click below
click below
Normal Size Small Size show me how
Computer Literacy
Quiz Prep
| Question | Answer |
|---|---|
| What are the 3 types of P2PNet? | 1. Wired ethernet2. Wireless ethernet3. Powerline net |
| What is a packet sniffer? | A program that looks at each packet as it travels on the internet, for hackers. |
| How long can ethernet utp cables run? | 328 feet |
| What is the max range of wireless devices? | 250 feet |
| What is the most popular transmission media option for wired ethernet nets? | utpunshielded twisted pair |
| How long can utp cables run with repeaters? | 600 feet |
| What is Trojan Horse? | A program that appears to be useful but does something malicious. |
| What does SSID do? | Service Set Identifiera default network name for routers |
| How are data transfer rates and throughtput measured in? | megabits per secondmbps |
| What is a peer-to-peer network? | A local network the most common where nodes can connect to each other and communicate |
| What are black-hat hackers? | Hackers that hack for criminal reasons |
| What is a router? | Navigation device that transfers data between two or more networks |
| Can linux use P2P networks? | yes |
| What are boot sector viruses? | Viruses that replicate themselves into the Master Boot Record of a hard drive |
| Is a utp cable difficult to install? | No more difficult to install than a phone cable |
| What are examples of NOS (Network Operating System)? | 1. Windows Vista Enterprise2. Windows XP Professional3. Windows Server 20034. Novell Netware |
| What are two ways networks are run? | locally and centrally |
| What is a Master Boot Record? | A program that executes whenever a computer boots up, ensuring virus will be loaded into memory immediately. |
| What are logic bombs? | Viruses thatare triggered when certain logical condiditons are met (like opening files) |
| What 802-11 standard came out in 2008? | 802.11n |
| What network is used by common versions of Windows? | P2P |
| What are time bombs? | Viruses that are triggered at a certain time or date. |
| What are zombies? | Computers that hackers have almost complete control over. |
| Nodes on P2P networks are called what? | peers |
| What are script? | Series of commands and mine programs that execute without your knowledge. |
| What is a computer network? | Two or more computers connected |
| What are macro viruses? | Viruses that attach to documents such as Word and Excel that use macros. |
| What are the 3 groups that viruses are classified as? | Polymorphic virusesMultipartite virusesSelf viruses |
| What is DoS? | Denial of Service attack |
| What are Polymorphic viruses? | Viruses that periodically change their own codes to avoid detection. |
| What are normal telephone wires called? | Twisted pair cable (made out of copper) |
| What is the world's largest network? | The internet |
| What are switches? | Traffic cops than send data to the right node. |
| What is the 802.11 wireless standard also called? | wi-fi |
| Which virus usually affects only one certain type of file? | Polymorphic viruses! |
| What are multipartite viruses? | Viruses designed to infect multiple file types |
| What is the cable that connecgts to a cable tv or cable box? | coaxial cable (single wire) |
| What standard is currently based for wireless networks in the US? | 802.11 standard |
| What does DDoS mean? | Distributed Denial of Service attack |
| Can client/server networks be configured for home use? | yes |
| What are nodes? | Devices that are connected to a network |
| What is a Logical Port? | A virutal gateway. |
| What is the throughput? | The actual speed of data transfer. |
| What is data transfer rate also called? | bandwidth |
| What are self viruses? | Viruses that temporarily erase their codes from files in order to hide in the computer |
| How often should you run a virus check? | At least once a week |
| What are fiber-optic cables made of? | Plastic or glass fibers |
| What are white-hat hackers? | Hackers that break into computers for the challenge and not to steal or wreak havoc to systems |
| What is an administered network? | It refers to the way a network is run |
| What are some popular firewalls? | Norton (personal firewall)McAfee (firewall)ZoneAlarmBlackICE PC protection |
| What are the three 802.11 standards currently used? | 802.11a802.11b802.11g802.11n |
| What are worms? | Different than viruses they travel between systems through networks |
| What are encrypton viruses? | The newes and form of virus that searches for common data files |
| What are script kiddies? | Hackers that don't use sophisticated equipment to hack computers |
| What is the data transfer rate and bandwidth? | They are the max speed at which data can be transmitted between nodes. |
| What are smart agents? | Firewall programs that automatically stop attacks. |
| What are some manufacgturers that make routers that double as firewalls? | LinksysD-LinkNetgear |
| What are 6 things you should do when securing a wireless network? | 1. Change network name2. Disable SSID Broadcast3. Change default password on router4. Turn on security protocals5. Implement media access control6. Apply firmware upgrades |
| What are network interface cards? (NIC's) | Adapters installed in the computers and peripherals as expansion cards. |
| How are nodes connected to each other and to the network? | Transmission media |