Cyber Security Semester Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

self driven, reduces human intervention

2 features of automation

eliminates equipment and management, access data anywhere, subscribe to only needed services

3 benefits of cloud computing

transactional data

A business is analyzing sales information as the sales data is being generated from the point-of-sale (POS) machines. What type of data is captured and processed as the events happen?

3D Printer

A student has a digitized version of an idea for a product. What machine can the student use to turn the idea into a solid object?

Encrypt with VPN

An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?

fog computing

An organization is concerned with the amount of sensor data that is being generated locally, analyzed in the cloud, and returned for processing at the local site. Which solution will keep the data closer to the source for preprocessing?

volume, velocity, variety

Big data attributes?

global variable

Can be used anywhere in the program

The Internet

Largest network

security

Making data accessible to only authorized users addresses which data storage problem associated with big data?

simulate and visualize one or more networks

Purpose of packet tracer?

The slot allows a block with a bevel tab on the bottom to be connected above the block shown.

Refer to the exhibit. A specific Blockly block has a slot on the top. What is the purpose of this slot?

decision

Refer to the exhibit. What does the exhibited flow chart symbol commonly represent when it's a diamond?

process

Refer to the exhibit. What does the exhibited flow chart symbol represent when it's a rectangle?

LAN

What type of network is wired computers in a classroom?

print

Which Python programming function is used to display output?

only conduct transactions on websites after verifying the URL is correct

Which action can help reduce online risk?

velocity

Which attribute of big data involves an exponential data growth rate?

access

Which challenge of big data storage is characterized by the need to make data accessible from anywhere at anytime?

ping

Which command is used to test network connectivity and provide a response to each packet received by the remote host?

"SyntaxError"

Which output would be displayed if the code that is shown below is entered in a Python interpreter? y = ['yellow', 'red', 'green', 'purple', 'white'] print y

Raspberry Pi

Which platform is a low cost, credit-card-sized computer?

phrases, letters & numbers, special characters

Which three elements should be combined when creating a strong password? (Choose three.)

randolph, 12345678, adfnsanjs

Which three passwords are the least secure? (Choose three.)

Packet Tracer

Which tool allows a user to simulate real networks?

following email links that have already been scanned by the email server sharing information on social media

Which two online activities pose high security risks? (Choose two.)

fog

Which type of computing is located at the edge of a business or corporate network and that allows data from sensors to be preprocessed?

analyzed data

Which type of data can be used by a business to support managerial analysis tasks and organizational decision making?

WAN

Which type of network is used to connect a company located in one area of a city to another location in a city far away?

WiMax

Which type of wireless network is used to connect devices within a city to create a metropolitan-area network (MAN)?

to research a person

Why would an IT person use Zabasearch?

employing access controls

assign roles and privilege levels

# of variables, data points per variable, is data timeline?, items needing comparisons

criteria for best chart selection

unstructured

data collected through websites, audio, or tweets

To gain new insights

purpose of data analytics

implementing human resource security measures

research and background checks on employees

regularly testing incident responses

test emergency response scenarios

educating users

train users on security procedures

Their controller can be infected

How are USB flash drives a security risk?

personal info could be leaked

How can a virtual assistant be a security risk?

GPS calculates route based on traffic. Robots are used in mines to reduce risk of injury to humans

What are 2 examples of automation?

vehicle id, birth date, bank account #

What are three examples of personally identifiable information? (Choose three.)

easily scalable cluster sizes, automatic replication of data across clusters, uses HDFS as a fault tolerant file system

What are three features of Hadoop? (Choose three.)

update firmware, use WPA2-AES encryption.

What are two recommended steps to protect and secure a wireless network? (Choose two.)

Khan Academy & Code Academy

What are two resources that could help someone learn to program? (Choose two.)

home gateway

What provides auto discovery services for smart devices on a network?

Drag variable block into workspace area

How is a new variable created in Blockly?

true

True of False? Structured data is easier to analyze and store than unstructured data

false

True or False? Data is defined as big data if it is more than 1 petabyte.

false

True or False? Distributed data processing involves large databases being centrally processed by powerful mainframe computers and stored in giant disk arrays.

true

True or False? Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or PC.

true

True or False? The Internet of Things can help organizations improve the efficiency and productivity of manufacturing processes and operations.

true

True or False? The Internet of Things will connect inanimate objects to the network with intelligent sensors.

false

True or False? Web scraping tools are used to extract and manipulate structured data.

true

True or false? CSV, JSON, and XML all manipulate structured data?

easy to read/write and runs without conversion to machine language

Two features of Python?

SSID and IP Address

Two requirements to connect to a home wireless network?

programs and supplied data

What 2 things do all digital devices need to work?

Activation

What IBN element orchestrates policies and configures systems?

facial recognition

What ML technology can track and identify people?

a network

What allows digital devices to interconnect and transmit data?

Mimics cognitive functions, and Perceives their environment to act.

What are 2 characteristics of artificial intelligence?

generating and collecting data from multiple sources

What characterizes data management problems associated with big data storage?

Continuous verification, insights, visibility and corrective actions and end to end verification relying on AI and ML

What does assurance in IBN do?

robotics

What field is tied to automation?

the wireless network

What information is conveyed by the SSID that is configured on an IoT device?

programming tool for beginners

What is Blockly?

valuing assets to justify security expidentures

What is a goal of performing a risk assessment?

To make decisions and actions based on outside info

What is a requirement for a smart device?

a device that detects or measures an event or physical property

What is a sensor?

ML

What is a subset of AL that uses stats to enable computers to learn?

Mac Address Filtering

What is a wireless router security best practice that limits access to only specific internal hosts?

Arduino

What is an open source platform that takes input from a variety of sensors to control objects?

Devices that think on their own, evaluate data, and modify themselves based on that data. Mimics human cognitive functions

What is artificial intelligence?

a system of data centers or connected servers that provide anywhere/anytime access to data and applications

What is cloud computing?

Internet of Things (IoT)

What is comprised of millions of smart devices and sensors connected to the internet?

32

What is displayed after the following code is entered into a Python interpreter? addition = 22 +10 print(addition)

AI

What is intelligence demonstrated by machines?

Creates intent, translates it to policies, and checks integrity

What is key to the transition element in IBN?

home gateway

What is needed in a smart home to connect sensors and smart devices to a network?

crowd funding

What is one way to pay for prototyping?

artificial intelligence

What is the core component of Intent-Based Networking?

protecting data

What is the goal of a white hat hacker?

1,2,4,5,3,6

What is the output when the following code is entered into a Python program interpreter? [1,2,4,5] + [3,6]

data mining

What is the process of discovering patterns and relationships in large data sets in order to convert raw data into meaningful information?

SSID

What is used to identify a wireless network?

flow chart

What is used to illustrate how a given process will run?

imagination

What limits the objects that can become sensors?

a smart device

What lowers power consumption during peak demand?

"SyntaxError: Missing parentheses in call to 'print'"

What output is expected when the function that is shown below is entered in a Python program interpreter? >>>print Cisco 1

microcontroller

What provides IoT sensors with network access?

Machine Learning

What technology enables things like speech recognition, product recommendations, and fraud detection?

intent based networking

What technology uses AI and others to reconfigure a network to comply to standards?

prototyping

What tests new "things" not on a network?

AI, ML, and Automation

What three technologies acomplish desired intents in an intent based network

Speech and Facial Recognition

What two applications use ML?

design and programming

What two skills help with prototyping?

structured data

What type of data is being collected when an organization is using spreadsheets and forms for data input?

sensor

What type of device could allow a refrigerator to place a replacement order for an item contained within it?

PAN

What type of network is btw Bluetooth and a vehicle?


Conjuntos de estudio relacionados

Changing Maternal-Child Health Care Enviroment

View Set

13. Inspecting a Cylindrical Part 331

View Set

Chapter 3 - Constitutions, Statutes, Administrative Law, and Court Rules

View Set

Binary, Hexadecimal, octal and all that shizzle

View Set

Chapter 22: Management of Patients with Arrhythmias and Conduction Problems

View Set

Energy and Forms of Energy, Energy Transformation

View Set

What Is Domain and Range in a Function?

View Set