Test 3 Flashcards

1
Q

Monitoring of telephone and Internet-based conversations by a third party

A

Active wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software that is designed to detect and recover from attacks by viruses and worms.

A

Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The set of rules in a computer’s operating system for allocating the resources of the computer.

A

Arbitration rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A resource measurement tool that indicates the likelihood that the resource will be ready when a user needs it. It is influenced by mean time between failures and mean time to repair.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A storage-saving and I/O-saving technique that groups individual records into a block that is stored and retrieved as a unit.

A

Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs when the capacity of an application or a computer system is limited by a single component.

A

Bottlenecks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network architecture in which elements are connected together along a single link.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A communication model in which a dedicated communication path is established between two hosts, and on which all messages travel.

A

Circuit Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of storing the same data in multiple locations to improve data availability and accessibility, and to improve system resilience and reliability.

A

Data replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An operating system that provides global control for a distributed computing system allowing its resources to be managed in a unified way.

A

Distributed Operating System (DO/S)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A decision mode, a priority function, and an arbitration rule

A

DO/S system’s scheduling function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Its principal function is the resolution of Internet addresses based on fully qualified domain names, such as .com or .edu.

A

Domain Name Service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

People can find old tech thrown away and recover data off of it.

A

Dumpster Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The name of the program a user invokes to execute the File Transfer Protocol.

A

F T P command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A set of hardware and software that disguises the internal network address of a computer or network to control how clients from outside can access the organization’s internal servers.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A communications device or program that passes data between networks having similar functions but different protocols.

A

Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Known as ISO (not an abbreviation), it is a voluntary, non-treaty organization that is responsible for creating international standards in many areas, including computers and communications.

A

International Organization for Standardization

18
Q

Signal sent out when a collision occurs.

A

Jamming Signal

19
Q

Authentication system that allows network managers to administer and manage user authentication at the network level.

A

Kerberos protocol

20
Q

The part of the operating system that resides in main memory at all times and performs the most essential tasks, such as managing memory and handling disk input and output. It has complete control over everything that occurs in the system.

A

Kernel

21
Q

A data network intended to serve an area covering only a few square kilometers or less. Like a house.

A

LAN

22
Q

Backed up once a week and only backs up the files that were changed daily

A

Layered backup

23
Q

A system of interconnected computer systems and peripheral devices that exchange information with one another.

A

Network

24
Q

Refers to the processes, tools and applications used to administer, operate and maintain a network infrastructure.

A

Network Management

25
Q

A computer operating system that facilitates to connect and communicate various autonomous computers over a network.

A

Network Operating System (NOS)

26
Q

DO/S manages local and global resources. NOS does not.

A

NOS vs DO/S

27
Q

Reviewing incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are correct.

A

Packet filtering

28
Q

Software that intercepts network data packets sent in cleartext, searching them for information, such as passwords.

A

Packet sniffers

29
Q

Executable software that repairs errors or omissions in another program or piece of software.

A

Patch

30
Q

A technique used to trick consumers into revealing personal information by appearing as a legitimate entity.

A

Phishing

31
Q

A mechanism used to monitor the system. When the system becomes underutilized, the feedback causes the arrival rate to increase.

A

Positive feedback loop

32
Q

A standard that measures the probability that a unit will not fail during a given time period.

A

Reliability

33
Q

A measure of how much each unit is contributing to the overall operation of the system. It is usually given as a percentage of time that a resource is actually in use.

A

Resource utiliation

34
Q

A network topology in which each node is connected to two adjacent nodes.

A

Ring Topology

35
Q

The creation of false IP addresses in the headers of data packets sent over the Internet, often with the intent of gaining access that would not otherwise be granted.

A

Spoofing

36
Q

A network topology in which multiple network nodes are connected through a single, central node. The central node is a device that manages the network.

A

Star Topology

37
Q

A common acronym for the suite of transport-layer and application-layer protocols that operate over the Internet Protocol.

A

TCP/IP

38
Q

The arrangement of the elements of a communication network.

A

Topology

39
Q

A malicious program that replicates itself on a computer system by incorporating itself into other programs that are shared among other computer systems.

A

Virus

40
Q

A queue reordering technique that can help optimize IO times.

A

Rescheduling

41
Q

Type of error avoidance policy.

A

Token Passing

42
Q

A malicious computer program that replicates itself and is self-propagating in main memory.

A

Worm