Cybersecurity Essentials Flashcards

1
Q

In the context of cybersecurity, what term describes an area that needs protection, possibly bounded by logical or physical limits, and is subject to control and authority within a specific system?

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term is exemplified by Google, Facebook, and LinkedIn in the context of the Internet, where each represents a controlled area for data collection, user interaction, and providing services, utilizing user-contributed information like personal data, interests, and professional connections?

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the context of cybersecurity, who are individuals with limited skills, often using pre-made tools or online instructions to conduct attacks, ranging from mere curiosity to attempts at causing harm, and can still cause significant damage despite their basic approach?

A

Amateurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term describes individuals who infiltrate computers or networks with varying intentions, classified as white, gray, or black hats based on their methods and motives, ranging from identifying and improving system security to exploiting vulnerabilities for illegal gains?

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who are the ethical cyber specialists that use their programming knowledge for legal and ethical purposes, conducting penetration tests to identify and report security vulnerabilities, and may receive rewards or bounties for their findings?

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term is used for individuals who may operate without ethical approval, compromise systems without permission, and potentially reveal vulnerabilities either publicly or to the organization affected, not necessarily for personal gain but often in ethically ambiguous situations?

A

Gray hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the designation for cybercriminals who intentionally breach computer and network security for personal benefit or to inflict harm, exploiting vulnerabilities to compromise systems?

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term encompasses the range of groups that operate in the cyber realm including professional criminal organizations, hacktivists, terrorists, and government-funded entities, all of whom may engage in sophisticated and targeted cyber operations for various motives like profit, political activism, espionage, or sabotage?

A

Organized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term refers to cyber activists who engage in hacking to make political statements, often by exposing sensitive information to raise awareness about various issues, and differs from state-sponsored attackers who conduct cyber espionage or sabotage for national interests?

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of hacker would work with ATM manufacturers to resolve security vulnerabilities after hacking into ATM machines using a laptop?

A

Grey Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of hacker would transfer $10 million to their bank account using victims’ account numbers and PINs recorded without their knowledge?

A

Black Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of hacker is tasked with identifying weaknesses within their company’s computer system?

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of hacker uses malware to compromise corporate systems and sell stolen credit card information to the highest bidder?

A

Black Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of hacker stumbles across a security vulnerability on a corporate network they are authorized to access while researching for exploits?

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of hacker collaborates with technology companies to fix a DNS flaw?

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term, originated in the 1990s, describes young or inexperienced individuals who use pre-written scripts or tools to hack into systems, often without a profit motive but with the potential to cause harm?

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who are the individuals, often considered gray hat hackers, that seek out security weaknesses and report their findings to the vendors, sometimes in exchange for compensation or bounties?

A

Vulnerability Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What term is used for gray hat hackers who engage in online activism, protesting against political or social issues by publishing articles, videos, leaking sensitive data, and conducting DDoS attacks?

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What term describes black hat hackers who may operate independently or within organized groups, and are known for committing offenses that result in substantial financial losses for individuals and companies annually?

A

Cyber Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What classification is given to hackers, viewed as white or black hat depending on perspective, that are supported by a nation’s government to infiltrate foreign entities to exfiltrate secrets, gather intelligence, and potentially disrupt networks?

A

State-Sponsored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identifying cybersecurity countermeasure used to thwart cyber criminals:

The Honeynet Project

A

Early Warning Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identifying cybersecurity countermeasure used to thwart cyber criminals:

The InfraGard Program

A

Sharing Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identifying cybersecurity countermeasure used to thwart cyber criminals:

ISO/IEC 27000

A

ISM Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Identifying cybersecurity countermeasure used to thwart cyber criminals:

Cybersecurity Act

A

New laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Identifying cybersecurity countermeasure used to thwart cyber criminals:

The Nation Common Vulnerabilities and Exposures (CVE) project

A

Vulnerability database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What tools do cybercriminals utilize to intercept and log data packets as they traverse a network, which can put sensitive information such as usernames, passwords, and financial details at risk, especially when used in conjunction with rogue devices in public spaces?

A

Packet-sniffing tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the cyberattack technique that involves corrupting the cache of a DNS server by introducing false information, leading to the redirection of internet traffic to a fraudulent site or server instead of the intended destination?

A

DNS spoofing (or DNS cache poisoning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is another term for DNS spoofing, referring to the technique where attackers alter DNS records to redirect online traffic to a fraudulent website, thereby gaining access to sensitive data?

A

DNS cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is another term for DNS cache poisoning, referring to the technique where attackers alter DNS records to redirect online traffic to a fraudulent website, thereby gaining access to sensitive data?

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the term for the act of creating and inserting illegitimate packets into an existing data stream to disrupt or redirect communication, often used in man-in-the-middle attacks by cybercriminals to intercept or manipulate information?

A

Packet forgery (or packet injection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is another term for packet forgery, which refers to the malicious act of generating and dispatching deceptive network packets that seem to be a part of a legitimate conversation or data transfer, often used to interrupt or meddle with an ongoing network communication?

A

Packet injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is another term for packet injection, which refers to the malicious act of generating and dispatching deceptive network packets that seem to be a part of a legitimate conversation or data transfer, often used to interrupt or meddle with an ongoing network communication?

A

Packet forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the cybersecurity threat called where a cybercriminal disrupts or intercepts packets within a network by inserting forged packets, leading to the hijacking of a legitimate session or denial of network service?

A

Man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the name of the sophisticated computer worm discovered in 2010, known for targeting SCADA systems and is believed to have been designed to disrupt the Iranian nuclear program, representing one of the first instances of cyber warfare?

A

Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the collective term for the practices, technologies, and processes designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access, which is essential at personal, corporate, and state levels for the protection of identities, data, and safety?

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What term describes the practice of manipulating individuals psychologically to perform certain actions or reveal sensitive information, typically employed in malicious activities targeting security systems?

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the alternative term for ‘social engineering’ in the context of cybersecurity, referring to the technique of manipulating individuals into unintentionally compromising their own or their organization’s security?

A

Human hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the alternative term for ‘human hacking’ in the context of cybersecurity, referring to the technique of manipulating individuals into unintentionally compromising their own or their organization’s security?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What type of social engineering attack involves enticing victims with a promise of goods, such as free downloads, to obtain their login credentials, and can also occur through physical means like USB drives exploiting human curiosity?

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What term describes the act of obtaining confidential information by directly observing someone as they enter a PIN at an ATM, fill out a form, or type sensitive data, often done in crowded places or from a distance with visual aids, and can be prevented by physical shielding methods?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the term for a social engineering technique where attackers create a fabricated scenario to deceive victims into divulging sensitive information, often targeting organizations by impersonating authority figures or clients through phone, email, or text?

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What term refers to the fraudulent practice where attackers disguise themselves as reputable entities via emails or phone calls, aiming to deceive individuals into providing sensitive personal information like usernames, passwords, and credit card details?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the name of the cyberattack method that is a more targeted form of phishing, where attackers select specific individuals or organizations and tailor their deceptive communications to appear more legitimate to those particular victims?

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What term is used for a specialized form of phishing attack where the primary targets are high-ranking officials like CEOs or CFOs, involving highly customized and sophisticated methods to deceive these high-profile individuals?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the type of malware attack where cybercriminals encrypt a victim’s data and demand payment for its decryption, with no assurance of actually restoring the data, affecting various sectors including finance, government, healthcare, and education?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What term is used for a type of malicious software that tricks users into downloading and installing fake antivirus programs or other security solutions by exploiting their fear of viruses and threats?

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the security breach tactic where an unauthorized individual gains physical access to a restricted area by getting help or closely following an authorized person, often through doors or other entry points before they securely close?

A

Tailgating

48
Q

What term describes the practice in social engineering where attackers sift through trash to find discarded documents or electronic devices that may contain sensitive information, useful for launching further attacks?

A

Dumpster diving

49
Q

What term is used for risks that arise from within an organization, potentially involving employees or partners who might mishandle data, compromise internal servers, introduce malware through infected devices, or have knowledge of and access to sensitive network resources and security protocols?

A

Internal security threats

50
Q

What term refers to the risks posed by individuals or groups outside an organization, who may exploit network vulnerabilities or engage in social engineering tactics like deception to gain unauthorized access to internal resources?

A

External security threats

51
Q

What is the term for the trend where employees use their personal mobile devices like smartphones, tablets, and laptops for accessing enterprise information and networks, posing challenges in central management and security updates?

A

Bring Your Own Device (BYOD)

52
Q

What term describes a sophisticated form of cyberattack that is continuous and stealthy, targeting specific entities for business or political reasons, characterized by its long duration and the use of advanced malware?

A

Advanced Persistent Threat (APT)

53
Q

What type of cyberattacks focus on manipulating a system’s self-reporting data, such as energy usage, to either select targets or trigger false alerts, and can also overload a system’s memory or CPU, exploiting designs meant for energy savings and efficiency?

A

Algorithm attacks

54
Q

What is the system called where multiple organizations allow their users to access each other’s networks using the same identification credentials, thereby increasing the risk of widespread impact in the event of a security breach?

A

Federated identity management

55
Q

In the context of the National Cybersecurity Workforce Framework, what category encompasses the tasks of supporting, administering, and maintaining IT systems to guarantee their optimal performance and security?

A

Operate and Maintain

56
Q

Within the National Cybersecurity Workforce Framework, what category involves the activities related to the identification, analysis, and mitigation of threats to an organization’s internal systems and networks?

A

Protect and Defend

57
Q

In the National Cybersecurity Workforce Framework, what category covers the activities related to probing cyber events and crimes involving IT systems, networks, and digital evidence?

A

Investigate

58
Q

What is the category in the National Cybersecurity Workforce Framework that focuses on conducting specialized denial and deception operations and gathering cybersecurity information for intelligence development?

A

Collect and Operate

59
Q

In the National Cybersecurity Workforce Framework, what category encompasses the detailed examination and assessment of incoming cybersecurity information to ascertain its value for intelligence purposes?

A

Analyze

60
Q

Within the National Cybersecurity Workforce Framework, what category involves providing leadership, management, direction, and advocacy to ensure effective conduct of cybersecurity work by individuals and organizations?

A

Oversight and Development

61
Q

In the National Cybersecurity Workforce Framework, what category is responsible for the creation, design, and construction of secure IT systems, encompassing some aspects of systems development?

A

Securely Provision

62
Q

What is the name of the certification program sponsored by CompTIA that validates the knowledge and skills of IT administrators in information assurance, covering key areas such as network security, risk management, and cloud computing concerns?

A

CompTIA Security+

63
Q

What is the name of the intermediate-level certification that indicates cybersecurity professionals have the skills and knowledge to employ hacking techniques, similar to those used by cybercriminals, for identifying system vulnerabilities and access points?

A

EC-Council Certified Ethical Hacker (CEH)

64
Q

What entry-level cybersecurity certification, offered by the SANS GIAC program, validates a professional’s understanding of security terminology and concepts, and their capability in “hands-on” security roles, with additional certifications available in security administration, forensics, and auditing?

A

SANS GIAC Security Essentials (GSEC)

65
Q

What is the globally recognized, vendor-neutral certification, approved by the U.S. Department of Defense, designed for cybersecurity specialists with extensive technical and managerial experience, emphasizing a broad range of security topics and best practices?

A

(ISC)² Certified Information Systems Security Professional (CISSP)

66
Q

What certification is suitable for professionals responsible for managing, developing, and overseeing enterprise-level information security systems and who possess advanced skills in security risk management, focusing on developing best security practices?

A

ISACA Certified Information Security Manager (CISM)

67
Q

What certification confirms that a cybersecurity specialist has the necessary knowledge and skills to secure networks, specifically focusing on Cisco network environments?

A

Cisco Certified Network Associate Security (CCNA Security)

68
Q

In the context of the internet, what does FQDN stands for?

A

Fully Qualified Domain Name

69
Q

In the cybersecurity cube’s first dimension, which three foundational principles are identified as the primary goals for protecting cyberspace, serving as a guide for experts to prioritize their actions in securing networked systems?

A

Confidentiality, Integrity, and Availability

70
Q

What cybersecurity principle involves preventing the unauthorized disclosure of information to people, resources, and processes, often referred to as privacy, and is maintained through methods like data encryption, authentication, and access control?

A

Confidentiality

71
Q

What principle in cybersecurity refers to the maintenance of data’s accuracy, consistency, and trustworthiness throughout its entire lifecycle, ensuring it remains unaltered during operations like capture, storage, and transfer, often achieved through methods like hashing, validation, and access controls?

A

Integrity

72
Q

What principle in cybersecurity emphasizes the necessity to have information systems and services accessible when required, highlighting that cyberattacks like DoS can compromise this principle by preventing legitimate access?

A

Availability

73
Q

In the second dimension of the Cybersecurity Cube, what are the three states of data that must be protected in cyberspace, encompassing the movement, storage, and active use of the data?

A

Transmission, Storage, Processing

74
Q

According to the Cybersecurity Cube, what are the three types of skills and disciplines essential for protecting information systems, which include not only the use of technological tools but also the establishment of policies and practices, and fostering a culture of awareness and learning among users?

A

Technology, Policies and Practice, People

75
Q

What term is used to describe data that requires protection from unauthorized access in order to safeguard the interests and privacy of individuals or organizations, distinguishing it from publicly available information?

A

Sensitive information

76
Q

What term refers to data that can be used to uniquely identify, contact, or locate a single person, including details like social security numbers, medical records, credit card numbers, and financial records?

A

Personally Identifiable Information (PII)

77
Q

What term describes data within an organization that, if disclosed to competitors or the public, could pose a risk, and includes details like trade secrets, acquisition plans, financial data, and customer information?

A

Business information

78
Q

What term is used for information held by a government body that is categorized based on its sensitivity level, with designations such as top secret, secret, confidential, and restricted?

A

Classified information

79
Q

What are the three key security services involved in access control that form the foundation for safeguarding against unauthorized access to computers, networks, databases, or other resources, encompassing user identity verification, permissions granting, and usage tracking?

A

AAA (Authentication, Authorization, and Accounting)

80
Q

What is the process in cybersecurity called that verifies a user’s identity to prevent unauthorized access, which may involve proving identity through means like something they know (password), something they have (token or card), or something they are (biometric data)?

A

Authentication

81
Q

What is the security process where access is granted only after successfully presenting two or more pieces of evidence to an authentication mechanism, such as a combination of a bank card (something you have) and a PIN (something you know)?

A

Multifactor authentication

82
Q

What process in cybersecurity involves defining and managing the access rights of users to specific resources and operations, often using access control lists (ACLs) to specify privileges, and can include restrictions based on time or context, like limiting access to a sales database outside of work hours?

A

Authorization

83
Q

What is the cybersecurity mechanism that specifies user access rights to various resources and operations within a system, determining what authenticated users are permitted to do, and can include time-based restrictions, like granting access to a database only during work hours?

A

ACL (Access Control List)

84
Q

What process in cybersecurity involves monitoring and recording users’ activities, such as accessed resources, duration of access, and modifications made, allowing for audits that can reveal transaction details, times, and responsible parties or systems?

A

Accounting

85
Q

What term refers to the proper use of data, particularly in contexts where organizations collect information from customers or employees and are expected to use that data solely for its intended purpose, often requiring consent through a release form?

A

Privacy

86
Q

In which level of need for data integrity do healthcare and emergency services operate, where all data must be validated, tested, and verified to ensure its trustworthiness, as exemplified by healthcare and financial records?

A

Critical level

87
Q

What level of data integrity need is associated with e-commerce and analytics, where validation and trustworthiness checks are essential, typically involving databases of organizations?

A

High level

88
Q

At which level of data integrity need do online sales and search engines operate, where there is minimal verification, data may not be entirely reliable, and information is often gathered through publicly posted forms?

A

Mid level

89
Q

What level of data integrity is typically associated with blogs and personal posting sites, where data is often unverified, there’s a low level of trust in the content, and examples include areas like public opinion and open contribution platforms?

A

Low level

90
Q

What term describes the method used to ensure the consistency and unchanged state of a data set over time, utilizing a process known as a hash function to create a snapshot for later comparison?

A

Integrity check

91
Q

What is the specific type of hash function used to verify the integrity of data before and after transmission by converting the information into a numerical value, summing it up, and then comparing the result with the original to ensure no alteration has occurred?

A

Checksum

92
Q

What are the algorithms called that create a unique, fixed-size hash value from data, such as files, and are used for verifying data integrity, with common examples including MD5, SHA-1, SHA-256, and SHA-512?

A

Hash functions

93
Q

What system do organizations implement to avoid unintentional alterations by authorized users, ensuring that only one user at a time can make changes to objects like files, records, or transactions, with subsequent users receiving read-only access until the changes are completed?

A

Version control

94
Q

What is essential for preserving data integrity in the event of data corruption, requiring organizations to regularly verify the process to ensure that the data can be effectively restored when needed?

A

Accurate backups

95
Q

What term is used to describe systems that are engineered to minimize downtime and maintain performance over an extended period, usually involving design principles to eliminate single failure points, ensure reliable crossovers, and detect failures promptly, often aiming for an operational standard known as ‘five nines’?

A

High availability

96
Q

What design principle in system architecture involves identifying and addressing any device or component whose failure could lead to the failure of the entire system, typically mitigated by methods such as using hot stand-by devices, redundant components, and multiple pathways?

A

Eliminate single points of failure

97
Q

What design principle ensures that a system continues to operate smoothly in the event of the failure of one component, through the use of alternative resources such as redundant power supplies, backup power systems, and backup communication systems?

A

Provide for reliable crossover

98
Q

What design principle focuses on the continuous monitoring of devices and systems to identify and respond to failures in real-time, potentially activating backup systems automatically to maintain operations?

A

Detect failures as they occur

99
Q

What practice can significantly enhance system uptime and involves periodic actions such as replacing components, cleaning, and aligning equipment to ensure optimal performance?

A

Equipment maintenance

100
Q

What process is crucial for correcting errors and eliminating vulnerabilities in modern operating systems, applications, and software, requiring regular implementation and often involving subscription to alerts for new releases?

A

OS updates

101
Q

What are critical for ensuring that organizational, configuration, and personal data are available even in the event of data loss, and must be regularly tested to confirm the ability to restore information effectively?

A

Backup systems

102
Q

What is an essential component of maintaining system availability that involves preparing employees and customers for potential disruptions, training the cybersecurity team in response protocols, and testing and knowing the procedures to restore critical systems?

A

Plan for disasters

103
Q

What is a vital strategy in maintaining high availability, involving the ongoing evaluation and adoption of new technologies, products, and devices to keep pace with the evolving tactics of cyber criminals?

A

Implement technologies

104
Q

What practice is essential to enhancing system availability, involving the constant supervision of event logs, system alerts, and access logs to provide real-time data, allowing cybersecurity professionals to identify and respond to attacks promptly?

A

Monitor systems

105
Q

What is the procedure called that involves rigorously assessing all systems to uncover vulnerabilities, often using methods such as port scans, vulnerability scans, and penetration tests?

A

System testing

106
Q

What term is used to describe data that is not actively moving through network devices or being processed by applications, and is instead stored on a local or networked storage device?

A

Data at rest

107
Q

What term describes a type of digital storage that is physically connected to the computer it serves, such as a hard drive or USB flash drive, and is not configured by default for sharing across a network?

A

Direct-attached storage (DAS)

108
Q

What is the storage technology that combines multiple disk drive components into a single unit for improved performance and data redundancy, seen by the operating system as one disk?

A

Redundant array of independent disks (RAID)

109
Q

What is the dedicated file storage device that provides local area network (LAN) users with centralized and consolidated disk storage through a standard Ethernet connection, known for its flexibility and scalability?

A

Network attached storage (NAS)

110
Q

What is the high-speed, network-based storage architecture that allows multiple servers to connect to a centralized pool of disk storage, offering enhanced performance and storage consolidation?

A

Storage area network (SAN)

111
Q

What type of storage allows users to save data to an off-site storage system maintained by a third party and accessed via the internet, with services like Google Drive, iCloud, and Dropbox as examples?

A

Cloud storage

112
Q

Which type of data storage is known to be challenging to manage and control due to its susceptibility to attacks on the local host, and why is it advised that organizations limit the use of this storage for critical data?

A

Direct-attached storage

113
Q

What type of storage systems, encompassing technologies like RAID, SAN, and NAS, are considered more secure and offer better performance and redundancy, but are also more complex to configure and present increased risk due to the larger volume of data they handle?

A

Network storage systems

114
Q

What term describes the informal method of data transfer that involves physically moving removable media, such as USB drives or external hard drives, from one computer to another?

A

Sneaker net

115
Q

What type of network transmits data through cables, offering a physical means of communication between computers and devices? It includes copper-wired and fiber optic media. Can serve a local geographical area (Local Area Network) or they can span great distances (Wide Area Networks).

A

Wired networks

116
Q

What type of network employs radio waves for data transmission, allowing communication between devices without the need for physical cables?

A

Wireless networks