Your SlideShare is downloading. ×
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Chapter 7.doc
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Chapter 7.doc

1,336

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,336
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
45
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CHAPTER 7: NETWORKING AND SECURITY: CONNECTING COMPUTERS AND KEEPING THEM SAFE FROM HACKERS AND VIRUSES Multiple Choice: 1. Which of the following is NOT an example of a network node? A. printer B. computer C. NOS D. modem Answer: C Reference: Networking Fundamentals Difficulty: Moderate 2. The network architecture used in most home networks is: A. client-server LAN. B. peer-to-peer LAN. C. client-server WAN. D. peer-to-peer WAN. Answer: B Reference: Network Architectures Difficulty: Moderate 3. You must install a(n) ____________ on a network if you want to share a broadband Internet connection. A. router B. modem C. node D. cable Answer: A Reference: Network Navigation Devices Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 1
  • 2. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 4. Which of the following statements concerning peer-to-peer networks is FALSE? A. A peer-to-peer network is the most common example of a locally controlled network. B. Peer-to-peer networks cost more than client/server networks and are more difficult to maintain. C. Each node on a peer-to-peer network can communicate directly with every other node on the network. D. Peer-to-peer networks are the most common type of home network. Answer: B Reference: Network Architectures Difficulty: Moderate 5. The design of the network is called the network: A. architecture. B. server. C. transmission. D. type. Answer: A Reference: Network Architectures Difficulty: Easy 6. Data transfer rate (also called bandwidth) is the ____________ speed at which data can be transmitted between two nodes on a network. A. average B. minimum C. actual D. maximum Answer: D Reference: Transmission Media Difficulty: Challenging 7. ____________ are the navigation devices that act as the “traffic cops” of the network and forward packets to nodes on the same network (not between two networks). A. NICs B. Routers C. Switches D. Modems Answer: C Reference: Network Navigation Devices Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 2
  • 3. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 8. Which of the following statements is FALSE concerning Ethernet networks? A. Cat 5e UTP cable is recommended for Ethernet networks. B. Cat 5 UTP supports a data transmission rate of 1 Gbps. C. Ethernet typically uses an RJ-45 connector. D. When using UTP, a cable run cannot exceed 328 feet. Answer: B Reference: Wired Ethernet Networks Difficulty: Challenging 9. Devices installed on long cable runs to amplify the signal are called: A. repeaters. B. adapters. C. switches. D. routers. Answer: A Reference: Wired Ethernet Networks Difficulty: Challenging 10. A network navigation device that merely retransmits a signal to all other nodes attached to it is a(n): A. router. B. NIC. C. hub. D. adapter. Answer: C Reference: Ethernet Switches Difficulty: Moderate 11. The network navigation device known as a “smart hub” that transmits a signal only to the node to which it should be sent is a(n): A. router. B. switch. C. NIC. D. adapter. Answer: B Reference: Ethernet Switches Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 3
  • 4. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 12. A ____________ is a device, contained in a wireless network adapter, that translates the electronic data on a network into radio waves and broadcasts the radio waves to other nodes on the network. A. router B. switch C. hub D. transceiver Answer: D Reference: Wireless Ethernet Networks Difficulty: Moderate 13. A switch is also known as a(n): A. smart hub. B. DSL modem. C. smart router. D. cable modem. Answer: A Reference: Wired Ethernet Networks: Ethernet Switches Difficulty: Moderate 14. When creating a phoneline network, it is necessary to install a(n) ____________ adapter. A. wireless B. phone cord C. home phoneline network D. Digital Subscriber Line (DSL) Answer: C Reference: Phoneline Networks Difficulty: Moderate 15. ____________ adapters, used on a power-line network, are available in either USB or Ethernet versions. A. Power-line network B. Peer-to-peer network C. Phoneline network D. Wireless network Answer: A Reference: Power-Line Networks Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 4
  • 5. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 16. All of the following statements concerning client/server networks are true EXCEPT: A. one computer on a client/server network must act as a server. B. there is no centralized security or administration on a client/server network. C. most networks that have 10 or more nodes are client/server networks. D. the Internet is an example of a client/server network. Answer: B Reference: Describing Networks Based on Network Control Difficulty: Moderate 17. Which of the following types of network adapter card is most likely to be preinstalled in a typical home computer? A. Ethernet B. power-line adapter C. wireless adapter D. HPNA adapter Answer: A Reference: Wired Ethernet Networks Difficulty: Moderate 18. If a home network is connected to the Internet a ____________ is required to send data between the two networks. A. router B. repeater C. switch D. network operating system Answer: A Reference: Network Navigation Devices Difficulty: Moderate 19. CAT 5, CAT 5E, and CAT 6 are all types of: A. network adapters. B. Ethernet ports. C. UTP cables. D. connector jacks. Answer: C Reference: Wired Ethernet Networks Difficulty: Moderate 20. A wireless network uses ____________ as its transmission media. Copyright © 2008 Prentice-Hall. All rights reserved. 5
  • 6. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses A. cables B. radio waves C. twisted pair D. fiber optics Answer: B Reference: Wireless Ethernet Networks Difficulty: Easy 21. The main difference between the various 802.11 standards is the: A. data transfer rate. B. maximum allowable cable length. C. simplicity of installation. D. collision detection rate. Answer: A Reference: Wireless Ethernet Networks Difficulty: Challenging 22. The transceiver is the device that converts electronic data into ____________ for broadcast to other network nodes. A. packets B. radio waves C. WAPs D. 802.11 standards Answer: B Reference: Wireless Ethernet Networks Difficulty: Moderate 23. If you wish to extend the length of the network without having the signal degrade, you would use a: A. repeater. B. router. C. gateway. D. switch. Answer: A Reference: Wired Ethernet Networks Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 6
  • 7. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 24. If computers in a wireless network are unable to connect to the wireless router, adding a(n) ____________ extends the range of the wireless network by providing a second point to which the nodes can connect to the network. A. router B. Internet portal C. cable modem D. wireless access point Answer: D Reference: Wireless Ethernet Networks Difficulty: Moderate 25. In network terminology, a(n) ____________ is a wireless router that combines the capabilities of a wired router with the ability to receive wireless signals. A. hub B. gateway C. adapter D. Ethernet port Answer: B Reference: Wireless Ethernet Networks Difficulty: Moderate 26. If you frequently need to transfer streaming video or very large files between computers, which of the following networks would be the best choice? A. Ethernet B. wireless C. power-line D. phoneline Answer: A Reference: Wired Ethernet Networks Difficulty: Challenging 27. The ____________ operating system assists with configuring home networks with a Network Setup Wizard. A. Windows 98 B. Windows ME C. Windows XP D. DOS Answer: C Reference: Configuring Software for Your Home Network Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 7
  • 8. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 28. In a(n) ____________ network, any electrical outlet provides a network connection. A. wireless B. power-line C. phoneline D. Ethernet Answer: B Reference: Power-Line Networks Difficulty: Easy 29. In a(n) ____________ network, any phone jack provides a network connection. A. phoneline B. power-line C. 802.11g D. Ethernet Answer: A Reference: Phoneline Networks Difficulty: Easy 30. A computer virus attaches itself to and attempts to hide within the code of a(n) ____________ program. A. zombie B. Trojan horse C. host D. worm Answer: C Reference: Computer Threats: Computer Viruses Difficulty: Moderate 31. ____________ viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded. A. Zombie B. Trojan horse C. Worm D. Boot-sector Answer: D Reference: Types of Viruses Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 8
  • 9. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 32. ____________ viruses are often transmitted by a floppy disk left in the floppy disk drive. A. Boot-sector B. Trojan horse C. Script D. Logic bomb Answer: A Reference: Types of Viruses Difficulty: Challenging 33. ____________ are viruses that are triggered when certain logical conditions are met. A. Boot-sector viruses B. Logic bombs C. Macro viruses D. Worms Answer: B Reference: Types of Viruses Difficulty: Moderate 34. ____________viruses attach themselves to documents such as Word and Excel. A. Boot-sector B. Trojan horse C. DOS D. Macro Answer: D Reference: Types of Viruses Difficulty: Moderate 35. A numbered communication gateway or path, used to organize requests for information, that is assigned for a commonly used network service such as SMTP or HTTP is called a: A. protocol. B. physical port. C. logical port. D. packet filter. Answer: C Reference: How Hackers Gain Access Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 9
  • 10. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 36. Which of the following would most likely NOT be a symptom of a virus? A. Existing program files and icons disappear. B. The CD-ROM stops functioning. C. The Web browser opens to an unusual home page. D. Odd messages or images are displayed on the screen. Answer: B Reference: Bits and Bytes: Virus Symptoms Difficulty: Challenging 37. Blocking access to logical ports is a common method used by ____________ for maximizing computer security. A. switches B. Web browsers C. firewalls D. access points Answer: C Reference: Dig Deeper: How Firewalls Work Difficulty: Moderate 38. ____________ are a series of commands, actually mini programs that are executed without your knowledge. A. Scripts B. Trojan horses C. Worms D. Boot-sector viruses Answer: A Reference: Scripts and Macro Viruses Difficulty: Moderate 39. A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as: A. packet filtering. B. logical port blocking. C. Network Address Translation. D. network key distribution. Answer: A Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging Copyright © 2008 Prentice-Hall. All rights reserved. 10
  • 11. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 40. Classifications of viruses by the methods they take to avoid detection by antivirus software include all of the following EXCEPT: A. polymorphic. B. multipartite. C. encryption. D. stealth. Answer: C Reference: Virus Classifications Difficulty: Challenging 41. The purpose of Network Address Translation is to: A. translate an IP address to a text-based URL. B. hide user IP addresses from the Internet. C. convert logical ports to physical port configurations. D. dynamically assign IP addresses via an ISP. Answer: B Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging 42. When you set up a router for a wireless network, the router uses a default network name known as the: A. service set identifier (SSID). B. router address. C. MAC address. D. IP identifier. Answer: A Reference: Securing Wireless Networks Difficulty: Challenging 43. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are examples of: A. packet filtering services. B. network address translation protocols. C. security protocols. D. service set identifiers. Answer: C Reference: Securing Wireless Networks Difficulty: Challenging Copyright © 2008 Prentice-Hall. All rights reserved. 11
  • 12. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 44. A ____________ is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests. A. zombie B. worm C. DoS D. Trojan horse Answer: A Reference: Denial of Service Attacks Difficulty: Easy 45. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) use ____________ to protect data. A. packet filtering B. network address translation C. encryption D. service set identifiers Answer: C Reference: Securing Wireless Networks Difficulty: Challenging 46. ____________ are viruses that are triggered by the passage of time or on a certain date. A. Boot-sector viruses B. Macro viruses C. Time bombs D. Worms Answer: C Reference: Types of Viruses Difficulty: Moderate 47. Unlike other viruses, ____________ are viruses that can run independently of host file execution and are much more active in spreading themselves. A. boot-sector viruses B. time bombs C. Trojan horses D. worms Answer: D Reference: Types of Viruses Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 12
  • 13. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 48. ____________ viruses temporarily erase their code from the files where they reside and hide in active memory. A. Multipartite B. Stealth C. Polymorphic D. Script Answer: B Reference: Virus Classifications Difficulty: Challenging 49. All of the following are recommended to secure a wireless network EXCEPT: A. changing the default password on your router. B. turning on security protocols. C. using static IP addressing. D. restricting access to the network to certain MAC addresses. Answer: C Reference: Securing Wireless Networks Difficulty: Challenging 50. If a virus signature or other suspicious activity is detected by the antivirus software, it places the virus in a secure area of the hard drive so that it won’t spread infection to other files. This procedure is known as: A. inoculation. B. automatic updating. C. encryption. D. quarantining. Answer: D Reference: Computer Safeguards: Antivirus Software Difficulty: Easy Fill in the Blank: 51. The Internet is a good example of a(n) ____________ network. Answer: client/server Reference: Describing Networks Based on Network Control Difficulty: Easy 52. A(n) ____________ network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network. Answer: peer-to-peer (P2P) Reference: Describing Networks Based on Network ControlDifficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 13
  • 14. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 53. A(n) ____________ network is one in which the nodes are located within a small geographical area. Answer: local area network (LAN) Reference: Describing Networks Based on Distance Difficulty: Easy 54. ____________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. Answer: Coaxial Reference: Transmission Media Difficulty: Moderate 55. Normal telephone wire is composed of ____________ cable, which consists of copper wires wrapped around each other and covered in a plastic jacket. Answer: twisted pair Reference: Transmission Media Difficulty: Easy 56. All network nodes (computers and peripherals) are connected to each other and to the network by ____________. Answer: transmission media Reference: Transmission Media Difficulty: Easy 57. ____________ transfer packets of data between two or more networks. Answer: Routers Reference: Network Navigation Devices Difficulty: Moderate 58. Bundles of data sent over transmission media are called ____________. Answer: packets Reference: Network Navigation Devices Difficulty: Moderate 59. The 802.11 wireless standard is also known as ____________. Answer: WiFi (Wireless Fidelity) Reference: Wireless Ethernet Networks Difficulty: Challenging 60. Windows Server 2003 is an example of specialized software known as ____________ software. Answer: network operating system (NOS) Reference: Networking Software Difficulty: Easy 61. ____________ viruses, the newest form of virus, compress common data files into a file using a complex encryption key rendering your files unusable. Answer: Encryption Reference: Encryption Viruses Difficulty: Easy 62. A(n) ____________ is required for each node on a wireless network . Answer: wireless network adapter Reference: Wireless Ethernet Networks Difficulty: Moderate 63. The best defense against viruses is to install ____________, which is software specifically designed to detect viruses and protect your computer. Answer: antivirus software Reference: Computer Safeguards: Antivirus Software Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 14
  • 15. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 64. When setting up a network, each computer on the network needs a(n) ____________ so that the network can identify it and know which computer is requesting data and services so that the data can be delivered correctly. Answer: unique name Reference: Configuring Software For Your Home Network Difficulty: Moderate 65. ____________ networks move data through the network using conventional phone lines. Answer: Phoneline Reference: Phoneline Networks Difficulty: Easy 66. When setting up a wireless network, using Windows XP, the ____________ encryption is recommended for the best security. Answer: WPA Reference: Securing Wireless Networks Difficulty: Challenging 67. Using millions of computers during their inactive periods to provide a network-based maximization of productivity is called ____________ computing. Answer: grid Reference: Trends in IT: Emerging Technologies: Grid Computing Difficulty: Moderate 68. Anyone who breaks into a computer system (an individual computer or a network) is generally referred to as a(n) ____________. Answer: hacker Reference: Computer Threats: Hackers Difficulty: Easy 69. A(n) ____________ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data to use for illegal purposes. Answer: packet sniffer Reference: What Hackers Steal Difficulty: Moderate 70. A(n) ____________ is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background. Answer: Trojan horse Reference: Trojan Horses Difficulty: Moderate 71. When legitimate users are denied access to a computer system due to repeated bogus requests made by a hacker through a “zombie” computer systems, this is called a(n) ____________. Answer: denial of service (DoS) attack Reference: Denial of Service Attacks Difficulty: Moderate 72. ____________ is characterized by someone using personal information about you to assume your identity for the purpose of defrauding others. Answer: Identity theft Reference: What Hackers Steal Difficulty: Easy 73. ____________ are software programs or hardware devices designed to keep computers safe from hackers. Answer: Firewalls Reference: Computer Safeguards: Firewalls Difficulty: Moderate 74. 128.15.9.21 is an example of a(n) ____________. Answer: Internet Protocol (IP) address Reference: Dig Deeper: How Firewalls Work Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 15
  • 16. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 75. The process firewalls use to assign internal IP addresses on a network (which are not shared with devices not on the network) so the address is safe from hackers is called ____________. Answer: Network Address Translation (NAT) Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging True and False: 76. Wide Area Networks (WANs) are made up of LANs connected over long distances. Answer: True Reference: Describing Networks Based on Distance Difficulty: Easy 77. Networking standards set by organizations such as the IEEE make it easier for manufacturers to produce devices that work with a variety of computers and peripherals. Answer: True Reference: Bits and Bytes: One Brand Equals Fewer Headaches Difficulty: Moderate 78. Throughput is the maximum speed at which data can be transferred. Answer: False (Data transfer rate / bandwidth) Reference: Transmission Media Difficulty: Challenging 79. Public places at which you can wirelessly connect to the Internet are known as “hot spots.” Answer: True Reference: Bits and Bytes: Wireless Hot Spots Difficulty: Easy 80. A Trojan horse program can install backdoor programs that allow hackers to take almost complete control of your computer without your knowledge. Answer: True Reference: Trojan Horses Difficulty: Easy 81. If a firewall is configured to ignore all incoming packets on a particular logical port, this is known as packet filtering. Answer: False (logical port blocking) Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging 82. Static addressing means retaining the same IP address for a period of time. Answer: True Reference: Dig Deeper: How Firewalls Work Difficulty: Easy 83. Dynamic addressing makes broadband users more vulnerable to hackers because the hackers have a more permanent IP address with which to locate the computer. Answer: False (Static) Reference: Dig Deeper: How Firewalls Work Difficulty: Moderate 84. Some popular software firewalls are BlackICE PC Protection and ZoneAlarm. Answer: True Reference: Types of Firewalls Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 16
  • 17. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 85. Mac OS X does not support peer-to-peer networking. Answer: False (it does) Reference: Networking Software Difficulty: Easy 86. LANs are made up of WANs connected over long distances. Answer: False (WANs are made up of LANs) Reference: Describing Networks Based on Distance Difficulty: Moderate 87. A computer virus’s main purpose is to replicate itself and copy its code to as many other files as possible. Answer: True Reference: Computer Threats: Computer Viruses Difficulty: Easy 88. Time bombs are viruses that are triggered when certain logical conditions are met. Answer: False (logic bombs) Reference: Computer Threats: Computer Viruses Difficulty: Challenging Matching: 89. Match the following devices to their purposes: I. switch A. enables individual nodes to communicate in a network II. adapter B. converts digital signals to radio waves III. repeater C. facilitates data packet transmission IV. wireless transceiver D. sends data packets between networks V. router E. amplifies signals to prevent degradation on long cables Answer: C, A, E, B, D Reference: Multiple locations in chapter Difficulty: Challenging 90. Match the following terms to their meanings: I. packet A. software that controls an installed hardware device II. Wi-Fi B. server-side software that controls network communications III. driver C. unit of data transmitted in a network IV. NOS D. software that is written to read-only memory V. firmware E. another name for the 802.11 standard Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. 17
  • 18. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 91. Match the following computer threats to their meanings: I. logic bomb A. virus that executes based on specified conditions II. Trojan horse B. software allowing hackers to take control of a computer III. backdoor program C. simultaneous requests from multiple zombie computers IV. DDoS D. program appearing to do useful work but doing harm in the background V. worm E. infectious program that runs independent of host files Answer: A, D, B, C, E Reference: Computer Threats: Computer Viruses Difficulty: Challenging 92. Match the following terms to their meanings: I. logical port A. technique of assigning hidden internal IP addresses protected from hackers II. packet filtering B. virtual communication gateway for a specific service, such as HTTP or FTP III. static address C. method for selectively allowing certain requests to access ports IV. firewall D. hardware or software for protecting computers from hackers V. NAT E. IP number that is typically assigned for a long period of time Answer: B, C, E, D, A Reference: Computer Safeguards: Firewalls Difficulty: Moderate 93. Match the following acronyms to their meanings: I. WAN A. protocol for Internet-based e-mail formats II. Mbps B. type of transmission medium III. HPNA C. measure of data transfer IV. UTP D. type of network adapter V. SMTP E. network spanning a large geographical area Answer: E, C, D, B, A Reference: Multiple locations in chapter Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 18
  • 19. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses 94. Match the following acronyms to their definitions: I. HTTP A. protects IP addresses from hackers II. SMTP B. a protocol associated with Web pages III. HPNA C. a protocol used for e-mail IV. WAP D. an access point on a wireless network V. NAT E. a network adapter used on a phoneline network Answer: B, C, E, D, A Reference: Multiple locations in chapter Difficulty: Moderate 95. Match the following terms to their meanings: I. Wi-Fi A. a virus that changes its own code to avoid detection II. packet sniffer B. addresses are assigned out of available pool of IP addresses III. polymorphic virus C. also known as the 802.11 wireless standard IV. dynamic addressing D. a computer controlled by a hacker V. zombie E. a program that looks at each packet as it travels over the network Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty: Moderate 96. Match the following acronyms to their definitions: I. FTP A. Internet service provider II. UTP B. a protocol used on the Internet for sending and receiving files III. ISP C. a type of denial of service attack IV. DDOS D. type of cable V. IP E. part of the TCP/IP suite of protocols Answer: B, D, A, C, E Reference: Multiple locations in chapter Difficulty: Easy 97. Match the following terms to their meanings: Copyright © 2008 Prentice-Hall. All rights reserved. 19
  • 20. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses I. firmware A. a list of commands (mini program) that is executed II. computer virus B. a program that executes whenever the computer boots up III. script C. read-only memory (ROM) that has software written to it IV. Master Boot Record D. a short series of commands that automates repetitive tasks V. macro E. a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty: Moderate 98. Match the following acronyms to their definitions: I. WPA A. unique number assigned to the network adapter by the manufacturer II. SSID B. wireless security protocol III. MAC C. provides a means of wirelessly connecting to a network IV. WAP D. default network name used by a router V. WAN E. network made up of LANs Answer: B, D, A, C, E Reference: Multiple locations in chapter Difficulty: Challenging 99. Match the following terms to their meanings: I. bandwidth A. these devices handle data traffic between networks II. throughput B. these devices handle data traffic between nodes on the same network III. routers C. maximum speed at which data can be transmitted IV. switches D. a unique number assigned by the manufacturer to every NIC V. MAC address E. actual speed of data transfer Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty: Challenging 100. Match the following terms to their meanings: Copyright © 2008 Prentice-Hall. All rights reserved. 20
  • 21. Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses I. server A. two or more computers connected together via software so they can communicate II. client B. can be a computer, peripheral, or communication device III. network C. a network device that retransmits a signal to all nodes attached to it IV. node D. accomplishes specific tasks and makes requests on the network V. hub E. provides information, resources, and central control for functions on a network Answer: E, D, A, B, C Reference: Multiple locations in chapter Difficulty: Moderate Copyright © 2008 Prentice-Hall. All rights reserved. 21

×