Term
A wireless network begins with an __ abbreviated as AP. |
|
Definition
|
|
Term
AP includes a radio that _____ and _____, that operates 2.4Ghz or 5Ghz radio band. |
|
Definition
|
|
Term
Other wireless nodes in a network are called? |
|
Definition
|
|
Term
If an access point (AP) within that range picks up the probe request, the AP broadcasts an acknowledgement and the two go trough whatever ____ _____ _____ the network has set up. |
|
Definition
Security payment arrangement |
|
|
Term
If two APs reply to the probe, the laptop will use whichever has the _____ signal. |
|
Definition
|
|
Term
When a router receives a packet from the Internet, it strips off an ______ and addresses the outer shell. |
|
Definition
|
|
Term
What are the 3 parts of packet? |
|
Definition
Header, payload, trailer(footer) |
|
|
Term
Networks can extend beyond the range of routers, provided there are occasional _____ _____. |
|
Definition
|
|
Term
Area where 802.11 networks are opened to the public? |
|
Definition
|
|
Term
Wired networks have speeds up to? |
|
Definition
|
|
Term
Wireless networks speeds typically are ___ or ___ |
|
Definition
|
|
Term
What are the 4 IEEE wireless standards? |
|
Definition
802.11b, 802.11a, 802.11g, 802.11n |
|
|
Term
What are the speeds in a 802.11a and 802.11g standards. |
|
Definition
|
|
Term
What are the speeds in a 802.11b standard? |
|
Definition
|
|
Term
What are the speeds in a 802.11n standard. |
|
Definition
|
|
Term
|
Definition
A virus is a type of program that can replicate itself by making copies of itself. |
|
|
Term
Replication is part of a what? |
|
Definition
Virus- Inserts copies of itself into other programs files. |
|
|
Term
Event Watching is part of? |
|
Definition
Virus- Every time a virus runs, it checks for certain conditions. When conditions are met, it delivers its destructive payload. Usually a specific date. |
|
|
Term
Camouflage is part of what? |
|
Definition
Virus- Stealth viruses disguise themselves to avoid detection by anti-virus software. |
|
|
Term
Delivery is part of what? |
|
Definition
Virus- Payload can be harmless or destructive erasing or scrambling files. |
|
|
Term
Most 4 common types of viruses? |
|
Definition
exe, email, worms, trojans. |
|
|
Term
What software inspects the master boot record, program files, and macro code? |
|
Definition
|
|
Term
______ ________ look for sections of code triggered by time or date events, routines to search for files, as well as, disk writes that bypass the operating system. |
|
Definition
Heuristic detectors (Heuristic-refers to experience-based techniques for problem solving, learning, and discovery. AN EDUCATED GUESS) |
|
|
Term
|
Definition
Software installed via the internet on a computer without the user's knowledge and used to send information about the user to another computer |
|
|
Term
What uses a backchannel to send information found on your computer? |
|
Definition
|
|
Term
Software contained in a program that automatically plays or displays advertising material on a computer after the software is installed is? |
|
Definition
|
|
Term
What differentiates adware from other shareware? |
|
Definition
Is primarily advertising-supported. |
|
|
Term
|
Definition
Sending unsolicited bulk email. |
|
|
Term
Who sends out automated spiders across the Internet that crawl across Web pages looking for email addresses? |
|
Definition
|
|
Term
What is the name for people who are able to exploit a system or gain unauthorized access. |
|
Definition
|
|
Term
What type of firewall is the best? |
|
Definition
|
|
Term
What does Hijacking change? |
|
Definition
|
|
Term
|
Definition
Computer hardware or software that prevents unauthorized access to private data by outside computer users. |
|
|
Term
What are the 3 main types of firewall rules? |
|
Definition
Packet filtering, Proxy, stateful inspection(SPI) |
|
|
Term
What is Stateful Inspection (SPI) |
|
Definition
The firewall compares key parts of each packet to a database of known safe data. (Also known as dynamic packet filtering) |
|
|
Term
|
Definition
Analyzes the incoming and outgoing packets and letting them pass or halting them based on the IP addresses of the source and destination |
|
|
Term
|
Definition
Examines all data based on the filtering rules and only forwards packets that obey the rules. |
|
|
Term
How many IP addresses can a normal router issue? |
|
Definition
|
|
Term
What is the minimum processor speeds for CHSI? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Resetting a router will not change and advanced configuration settings. |
|
Definition
|
|
Term
A gateway is a combination of router and modem using a configuration file? True or False? |
|
Definition
|
|
Term
Which wireless standard is backwards compatible? |
|
Definition
|
|
Term
Tri-mode/Dual band routers support _____ how many PC's? |
|
Definition
|
|
Term
Internet is an example of a? |
|
Definition
|
|
Term
|
Definition
Temporal key integrity protocol |
|
|
Term
Comcast uses these common firewall technologies? |
|
Definition
NAT and SPI (Stateful Packet Inspection) |
|
|
Term
Preferred separation for closed wireless networks is _____ Mhz? |
|
Definition
|
|
Term
Whats does NAT stand for? |
|
Definition
Network address translation |
|
|
Term
Memory Resident anti-virus software does? |
|
Definition
Installs programs in RAM that continue to operate in the background while other software apps are running |
|
|
Term
|
Definition
Nonfunctioning changing sections of fake code interspersed among working sections of a virus |
|
|
Term
|
Definition
Look at the contents of the boot record, programs, and macros for telltale sections of code that match viruses contained in a table |
|
|
Term
What is an example of automated troubleshooting? |
|
Definition
Using the network diagnostic tool to check IP connectivity |
|
|
Term
What is one of the reasons why 2.4 GHz is a commonly used frequency? |
|
Definition
|
|
Term
The CHSI minimum requirement for memory? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Personal Computer Memory Card International Association |
|
|
Term
What refers to how quickly computers on a network can communicate and share information? |
|
Definition
|
|
Term
|
Definition
This error is indicitive of a major problem with the operating system and the best solution is to reinstall windows. (bsod) |
|
|
Term
|
Definition
|
|