Chapter 9 and 12 Flashcards
The direct, computer-to-computer exchange of standard business transaction documents is known by the acronym ________.
EDI
One example in this lecture of people thinking they have a unique password but actually many others may also choose the same password was _________.
using “Wizard of Oz” in Spanish
The most common but also the worse password that people can use is __________.
123456
A MAC address and an IP address are the same thing.
False
A ____________is a networking device used to transfer data packets between two or more networks.
router
A private network that is set up similar to the World Wide Web for use by employees of a specific organization is called a(n) __________.
Intranet
Data breaches are always intentional.
False
A whole-house surge protector is installed
at the breaker panel
Which of the following statements about cookies is not true?
Cookies obtain your personal information by searching your hard drive.
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
firewall
A ________ is a virus that is attached to documents.
macro virus
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
Which of the following is the most commonly used client/server network topology?
Star
A(n) ________ is a heavily secured server located between a company’s secure internal network and its firewall.
Bastion host
When someone uses your personal information to pose as you, this is
identity theft
Viruses that load from USB drives left connected to the computer when computer are turned on are known as
boot-sector viruses
A packet analyzer is called a sniffer because
it capture and reads data inside each pack
Computer viruses can be spread by
sharing flash drives.
downloading and running a file attached to an e-mail.
downloading a song from a peer-to-peer sharing site.
all of the above
A is a program that takes complete control of your computer without your knowledge.
rootkit
A backup of all the data files on your computer can be managed easily using the Windows 10
File History
Authentication techniques that rely on personal biological traits are called
biometrics
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
inoculation
A surge protector may look like just another power strip but it also can
save your device if a voltage spike is sent through the electrical system
Firewalls use a process of to assign IP addresses to the devices internal to the network so hackers will not know what they are.
network address translation(NAT)