packet header and forwards data traveling from one LAN to another.
question
coaxial cable
answer
A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
question
countermeasure
answer
Any step you take to ward off a threat.
question
cybercrime
answer
The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks.
question
cyberterrorism
answer
A dangerous form of hacking that seeks to create large-scale chaos and damage to a country's infrastructure.
question
data mining
answer
The discovery of new patterns or relationships between data.
question
data validation
answer
A method for checking and improving the reliability of data.
question
data warehouse
answer
A central repository where records from multiple databases are stored.
question
decision support system (DSS)
answer
A special application that collects and reports certain types of data, thus helping managers make better decisions.
question
distributed denial-of-service (DDoS)
answer
A network attack that attempts to shut down or block access to websites or other network resources by overwhelming them with requests.
question
Ethernet
answer
The most common physical standard for local area networks.
question
expert system
answer
A type of information system that performs analytical tasks traditionally done by a human, using sequences of questions to ask and actions to take based on the responses to those questions.
question
extranet
answer
A service that allows organizations to share some of its intranet resources with people outside the organization.
question
fault-tolerant
answer
Systems that are able to continue their operation even when problems are present.
question
fiber-optic cable
answer
A high-speed cable that consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
question
gateway
answer
A node on a network that serves as an entrance to another network. It helps one network understand the packet headers from another network.
question
hacker
answer
In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks.
question
hacktivism
answer
Hacking with a social or political agenda.
question
hub
answer
A basic network device that provides multiple ports for connecting nodes.
question
identity theft
answer
A type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name.
question
information system (IS)
answer
A complex system for acquiring, storing, organizing, using, and sharing data and information.
question
interoperability
answer
The ability of each organization's information system to work with the other, sharing data and services.
question
intranet
answer
An internal version of the Internet containing information that is restricted to a particular company's employees.
question
local area network (LAN)
answer
A data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media.
question
malware
answer
A generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information.
question
management information system (MIS)
answer
A set of software tools that enables managers to gather, organize, and evaluate information.
question
mission-critical
answer
Systems that must run without failure or with nearly instant recovery from failure.
question
network
answer
A connection between computers that allows users to communicate and share information.
question
network interface card (NIC)
answer
A computer component that translates and transmits network packets.
question
network media
answer
The means used to link parts of a computer network.
question
node
answer
A connection point within a network.
question
office automation system
answer
A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently.
question
packet
answer
Pieces of a message broken down into small units by the sending device and reassembled by the receiving device in a network.
question
phishing
answer
Luring individuals into entering personal information into a website controlled by a hacker.
question
pretexting
answer
Gaining someone's trust by pretending you are someone else.
question
protocol
answer
A set of rules or standards that must be followed by computers that wish to communicate over a network.
question
RAID
answer
A storage system that links any number of disk drives (a disk array) so that they act as a single disk.
question
redundant
answer
Computers that have multiple hardware systems performing the same task at the same time.
question
repeater
answer
A network device used to prevent attenuation when packets are traveling long distances.
question
risk assessment
answer
Identifying and examining possible threats to a computer system.
question
rogue hotspot
answer
A wireless access point set up by a hacker in a public area to intercept users' communication.
question
router
answer
A complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go, then determines the best route for the packet to take toward its destination.
question
scalability
answer
The capacity to provide increasing amounts of computing power, storage, and/or software.
question
scareware
answer
A type of scam whose goal is to scare the user into doing exactly what the thief wants.
question
social engineering
answer
A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
question
spyware
answer
Malware that reports activity on your computer to another party.
question
strong password
answer
A password that is difficult for thieves to guess or crack.
question
surge protector
answer
An inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
question
switch
answer
A network device that is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it, thereby increasing the efficiency of the network.
question
tape library
answer
A large storage unit that houses multiple tape drives.
question
threat
answer
Anything that can cause harm.
question
topology
answer
The logical layout of the cables and devices that connect the nodes of the network.
question
transaction processing system (TPS)
answer
A type of information system that handles the processing and tracking of transactions.
question
Trojan horse
answer
A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
question
twisted-pair cable
answer
A cable that consists of four pairs of wires that are twisted around each other. Each copper wire is insulated in plastic, and all wires are collectively bound together in a layer of plastic.
question
uninterruptible power supply (UPS)
answer
A device that contains both a surge protector and rechargeable battery, allowing your computer system to run for a limited amount of time during a power failure.
question
virtual private network (VPN)
answer
A type of connection that increases the security of network communication by employing a method called "tunneling", whereby each packet from the sending computer is encapsulated within another packet.
question
virus
answer
A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
question
vulnerability
answer
A weakness that has not been protected against threats, thereby making it open to harm.
question
wide area network (WAN)
answer
The connection of two or more central computers or LANs, generally across a wide geographical area.
question
Wi-Fi
answer
The most popular standard for wireless networking; also called "802.11".
question
wireless access point (WAP)
answer
Connects single or multiple PCs in the wireless environment.
question
wireless adapter
answer
A piece of hardware that is plugged into a desktop computer to gain Wi-Fi access.
question
wireless network
answer
A type of connection whereby communication takes place using radio waves.
question
worm
answer
A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file.
question
zombie
answer
An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.