Chapter 5 ITCB

¡Supera tus tareas y exámenes ahora con Quizwiz!

attenuation

___ refers to the loss of intensity and clarity of the data signal being transmitted.

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

f

An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.

false

The two parts of a packet are the certificate and the key.

false

wireless

___ networks use radio signals that travel through the air to transmit data.

data validation

___ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

DDOS

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

truee

A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.

Firewall

A(n) ___ examines and blocks Internet traffic in order to protect your private network.

mis

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

RAID

A(n) ___ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

expert

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.

intranet

A(n) ___ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft Sharepoint.

false

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

falsee

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.

true.

An MIS system can provide different types of information or summaries to managers at different levels.

zombies

Computers which are under the external control of a hacker are known as:

bandwidth

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

wan

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.

Office automation system

In an office environment, many organizations set up a(n) ___ to perform various operations such as word processing, accounting, document management, or communications.

tape

Large organizations often use a(n) ___ library for backups and archives of their data.

t

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

enccryption

Many types of software and devices use ___ to scramble your data or communication.

false

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.

fa

Power failures are the primary cause of component failure in computer systems.

media

The means used to link together parts of a computer network are referred to as network:

tr

The network that connects the computers in a school's study center or library is considered a LAN.

ransomware

The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.

authorization

The security principle known as ___ gives individuals a certain level of access based on who they are.

authentication

The security principle known as ___ requires that individuals must confirm their identity.

hacker

Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

true

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

backups

Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.

f

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

The likelihood of user compliance

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

x

Which of the following is NOT one of the specifications of Wi-Fi technology?

who you know

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

5

Wi-Fi radio signals operate on either the 2.4 GHz or ___ GHz bands.

coaxial

___ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

twiisted pair

___ cable normally consists of four pairs of wires that are twisted around each other.

fault-tolerant

___ computers are able to continue their operation even when problems are present.

redundant

___ computers are ones that have multiple hardware systems performing the same task at the same time.

spyware

___ is a type of malware which is designed to report activity on your computer to another party.

scalability

___ is the capacity to provide increasing amounts of computing power, storage, and/or software.

data mining

___ is the discovery of new patterns or relationships between data.

___ software helps protect your computer from various types of malware.

anti-malware

Any step you take to ward off a threat is called a:

countermeasure

A(n) ___ is a central repository that contains stored or archived data gathered from multiple databases.

data warehouse

A ___ is a node on a network that serves as an entrance to another network.

gateway

A ___ provides multiple ports for connecting nodes.

hub

The information system that handles the processing and tracking of transactions is called a(n):

tps

A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.

true

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

true

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus


Conjuntos de estudio relacionados

Chemistry Chapter 9 Semester Study

View Set

Dental Hygiene Board Review 2018

View Set

Network Representations and Topologies

View Set

Ch.8 - Business Markets and Buying Behaviors

View Set

Chapter 19: International Diversification

View Set

8th Grade Social Studies Chapter 22 Study Quiz

View Set

Multiplying Fractions and Mixed Numbers

View Set