Computer Networks and Security Concepts Quiz
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Match the following types of computer networks with their definitions:

PAN = Used for communication among devices close to one person LAN = Nodes located within a small geographical area HAN = A specific type of LAN located in a home MAN = Provides access to a specific geographical area, such as an entire city

Match the following advantages of computer networks with their descriptions:

Sharing an Internet connection = Allows multiple devices to access the Internet Sharing printers = Enables multiple computers to use the same printer Sharing files = Transferring files without portable storage devices Common communications = Different operating systems can communicate on the same network

Match the following terms related to data transmission with their meanings:

Data transfer rate = Maximum speed data can be transmitted Throughput = Actual speed data is transferred Mbps = Measurement unit for speed indicating megabits per second Gbps = Measurement unit for speed indicating gigabits per second

Match the following basic hardware devices necessary for networks with their purposes:

<p>Router = Connects multiple networks and directs data traffic Switch = Connects devices within a network to facilitate communication Modem = Converts digital data for transmission over analog systems Access Point = Allows wireless devices to connect to a wired network</p> Signup and view all the answers

Match the following aspects of wireless networks with their considerations:

<p>Setup = Time required to establish a network Security = Measures to protect the network from unauthorized access Range = Distance from which devices can connect to the network Interference = Potential issues from other electronic devices affecting connectivity</p> Signup and view all the answers

Match the following Internet access types with their descriptions:

<p>Broadband = High-speed Internet access Dial-up = Slower Internet access method Fiber-optic = Standard wired broadband technology Satellite = Used mainly in rural areas</p> Signup and view all the answers

Match these Internet connectivity methods with their connection types:

<p>WiFi = Wireless home network Mobile hotspot = Access while away from home Ethernet = Wired connection standard 4G/5G = Mobile broadband access</p> Signup and view all the answers

Match the following devices with their main functions:

<p>Router = Establishes WiFi at home Switch = Acts like a traffic signal on a network Network-attached storage (NAS) = Centralized data storage Home network server = Stores and shares files across the network</p> Signup and view all the answers

Match the following terms with their meanings:

<p>Data plan = Internet connectivity plan ISP = Internet service provider Network-ready device = Can connect directly to a network Ethernet standard = Latest standard for efficient networking</p> Signup and view all the answers

Match the types of routers with their characteristics:

<p>Apple router = Optimized for Apple computers AirPort Express = Supports iOS, macOS, and Windows Old router = May require an upgrade from ISP Cable router = Uses cables for broadband access</p> Signup and view all the answers

Match the following wireless technologies with their range characteristics:

<p>Wi-Fi 4 = Maximum range of 350 feet Wi-Fi 5 = Maximum range of 350 feet Mobile broadband = Connects through cellular networks Satellite Internet = Best for remote areas</p> Signup and view all the answers

Match these broadband technologies with their types:

<p>Cable = Wired broadband technology DSL = Digital subscriber line technology Fiber-optic = Uses light for data transmission Satellite = Transmits data via satellite signals</p> Signup and view all the answers

Match the following types of malware or security concepts with their descriptions:

<p>Scareware = Convinces users they have viruses to sell fake solutions Firewall = Protects computers from unauthorized access Antivirus software = Detects and mitigates computer viruses Biometric authentication = Uses unique personal characteristics for identification</p> Signup and view all the answers

Match the following antivirus software companies with their products:

<p>Symantec = Norton Security Suite Trend Micro = Trend Micro Internet Security Avast = Avast Antivirus McAfee = McAfee Total Protection</p> Signup and view all the answers

Match the following security practices with their benefits:

<p>Regular updates = Protects against vulnerabilities in operating systems Strong passwords = Makes it difficult for hackers to gain access Network address translation = Assigns internal IP addresses for security Quarantining = Isolates infected files to prevent spread</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Virus signature = Unique portion of code for a specific virus Inoculation = Recording key attributes of files for protection Drive-by download = Automatic download exploiting OS vulnerabilities Packet filtering = Blocks data requests to specific ports on a network</p> Signup and view all the answers

Match the following components of Internet security with their functions:

<p>Windows Firewall = Displays firewall status and settings Logical port blocking = Prevents access to certain network ports Antivirus protection = Included in comprehensive security packages Latest security patches = Fixes vulnerabilities in operating systems</p> Signup and view all the answers

Match the following common password practices with their descriptions:

<p>Minimum length = At least eight characters Character diversity = Use of uppercase, lowercase, numeric, and symbols Password uniqueness = Avoid using the same password for multiple accounts Password manager = Tool to securely store and generate passwords</p> Signup and view all the answers

Match the following descriptions with their related technologies:

<p>Fingerprint scanner = Biometric device for user identification Virus removal tools = Used in response to scareware tactics Real-time protection = Constantly guards against malware threats Internet security suite = A package that includes antivirus and firewall</p> Signup and view all the answers

Match the following security risks with their implications:

<p>Phishing = Tricks users into revealing personal information Spyware = Secretly monitors and gathers user data Ransomware = Locks user files and demands payment for access Adware = Displays unwanted advertisements to users</p> Signup and view all the answers

Match the following computer security terms with their primary purpose:

<p>Packet filtering = Controls access based on data packets Physical security = Protects hardware from theft or damage User training = Educates users about best security practices Incident response = Plans for addressing security breaches</p> Signup and view all the answers

Match the following malware types with their descriptions:

<p>Keylogger = Captures all keystrokes made on a computer Trojan horse = Appears useful but performs malicious actions Zombie = A computer controlled by a hacker Virus = Attaches to a computer program to self-replicate</p> Signup and view all the answers

Match the following attack types with their characteristics:

<p>DoS = Denial of service attack from a single source DDoS = Denial of service attack from multiple sources Botnet = Group of software running on zombie computers Backdoor = Allows hackers to gain unauthorized access</p> Signup and view all the answers

Match the following types of viruses with their triggers:

<p>Boot-sector virus = Replicates on the master boot record Logic bomb = Triggered by specific conditions Time bomb = Triggered by the passage of time Worm = Spreads independently of host files</p> Signup and view all the answers

Match the following descriptions with malware characteristics:

<p>Exploit kits = Search for vulnerabilities on servers Script virus = Executed as a series of commands E-mail virus = Uses address book to spread Macro virus = Automatically executes commands in documents</p> Signup and view all the answers

Match the following definitions with the correct terms:

<p>Denial of Service = Shuts down access to legitimate users Backdoor program = Gives control over a computer Rootkit = Enables covert control by hackers Virus = Replicates itself into host files</p> Signup and view all the answers

Match the following malware types with their primary function:

<p>Virus = Replicates and attaches to other programs Trojan horse = Disguises itself as legitimate software Keylogger = Records user keystrokes Worm = Self-replicates across networks</p> Signup and view all the answers

Match the following characterizations with their corresponding malware activities:

<p>Zombie = Used for launching attacks Exploit kit = Looks for system vulnerabilities DDoS = Floods system requests from multiple sources Logic bomb = Acts upon certain logical conditions</p> Signup and view all the answers

Match the following malware types with their effect:

<p>Worm = Spreads without user intervention Time bomb = Triggers based on date or time Macro virus = Executes in specific applications E-mail virus = Spreads through email contacts</p> Signup and view all the answers

Study Notes

Technology in Action - Chapter 7: Networking: Connecting Computing Devices

  • This chapter covers computer networks, their advantages and disadvantages.
  • Networks are defined by distance, with different types like PAN, LAN, HAN, MAN, and WAN.
  • Transmission media for networks include wireless and wired options (e.g., UTP, coaxial, fiber-optic cables).
  • Key hardware devices for networks are network adapters (NICs), modems, routers, and switches.
  • Network software includes operating systems for different network types (e.g., P2P, client/server).
  • Broadband access options for the internet are described.

Learning Objectives

  • Describe computer networks and their advantages and disadvantages.
  • Explain the different types of network definitions.
  • Describe network transmission media types.
  • Describe and explain the necessary network hardware.
  • Describe and explain the types of network software.
  • Summarize the different broadband options for internet access.
  • Summarize wireless internet access methods.
  • Explain considerations before creating a home network.
  • Describe the process of setting up a home network.
  • Describe potential problems with wireless networks and how to avoid them.
  • Describe the process of securing wireless home networks.

Networking Fundamentals

  • A computer network connects two or more computers for communication.
  • Each device on a network is a node, which can be a computer, peripheral, or network device.
  • Networks offer several benefits, including sharing resources (Internet, printers).

Network Architectures

  • Networks are classified by distance (PAN, LAN, HAN, MAN, WAN).
  • Networks are also classified by administration levels (client/server, peer-to-peer).
  • Networks are categorized by protocols (e.g., Ethernet, Wi-Fi, Gigabit Ethernet).

Network Components

  • Networks need a means of connections (cables or wireless tech).
  • Special hardware devices (adapters, modems, routers, switches) enable communication and data transfer.
  • Software facilitates network operation.

Transmission Media

  • Transmission media establishes a communication channel between nodes.
  • Wired networks use UTP, coaxial, and fiber-optic cables.
  • Wireless networks use radio waves.

Basic Network Hardware

  • Each node needs a network adapter (NIC).
  • Broadband connections require modems for signal translation.
  • Routers forward data between networks.
  • Switches manage network traffic.

Network Software

  • P2P networks use operating systems to support direct node communication.
  • Client/server networks use specialized network operating systems (NOS) on servers for centralized communication.

Connecting to the Internet

  • Home networks share internet connections.
  • Internet providers (ISPs) offer broadband, cellular, and dial-up choices.
  • Broadband is often a preferred method.

Installing and Configuring Home Networks

  • Planning involves listing devices, using current standards, and using the latest equipment.
  • Routers are optimized for specific device types (e.g., Apple devices).
  • Network switches manage traffic and facilitate communication.
  • Specialized home networking devices (NAS devices, home network servers) can be used.

Troubleshooting Wireless Networks

  • Maximum Wi-Fi range is typically 350 feet.
  • Walls, floors, and large metal objects decrease signal strength.
  • Placing an access point and adjusting settings in areas with weak signals can improve performance.
  • Using wireless range extenders can improve range and signal strength.

Managing and Securing Wireless Networks

  • Protecting wireless networks involves changing security protocols, network names (SSID), and passwords.
  • Employing proper encryption, controlling signal range maintaining up-to-date firmware, and limiting remote access can enhance security.

Identity Theft and Hackers

  • Cybercrime includes criminal activity perpetrated using computers, networks, and the internet.
  • Common types of cybercrimes, such as FBI-related scams, identity theft, and fraud, are often financially damaging.
  • Hackers may use various techniques, including the use of Trojan horses, backdoor programs, rootkits, denial-of-service (DoS) attacks, botnets, exploit kits, and logical ports to gain unauthorized access or damage systems.

Computer Viruses

  • Viruses are programs that attach to existing software to spread across multiple computers.
  • Types of viruses include boot sector, logic bombs (time bombs) worms, script/macro viruses, email viruses, and encryption viruses.
  • Methods used to avoid detection for various virus types include polymorphism, multi-part, and stealth techniques.

Online Annoyances and Social Engineering

  • Malware is software with malicious intent. This includes (but is not limited to) adware, spyware, keystroke loggers.
  • Spam is unwanted email.
  • Cookies are small text files that websites store on a user's computer for various purposes.
  • Social engineering is a technique that uses social skills to persuade individuals to divulge sensitive information.
  • Phishing and Pharming are used in social engineering to obtain sensitive data.
  • Scareware is malicious software that aims to convince users that something is wrong with their device to gain money.

Restricting Access to Your Digital Assets

  • Firewalls protect computers from unauthorized access.
  • Antivirus software can detect and protect against malicious programs and viruses.
  • Security protocols and measures, along with regularly updated software and strong passwords/biometrics, can help prevent and control virus infections and malicious access.

Life Cycle of a Program

  • Understanding Programming: Some tasks are complex, needing creative thought, others easily automated (repetitive or using electronic information via clear steps).
  • Importance of Programming: Programming delivers strong salaries within plentiful opportunities in diverse industries.
  • Life Cycle of an Information System: An information system includes data, people, procedures, hardware, and software to achieve a common goal. System Development Life Cycle (SDLC) outlines the stages of developing and maintaining these systems. Steps such as identifying problems, analyzing them, designing solutions, development, testing, installation and maintenance are key parts of the process.
  • Life Cycle of a Program (Programming Development Life Cycle (PDLC)): This outlines the stages for creating software and includes stages such as describing the problem, making a plan, coding, debugging and testing.
  • Algorithm Development: Algorithms are the steps that a program must follow to accomplish a task using techniques like flowcharts and pseudocoding.
  • Coding: Translating algorithms into instructions in a programming language (like C or Java) is the coding stage, using tools and techniques like Integrated Development Environments (IDEs).
  • Debugging of Code: The process involves detecting, controlling and resolving errors during runtime.
  • Testing and Documentation: Comprehensive testing, including internal and external testing (along with quality assurances) is very important, followed by documentation leading to "General Availability" or release of the product. The programming language, required space, resources, the target application are important considerations when choosing a programming language.
  • Many Programming Languages: Many languages are used, and certain languages often dominate in particular industries that may include job specifics
  • Selecting the Right Language: Selection depends on space availability, speed requirements, organizational resources, the type of application and visual programming languages tools (e.g., Scratch or App Inventor).
  • Exploring Programming Languages: Languages like Java and C# are used for specific purposes, and are used in many application types (e.g. dealing with data across multiple devices or platforms), while Objective C and Swift are used for specific systems (e.g. app development for Mac OS and iPhones).

Databases

  • Databases are collections of related data that can be stored, sorted, organized and queried.
  • Flat databases often present problems with data redundancy and inconsistency.
  • Relational databases organize data into linked tables using keys for relationships (one-to-many, one-to-one and many-to-many).
  • Data output and extraction can use filters or queries.
  • DBMS (Database Management Systems) software supports various operations such as storing and defining data; viewing, adding, deleting, and modifying data; querying data and outputting data, along with various field types and other properties.
  • Techniques like Data Mining and Data Warehousing and Storage are used for advanced analysis of large amounts of data to understand trends and customer behavior.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Computer Networks PDF

Description

Test your knowledge on various types of computer networks, their advantages, data transmission terms, and basic hardware devices. Additionally, explore aspects of wireless networks and different Internet access methods. This comprehensive quiz will assess your understanding of both networking and security concepts.

Use Quizgecko on...
Browser
Browser