CIS Study Guide for Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Websites reside on __________.

A server

Which of the following is an example of a one-to-many relationship?

A student takes more than one course.

In the SQL statement "FROM Parts", Parts refers to what?

A table

What was the internet's original name?

ARPANET

Website reengineering and business facelifts in e-commerce are components of which part of an e-commerce business plan?

Agility

ISPs provide which of the following? Email Web hosting Broadband All of the above

All of the above

The usability of a browser can be described as ________________. Ease of use Displaying any website as intended A robust set of tools All of the above

All of the above

In the SQL statement "SELECT Lname", Lname refers to what?

An attribute

Which of the following is an example of B2E?

An employee purchasing goods from the company store

What is the first step in developing a computer security plan?

Assess all risks

What is the IT term for when smart devices are rendered nonfunctional?

Bricking

Which software provides an interface that displays information on the World Wide Web?

Browser

Which of the following seller-customer relationships describes how Craigslist does e-commerce?

C2C

Who is responsible to ensure that security is maintained over IT assets?

CIO

The term for stored pages of previously visited web pages is ________.

Cache

The internet can be described as which type of model?

Client/server

Put the IoT life cycle actions in the correct order.

Collect, communicate, analyze, act

What does the top-level domain ".com" stand for?

Commercial

Which is NOT a use of a business intranet?

Conducting business-to-consumer transactions

What is the term for text files used for tracking what sites are visited on the World Wide Web?

Cookies

Ensuring that the ZIP CODE attribute is populated with usable data is called ________.

Data validation

The security of a database is the responsibility of the _________.

Database administrator

A set of tools that provide programmers with the ability to create, modify, and extract data is known as a _______________.

Database management system

One or more tables in a database with each record indexed is called a __________.

Database structure

Social engineering is _________________.

Deception used to manipulate individuals into divulging confidential information

HCI is a measure of a website's ____________.

Design

What is the term used when a criminal sifts through trash for information?

Dumpster diving

Which of the following is NOT a standard email protocol?

EMSP

What do database designers use to design and construct databases?

Entity relationship diagrams

What is another name for a bookmark?

Favorite

A column in a database table is called a ________.

Field

Which attribute points to a primary key in another table within a database?

Foreign Key

What is the term for someone who attempts to steal information from a computer?

Hacktivist

The ____________ file is a list of cached websites on a computer.

History

What is the term for a clickable navigation element?

Hyperlink

What system is used to address each node on the internet?

IP

_____________ is the term for when someone wrongfully uses another person's information for criminal gain.

Identity theft

What does ISP stand for in the realm of the internet?

Internet Service Provider

The ________ is composed of millions of smart devices and sensors connected to the internet.

Internet of Things

What is one reason the internet is moving from IPv4 to IPv6?

IoT devices have used up all the IPv4 addresses.

Which type of malware is installed on a computer to capture or monitor keystrokes and transmit information to a third party?

Keylogging

Redirecting a user to a bogus website with an official-looking URL is known as ________.

Pharming

A scam using a fraudulent email that appears to have come from a legitimate source requesting information is known as _________________.

Phishing

A separate window that opens within a browser without user interaction is known as a _________________.

Popup

The function that is used to retrieve data from a database is called a(n) ___________.

Query

What is the latest type of malicious software that has the ability to completely cripple a computer and require payment to re-enable the computer?

Ransomware

Which of the following is the correct order of steps for risk management?

Recognition, consequences, assessment, strategies

A row in a database table is called a ________.

Record

Database normalization is a process used to _______________.

Reduce redundancy

Which of the following is NOT a type of ransomware?

Reverse phishing

The most widely used query language for a DBMS is _______________.

SQL

A map of a database that shows tables and relationships is called a(n) _______.

Schema

Yahoo, Google, and Bing are examples of _____________.

Search engines

The use of deception to manipulate individuals to divulge confidential or personal information is known as ____________.

Social engineering

Email, faxes, mobile phones, blogs, and news groups are victims of which type of malware threat?

Spam

Which type of malware gleans personal data and information about the user without his or her knowledge?

Spyware

In a website attack involving a denial of service, who is most affected by the malicious software?

Those who want to use the website

One way a deceptive website can know where a visitor has been on the web is through the use of _____________.

Tracking cookies

What allows a website you have previously visited to know information about you when you return to it?

Tracking cookies

What is the term for a malicious program that seems harmless until it is executed?

Trojan horse

Which type of malware usually activates at a future date?

Trojan horse

True or false: A relational database must have more than one table.

True

True or false: All email should be considered public information.

True

True or false: Attribute and Field are different terms for the same thing.

True

True or false: Metasearch engines utilize multiple search engines to return results.

True

True or false: Without a firewall, an intranet just becomes part of the internet.

True

Voiceover Internet Protocol (VoIP) is the use of internet networks to carry voice phone calls. Which of the following is NOT true of VoIP?

Uses TCP protocol

Which type malware has the ability to be self-replicating?

Worm

Which type of malware does NOT need to attach itself to an existing program or email to spread?

Worm

Web pages are usually programmed using ____________. a. HTML b. JavaScript c. CSS d. A and B only e. A, B, and C

e. A, B, and C

Which of the following are components of e-commerce? a. Advertising b. Buying c. Selling d. Distribution e. B and C only f. A, B, C, and D

f. A, B, C, and D


Conjuntos de estudio relacionados

CMA ELECTROCARDIOGRAPHY Lesson 6

View Set

Alaska Life and Health Insurance State Exam

View Set

Marker Assisted and Genomic Selection

View Set

Interim Checkpoint: English 10 Checkpoint 3- Part 1

View Set