Chapter 9 and 12 Flashcards
The direct, computer-to-computer exchange of standard business transaction documents is known by the acronym ________.
EDI
One example in this lecture of people thinking they have a unique password but actually many others may also choose the same password was _________.
using “Wizard of Oz” in Spanish
The most common but also the worse password that people can use is __________.
123456
A MAC address and an IP address are the same thing.
False
A ____________is a networking device used to transfer data packets between two or more networks.
router
A private network that is set up similar to the World Wide Web for use by employees of a specific organization is called a(n) __________.
Intranet
Data breaches are always intentional.
False
A whole-house surge protector is installed
at the breaker panel
Which of the following statements about cookies is not true?
Cookies obtain your personal information by searching your hard drive.
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
firewall
A ________ is a virus that is attached to documents.
macro virus
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
Which of the following is the most commonly used client/server network topology?
Star
A(n) ________ is a heavily secured server located between a company’s secure internal network and its firewall.
Bastion host
When someone uses your personal information to pose as you, this is
identity theft