Network that spans a city or large campus.
What is a MAN? Metropolitan Area Network
POP3
What is Post Office Protocol 3?
Page 351
Name 2 of 3 types of security threats
What are physical, people based, and software based?
Page 378
Optimal number of characters for password
What is 8?
Page 423
SOHO
What is Small/Office/Home Office computers?
Page 469
Server based networks are also known as this
What is a domain?
Page 308
Short range connectivity with peripheral devices
(key boards, mice, speakers, communication devices......)
What is Bluetooth?
Page 359
Method of circumventing the normal security system on a computer
What backdoor?
Page 396
This requires multiple pieces of information for you to log in
What is multi-factor?
Page 424
HTPC
What is Home Theater PC?
Page 472
This type of sharing does not involve servers
What is P2P? Peer to peer
Page 312
IMAP
What is Internet Message Protocol?
Page 352
port 143
Rogue application that enters the system or network disguised as another program
What is a Trojan Horse?
Page 394
Name a software component added to your browser to give it additional functionality.
What are Plugins, Toolbars, or Extensions?
Page 430
Connectors that go on ONE WAY are called this
What are keyed?
Page 475
Share permission that users can't change permissions, delete sub-folders or files or give themselves ownership
What is modify?
Page 318
Others Full control and read.
Occurs when someone connects to your device without your knowledge and has access to all of the data (pictures, contacts, emails, etc) on your device
What is Bluesnarfing?
Page 359
Bluejacking is sending harmless messages to your device via Bluetooth.
Exploits the enhancement made to many application programs such a Microsoft Word and Excel.
What is Macro?
Page 390
An extra, usually small browser window that appears automatically when you display a certain web page or click on a button on a web page
What is a Pop-up?
Page 447
McAfee and Norton
What are Security System Software?
Page 481
IaaS
What is Infrastructure as a Service?
Page 325
Placing 2 fingers together and then slow spreading them apart to zoom in
What is a pinch? (reverse pinch)
Page 345
Many viruses today are spread using this
What is email?
Page 391
Name 1 of 2 cardinal rules for suspicious email
What are NEVER open any attachments or NEVER click on hyperlinks?
Page 454
Name the 3 steps involved in Configuring Peripherials
What are Plug in the device, Install the driver, and Verify functionality?
Page 481