Technology Chp 5 HW

Unlock all answers in this set

Unlock answers
question
The ___ lock can make it difficult for thieves to steal a laptop.
answer
Kensigton
question
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
answer
DDoS
question
___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
answer
Botnets
question
True
answer
True or False: The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
question
True
answer
True or False: Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
question
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
answer
fiber-optic
question
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
answer
VPN
question
Ones ending in X. 802.11x
answer
Which of the following is NOT one of the specifications of Wi-Fi technology?
question
A wireless ___ is the device to which all nodes connect in order to communicate wirelessly.
answer
access point
question
___ is a type of malware which is designed to report activity on your computer to another party.
answer
spyware
question
A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
answer
switch
question
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
answer
WAN
question
who you know
answer
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
question
___ involves luring individuals into entering personal information into a website controlled by the hacker.
answer
phishing
question
Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
answer
hacker
question
___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
answer
strong
question
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
answer
virus
question
false
answer
true or false: Social engineering is a form of hacking that has a social or political agenda behind it.
question
Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
answer
packets
question
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
answer
Ethernet
question
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
answer
worm
question
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
answer
bandwidth
question
A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
answer
Trojan Horse
question
The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
answer
scareware
question
Large organizations often use a ___ library for backups and archives of their data.
answer
tape
question
A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
answer
surge protector
question
true
answer
True or False: Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
question
Any step you take to ward off a threat is called a:
answer
countermeasure
question
When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.
answer
UPS
question
True
answer
True or False: The network that connects the computers in a school's study center or library is considered a LAN.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New