Term
What is the most common WAN circuit for a business? |
|
Definition
|
|
Term
What kind of network is used for bluetooth? |
|
Definition
PAN (Personal Area Network) |
|
|
Term
What is a router used for? |
|
Definition
It connects a LAN to a WAN and the WAN is connected to the internet. |
|
|
Term
What is a switch used for? |
|
Definition
It is used to connect multiple computers together on a LAN. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Voice over IP, Voice translated into data that can be sent across a network, usually a WAN, to recieve a varierty of benefits. |
|
|
Term
What are the components use in LAN? |
|
Definition
Ethernet (RJ45 and Cat5), NIC, and switches |
|
|
Term
|
Definition
Malicious programs that cause damage to a PC, but can't run or spread without being executed by a user. |
|
|
Term
|
Definition
A malicious software that finds its way into your PC through an open port. It can reproduce itself and spread on its own. |
|
|
Term
|
Definition
Using fake email or web pages to get imformation from someone for improper use. |
|
|
Term
|
Definition
When someone takes your personal information. |
|
|
Term
|
Definition
Are you really who you say you are? |
|
|
Term
|
Definition
|
|
Term
|
Definition
What you are able to do on the servers/network |
|
|
Term
|
Definition
Network Interface Card, connects your PC to the network through a cable. |
|
|
Term
What is used in a home network? A switch or a router? |
|
Definition
Trick question. They're both in the same unit. A switch would be used just for a LAN in the house and a router is used to connect it to the internet (WAN). |
|
|
Term
What are the negatives of a network? |
|
Definition
1) If the main server goes down, the whole network is down
2) No network is fully secure |
|
|
Term
What is an example of a network operating system? |
|
Definition
|
|
Term
What kind of cable is used to connect two computers in a LAN? |
|
Definition
Straight-through if the computers connect to a switch or hub.
Cross-over if they connect straight to each other. |
|
|
Term
What are the seven layers of the OSI Model? |
|
Definition
7) Application 6) Presentation 5) Session 4) Transfer 3) Network 2) Data 1) Physical
Another way to help remember this is:
All People Seem To Need Data Processing |
|
|
Term
What does IEEE stand for? |
|
Definition
Institute of Electrical and Electronics Engineers |
|
|
Term
What does TCP/IP stand for? |
|
Definition
Transmission Control Protocol/Internet Protocol |
|
|
Term
|
Definition
An inexpensive LAN architecture built into all Apple Macintosh Computers and laser printers. |
|
|
Term
|
Definition
A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. |
|
|
Term
What is a MAC address and which level of the OSI model does it belong to? |
|
Definition
A MAC address is a number used by network adapters to uniquely identify themselves on a LAN. MAC addresses are 12-digit hexadecimal numbers. In theory, they are like fingerprints. Only one device in the world will have that MAC address.
It belongs to the Physical layer of the OSI. |
|
|
Term
What is the command in command prompt that will show you your MAC address? |
|
Definition
ipconfig -all
or
ipconfig /all
They will both show you the same thing. |
|
|
Term
|
Definition
A group of 8 bits, often referred to as a byte. |
|
|
Term
How many octets are in an IP address? |
|
Definition
|
|
Term
What is the decimal range in each part of the IP address? |
|
Definition
|
|
Term
What is a subnet used for? |
|
Definition
It is an identifiably separate part of an organization's network. |
|
|
Term
What is the command in command prompt that will show you that subnet? |
|
Definition
|
|
Term
In IP addressing, how many octets must be the same to be on the same network? |
|
Definition
|
|
Term
|
Definition
It is a standard communications protocol embedded in software and hardware devices, intended for building a LAN. |
|
|
Term
How fast does ethernet run at? |
|
Definition
Different cables run at different speeds. There are:
10 MB 100 MB 1000 MB or 1 GB
|
|
|
Term
What is the base for idenifying the speed and common cable type for 100mb ethernet? |
|
Definition
|
|
Term
What is the difference between full and half duplex? |
|
Definition
With half duplex, only one machine can talk at a time.
With full duplex, multiple machines and talk at once. |
|
|
Term
What is an example of full duplex? |
|
Definition
Like two or more people talking on the phone at once. |
|
|
Term
What is an example of half duplex? |
|
Definition
Like walkie-talkies, only one person can talk at a time. |
|
|
Term
|
Definition
It is the amount of data that can be carried from one point to another in a given time period. |
|
|
Term
What does bps stand for in bandwidth? |
|
Definition
|
|
Term
What is the bottleneck affect in networking? |
|
Definition
It's like a plastic or glass bottle. It's wide at the bottom, but as you move up, it gets smaller and smaller until everything has to go through the same small opening. |
|
|
Term
What kind of cable is used commonly for ethernet? |
|
Definition
|
|
Term
Who made the OSI model and why? |
|
Definition
ISO (The International Organization for Standardization) and it was made so that every computer could talk to each other. |
|
|
Term
What is the best kind of cable for speed? |
|
Definition
|
|
Term
What kind of cable is used for TV cable? |
|
Definition
|
|
Term
What does UTP stand for in cables? |
|
Definition
|
|
Term
What does STP stand for in cables? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
How do you check your network status? |
|
Definition
1) Click start and go to control panel. 2) Click on Network connections. 3) Right click on your connection and go to status. |
|
|
Term
How do you install a network card? |
|
Definition
Turn off the computer, put the card in the appropriate slot, and turn on the computer to install the drivers. |
|
|
Term
What would you need to use to add wireless to your network? |
|
Definition
1) Wireless NIC cards 2) Wireless Routers |
|
|
Term
What are status indicators for networks? |
|
Definition
Shows how strong the connection is with your network |
|
|
Term
|
Definition
Techniques to make sure that data stored in a computer can't be read or compromised by anyone without authorization. |
|
|
Term
What are the eight things that a business owner would want to be implemented for reasonable security? |
|
Definition
1) Physical security 2) Anti-virus & anti-spyware software 3) Up to date patches on OS & applications 4) Usernames & passwords for access with logging of login/logouts 5) Firewall to protect us from the internet 6) If you are using wireless, wireless network security 7) System data backups in case of drive failure or a disaster 8) Video surveillance |
|
|
Term
What is a security policy? |
|
Definition
Anything that revolves around the policy. The policy documents who can do what, when, how, how to be logged, verified, tested, and retested. |
|
|
Term
Which of the four steps is the end of the security wheel?
A) Implement B) Monitor C) Manage D) Access |
|
Definition
Trick question, there is no end to the cycle because you're continuously changing the security to make it better. |
|
|
Term
What are the four parts of the security wheel? |
|
Definition
1) Implement 2) Monitor 3) Manage 4) Access |
|
|
Term
What does the security wheel revolve around? |
|
Definition
|
|
Term
|
Definition
Encryption is the conversion of data into a form, called a ciphertext, that can't be easily understood by unauthorized people. |
|
|
Term
What are the three types of encryption? |
|
Definition
1) Hashing 2) Symmetric keys 3) Asymmetric keys |
|
|
Term
How is each different encryption different?
Hashing Symmetric keys Asymmetric keys |
|
Definition
Hashing - Converting a message into numbers.
Symmetric keys - The same key is used on each side ot protect the data, called the private key.
Asymmetric keys - There are public & privite keys, only a message encrypted with the public key can be unencrypted with the corresponding private key. |
|
|
Term
Why do we always backup data? |
|
Definition
In the event of a failure or a disaster. |
|
|
Term
What is social engineering? |
|
Definition
Acquiring information or access by talking to someone and, usually, tricking them |
|
|
Term
What is an incident control policy? |
|
Definition
If someone gets into something that they aren't suppose to be getting in, you have to log it, and document what you did to fix the problem. |
|
|
Term
What are redudant systems? |
|
Definition
If one server goes down, there's a switch that can be activated to bring the network back up from another server that mirrors the one that went down. |
|
|
Term
What does the AAA stand for in the computer security? |
|
Definition
Accounting Authorization Authentication |
|
|
Term
What are smart cards used for? |
|
Definition
A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data. Can be used for authentication. |
|
|
Term
What is a key fob used for? |
|
Definition
Anything on your key ring that isn't a key, like your car door opener, also used for authentication and access, usually with digital displays on them. |
|
|
Term
|
Definition
Life or body measurements
Examples: Hand print, Finger print, Retinal |
|
|
Term
|
Definition
Programs that run and keep track of what you do and what websites you visit. The info is sent back to someone so that it can be sold. |
|
|
Term
|
Definition
A trojan is a program that installs malicious software while under the disguise of doing something else. |
|
|
Term
|
Definition
A rootkit is a general description of a set of programs which work to subvert control of an operating system from its legitimate operators. |
|
|
Term
What are the four things used to protect against attacks? |
|
Definition
1) Anti-virus and anti-spyware updates 2) OS updates 3) Firewall 4) Update often |
|
|
Term
What is a way to ensure that OS patches stay updated? |
|
Definition
Set the computer to do automatic updates. |
|
|
Term
What is a security appliance? |
|
Definition
|
|
Term
What kind of file system security is on your computer? |
|
Definition
|
|
Term
Which kind of network is more secure?
Wireless or Ethernet LAN? |
|
Definition
|
|
Term
What are the four of the six measures recommended to do to ensure wireless security? |
|
Definition
1) Enable firewall 2) Disable the DHCP and use the static IP 3) Change the SSID 4) Disable the SSID broadcast 5) Use MAC filtering 6) Change default user name and password 7) Update firmware |
|
|
Term
What does SSID stand for? |
|
Definition
|
|