Chapter 9 and 12 Flashcards

1
Q

The direct, computer-to-computer exchange of standard business transaction documents is known by the acronym ________.

A

EDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One example in this lecture of people thinking they have a unique password but actually many others may also choose the same password was _________.

A

using “Wizard of Oz” in Spanish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most common but also the worse password that people can use is __________.

A

123456

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A MAC address and an IP address are the same thing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ____________is a networking device used to transfer data packets between two or more networks.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A private network that is set up similar to the World Wide Web for use by employees of a specific organization is called a(n) __________.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data breaches are always intentional.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A whole-house surge protector is installed

A

at the breaker panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements about cookies is not true?

A

Cookies obtain your personal information by searching your hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ________ is a virus that is attached to documents.

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

A

terminator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the most commonly used client/server network topology?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A(n) ________ is a heavily secured server located between a company’s secure internal network and its firewall.

A

Bastion host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When someone uses your personal information to pose as you, this is

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Viruses that load from USB drives left connected to the computer when computer are turned on are known as

A

boot-sector viruses

17
Q

A packet analyzer is called a sniffer because

A

it capture and reads data inside each pack

18
Q

Computer viruses can be spread by

A

sharing flash drives.

downloading and running a file attached to an e-mail.

downloading a song from a peer-to-peer sharing site.

all of the above

19
Q

A is a program that takes complete control of your computer without your knowledge.

A

rootkit

20
Q

A backup of all the data files on your computer can be managed easily using the Windows 10

A

File History

21
Q

Authentication techniques that rely on personal biological traits are called

A

biometrics

22
Q

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

A

inoculation

23
Q

A surge protector may look like just another power strip but it also can

A

save your device if a voltage spike is sent through the electrical system

24
Q

Firewalls use a process of to assign IP addresses to the devices internal to the network so hackers will not know what they are.

A

network address translation(NAT)

25
Q

Which of the following is an advantage of installing a client/server network in a business?

A

Sharing of peripherals

26
Q

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

A

scalablity

27
Q

Which server would a client/server network include to ensure only authorized users are logging onto the network?

A

Authentication

28
Q

Which of the following is a private network set up by a business that’s used exclusively by a select group of employees and suppliers?

A

Intranet

29
Q

Sometimes groups of data packets are sent together in a package called a

A

frame

30
Q

Which of the following is not one of the factors used in multi-factor authentication?

A

Identity

31
Q

Which network cable type is most susceptible to signal interference?

A

UTP

32
Q

The process whereby users prove they have authorization to use a computer network is known as

A

authentication

33
Q

Which topology tends to provide the fairest allocation of network resources?

A

Ring

34
Q

Which is not a key component of a typical client/server network?

A

bastion host