Term
| A wireless network begins with an __ abbreviated as AP. |
|
Definition
|
|
Term
| AP includes a radio that _____ and _____, that operates 2.4Ghz or 5Ghz radio band. |
|
Definition
|
|
Term
| Other wireless nodes in a network are called? |
|
Definition
|
|
Term
| If an access point (AP) within that range picks up the probe request, the AP broadcasts an acknowledgement and the two go trough whatever ____ _____ _____ the network has set up. |
|
Definition
| Security payment arrangement |
|
|
Term
| If two APs reply to the probe, the laptop will use whichever has the _____ signal. |
|
Definition
|
|
Term
| When a router receives a packet from the Internet, it strips off an ______ and addresses the outer shell. |
|
Definition
|
|
Term
| What are the 3 parts of packet? |
|
Definition
| Header, payload, trailer(footer) |
|
|
Term
| Networks can extend beyond the range of routers, provided there are occasional _____ _____. |
|
Definition
|
|
Term
| Area where 802.11 networks are opened to the public? |
|
Definition
|
|
Term
| Wired networks have speeds up to? |
|
Definition
|
|
Term
| Wireless networks speeds typically are ___ or ___ |
|
Definition
|
|
Term
| What are the 4 IEEE wireless standards? |
|
Definition
| 802.11b, 802.11a, 802.11g, 802.11n |
|
|
Term
| What are the speeds in a 802.11a and 802.11g standards. |
|
Definition
|
|
Term
| What are the speeds in a 802.11b standard? |
|
Definition
|
|
Term
| What are the speeds in a 802.11n standard. |
|
Definition
|
|
Term
|
Definition
| A virus is a type of program that can replicate itself by making copies of itself. |
|
|
Term
| Replication is part of a what? |
|
Definition
| Virus- Inserts copies of itself into other programs files. |
|
|
Term
| Event Watching is part of? |
|
Definition
| Virus- Every time a virus runs, it checks for certain conditions. When conditions are met, it delivers its destructive payload. Usually a specific date. |
|
|
Term
| Camouflage is part of what? |
|
Definition
| Virus- Stealth viruses disguise themselves to avoid detection by anti-virus software. |
|
|
Term
| Delivery is part of what? |
|
Definition
| Virus- Payload can be harmless or destructive erasing or scrambling files. |
|
|
Term
| Most 4 common types of viruses? |
|
Definition
| exe, email, worms, trojans. |
|
|
Term
| What software inspects the master boot record, program files, and macro code? |
|
Definition
|
|
Term
| ______ ________ look for sections of code triggered by time or date events, routines to search for files, as well as, disk writes that bypass the operating system. |
|
Definition
Heuristic detectors (Heuristic-refers to experience-based techniques for problem solving, learning, and discovery. AN EDUCATED GUESS) |
|
|
Term
|
Definition
| Software installed via the internet on a computer without the user's knowledge and used to send information about the user to another computer |
|
|
Term
| What uses a backchannel to send information found on your computer? |
|
Definition
|
|
Term
| Software contained in a program that automatically plays or displays advertising material on a computer after the software is installed is? |
|
Definition
|
|
Term
| What differentiates adware from other shareware? |
|
Definition
| Is primarily advertising-supported. |
|
|
Term
|
Definition
| Sending unsolicited bulk email. |
|
|
Term
| Who sends out automated spiders across the Internet that crawl across Web pages looking for email addresses? |
|
Definition
|
|
Term
| What is the name for people who are able to exploit a system or gain unauthorized access. |
|
Definition
|
|
Term
| What type of firewall is the best? |
|
Definition
|
|
Term
| What does Hijacking change? |
|
Definition
|
|
Term
|
Definition
| Computer hardware or software that prevents unauthorized access to private data by outside computer users. |
|
|
Term
| What are the 3 main types of firewall rules? |
|
Definition
| Packet filtering, Proxy, stateful inspection(SPI) |
|
|
Term
| What is Stateful Inspection (SPI) |
|
Definition
| The firewall compares key parts of each packet to a database of known safe data. (Also known as dynamic packet filtering) |
|
|
Term
|
Definition
| Analyzes the incoming and outgoing packets and letting them pass or halting them based on the IP addresses of the source and destination |
|
|
Term
|
Definition
| Examines all data based on the filtering rules and only forwards packets that obey the rules. |
|
|
Term
| How many IP addresses can a normal router issue? |
|
Definition
|
|
Term
| What is the minimum processor speeds for CHSI? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Resetting a router will not change and advanced configuration settings. |
|
Definition
|
|
Term
| A gateway is a combination of router and modem using a configuration file? True or False? |
|
Definition
|
|
Term
| Which wireless standard is backwards compatible? |
|
Definition
|
|
Term
| Tri-mode/Dual band routers support _____ how many PC's? |
|
Definition
|
|
Term
| Internet is an example of a? |
|
Definition
|
|
Term
|
Definition
| Temporal key integrity protocol |
|
|
Term
| Comcast uses these common firewall technologies? |
|
Definition
| NAT and SPI (Stateful Packet Inspection) |
|
|
Term
| Preferred separation for closed wireless networks is _____ Mhz? |
|
Definition
|
|
Term
| Whats does NAT stand for? |
|
Definition
| Network address translation |
|
|
Term
| Memory Resident anti-virus software does? |
|
Definition
| Installs programs in RAM that continue to operate in the background while other software apps are running |
|
|
Term
|
Definition
| Nonfunctioning changing sections of fake code interspersed among working sections of a virus |
|
|
Term
|
Definition
| Look at the contents of the boot record, programs, and macros for telltale sections of code that match viruses contained in a table |
|
|
Term
| What is an example of automated troubleshooting? |
|
Definition
| Using the network diagnostic tool to check IP connectivity |
|
|
Term
| What is one of the reasons why 2.4 GHz is a commonly used frequency? |
|
Definition
|
|
Term
| The CHSI minimum requirement for memory? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Personal Computer Memory Card International Association |
|
|
Term
| What refers to how quickly computers on a network can communicate and share information? |
|
Definition
|
|
Term
|
Definition
| This error is indicitive of a major problem with the operating system and the best solution is to reinstall windows. (bsod) |
|
|
Term
|
Definition
|
|