CIS Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Match the term with its definition and characteristics. 1. Disaster Recovery Plan 2. Business Continuity Plan A detailed process for recovering information or a system in the event of a catastrophic disaster. Details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.

1 2

Match each term with its definition and characteristics. 1. Astroturfing 2. Deepfake 3. Fake News An example is a tobacco company pushing information that tobacco is neither addictive nor dangerous. "Photoshopping" to add, remove or change images. Is now being applied to videos involving both image and sound. A deceptive tactic of simulating grassroots support for a product, cause etc. undertaken by people or organizations with an interest in shaping public opinion. An image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said. Misleading news designed to promote a narrative.

1 2 1 2 3

Match the term with its definition and examples. 1. Authentication 2. Authorization Can be done with passwords, tokens or biometrics. Accomplished using abilities such as file access, hours of access and amount of allocated storage space. The process of providing a user with permission manipulate and use information within a system. The process of providing a user with permission to see information within a system. Accomplished using passwords, biometrics and tokens. A method for confirming the identity of a computer user.

1 2 2 2 1 1

Match the label with its definition, characteristics or examples. 1. Astroturfing 2. Fake News 3. Deepfake A deceptive tactic of simulating grassroots support for a product, cause, etc., undertaken by people or organizations with an interest in shaping public opinion. Misleading information about events or situations designed to promote a narrative. An image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.

1 2 3

Match the terms with associated concepts. 1. Authentication and Authorization 2. Prevention and Resistance 3. Detection and Response used to determine identities and permissions stop intruders from accessing and reading data detection of intruders by monitoring network traffic/intruders

1 2 3

Match the terms with their characteristics: Tend to open new markets and destroy old ones 1. Digital Darwinism 2. Disruptive Technology 3. Sustaining Technology Tend to open new markets and destroy old ones What's best for the current business might not be what's best for it in long term Tend to provide us with better, faster, and cheaper products in established markets

2 1 3

Match the terms with associated concepts. 1. Asymmetric key encryption 2. Symmetric key encryption 3. One-way encryption Using the same key to encrypt and decrypt a message. Allows people to exchange secret messages without ever having met to exchange a key A hash function that generates a digital fingerprint of a message is an example of this Encryption that uses a pair of keys, one called a public key and the other a private key.

2 1 3 1

Match the CIA triad to the methods and techniques used to ensure them: 1. Confidentiality 2. Integrity 3. Availability One way encryption checksums (hashes) Biometric Verification preparing for fast disaster recovery with backups and business continuity plans Two-Factor Identification File permissions promptly applying system upgrades and patches

2 1 3 1 2 3

Order the process of creating a deepfake. neural network learns how to superimpose the face onto an image neural network creates a new image/face from the process of learning provide neural network with an image and a face

2 3 1

Order the life cycle of disruption: Inevitable New Normal Clear Detectable

3 4 2 1

Match the terms with their charcteristics and description. (Not all options are used. Some options apply to multiple terms.) 1. Information Secrecy 2. Information Compliance 3. Information Ethics 4. Information Management 5. Information Property An issue that focuses on who owns information about individuals. Addresses the protection of data from unauthorized disclosure and confirmation of data source quthenticity. Ensures that organizations have the types of data/information required to function and grow efficiently. Focuses on how infromation can be sold and exchanged.

5 1 4 5

Information management, governance and compliance is a multi-faceted challenge for most organizations. Match the term with its definition. 1. Information Secrecy 2. Information Governance 3. Information Compliance 4. Information Management 5. Information Property An ethical issue that focuses on who owns information about individual and how information can be sold and exchanged. The act of conforming, acquiescing, or yielding information. Examines the organizational resource of information and regulates it definitions, uses, value, and distribution, ensuring that it has the types of data/information required to function and grow effectively. The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. A method of system of governance for information management and control.

5 3 4 1 2

Which of the following are examples of Disruptive Technologies since the advent of the World Wide Web? (select all that apply, omit those that do not.) a) Internet of Things. b) eCommerce. c) Expert Systems d) Flat screen monitor. e) Relational databases. f) Smartphones g) YouTube.

A B F G

Which of the following describes the difference between backup and recovery? A) Backup is an exact copy of a system's information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure. B) Backup is mandatory, whereas recovery is optional. C) Recovery is mandatory, whereas backup is optional. D) Recovery is an exact copy of a system's information, whereas backup is the ability to get a system up and running in the event of a system crash or failure.

A) Backup is an exact copy of a system's information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure.

Which of these functions in excel is best suited for uniting two (or more) substrings into a single larger string? a) CONCATENATE b) CLEAN c) AGGREGATE d) LEN e)ADD

A) CONCATENATE

Which of these functions in excel is best suited for extracing a substring from within a long text message? a) LEFT b) TRIM c) TEXTJOIN d) LEN e) SUBSTITUTE

A) LEFT

Which of the following characterize disruptive technology?(select all that apply, omit those that do not) a) Provides improvements that customers expect and are eager to buy. b) A new way of doing things that initially doesn't meet the needs of existing customers c) Sustains a business, product or service that customers have come to expect and want. d) Tend to open new markets and destroy old ones e) Enter the marketplace at the high cost/high profit end.

B) A new way of doing things that initially doesn't meet the needs of existing customers D) Tend to open new markets and destroy old ones

Which of the following types of damage are caused by cybercrime attack on an organization? (select all that apply, omit those that do not.) a) Compromise Health of Patients and Customers. b) Cost to recover c) Business Strategy d) Compromise Physical safety of Employees e) Competitors f) Reputation

a) Compromise Health of Patients and Customers. b) Cost to recover d) Compromise Physical safety of Employees f) Reputation

Which of the following statements about cybersecurity are true? (select all that are true and omit those that are not.) a) Innovation creates new opportunity for exploitation. b) Humans trust even when they shouldnt. c) 512 bit encryption protects data from IoT hacking d) Everything is vulnerable in some way. e) Social Media platforms protect your images f) If there is a vulnerability it will be exploited. No Exceptions

a) Innovation creates new opportunity for exploitation. b) Humans trust even when they shouldnt. d) Everything is vulnerable in some way. f) If there is a vulnerability it will be exploited. No Exceptions

Which of the following are tips for dealing with Fake News? a) Install a browser plug-in to expose fake news and authenticated news. b) Check the sources. c) Check and re-check the URL d) Be critical of unrealistic photos. e) verify websites are using HTTPS security

a) Install a browser plug-in to expose fake news and authenticated news. b) Check the sources. c) Check and re-check the URL d) Be critical of unrealistic photos.

Which of the following help contribute to filter bubbles for users on the Internet. a) Past click behavior. b) Location. c) Type of computer d) Search history. e) Choosing one type of newspaper. f) Anti-virus software settings.

a) Past click behavior. b) Location. c) Type of computer d) Search history.

Which of the following are examples of digital distuption? (select all that apply, omit those that do not) a) World-Wide-Web b)Netflix c)iPhone d)Uber & Lyft e)Home Depot & Lowes f)Coca Cola & Pepsi

a) World-Wide-Web b)Netflix c)iPhone d)Uber & Lyft

Which of the following are characteristics of Integrity? a) Requires both passwords and biometrics to be robust. b) Applies to data during its entire life within an information system. c) Involves maintaining data accuracy. d) Involves maintaining data consistency. e) Is safeguarded by Checksums (hash values).

b) Applies to data during its entire life within an information system. c) Involves maintaining data accuracy. d) Involves maintaining data consistency. e) Is safeguarded by Checksums (hash values).

Which of the following are characteristics of a typical company growth curve? a) Eagerly cannibalize existing core business in order to embrace immature technologies. b) As a business matures early experimentation gives way to standardization. c) Established incumbent businesses embrace radical and even risky changes to technologies and processes. d) Companies focus on what works and make changes in order to generate consistent cash flow to support growth.

b) As a business matures early experimentation gives way to standardization. d) Companies focus on what works and make changes in order to generate consistent cash flow to support growth.

Which of the following are part of the CIA Triad? (select all that apply, omit those that do not.) a) Authorization b) Availability c) Copyright d) Integrity e) Confidentiality

b) Availability d) Integrity e) Confidentiality

In Excel, a relative cell reference ___________. (Select all correct answers) a) requires that cell protection be set to "unlocked" b) a way of identifying a cell position that will NOT be adjusted when pasted or copied to additional cells. c) example is $A$1 d) a way of identifying a cell position that WILL be adjusted when pasted or copied to additional cells. e) example is EK12

d) a way of identifying a cell position that WILL be adjusted when pasted or copied to additional cells. e) example is EK12


Conjuntos de estudio relacionados

AP Comp Sci A Unit 8 2D Arrays MCQ (ApClassroom)

View Set

Unit 9 Linux, NOS 120 Study Guide Ch. 8, NOS 120 Study Guide Ch. 10, NOS 120 Study Guide Ch. 11, NOS 120 Study Guide Ch. 12, NOS 120 Study Guide Ch. 13, NOS 120 Study Guide Ch. 14

View Set

BUS LAW 3800 Final Exam Study Questions

View Set

Psychology 2301 - Chapters 6 Review

View Set

Government 1.01 Natural rights exam

View Set

review questions for NSG 209 exam 2

View Set

Chapter 40: Musculoskeletal Care Modalities

View Set