INFO 360 Test 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

What is the difference between a cloud service and a web service?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

Why is a target market important to businesses and organizations?

A target market is the group of consumers most likely to purchase an organization's products and services.

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

A gigabyte equals approximately one ________ bytes.

Billion

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hackers

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing diminishes the need to store files and software on a local drive.

Describe key features of content delivery networks (CDN)

Content delivery networks are exclusively used in the United States to speed up web traffic.

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.

Control panel

Cyberattacks that originate and are executed by foreign governments is called state- sponsored ____________ these attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

Cyberwarfare

A DoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DoS stands for __________ .

Distributed Denial of Service

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

DoS

The primary goal of a company's social media strategy is to

Engage potential customers

Computer viruses are not frequently disguised as attachments of funny images, greeting cards, or audio and video files.

False

Cyberwarfare does not require an organized group to execute attacks.

False

Trojans are easily detected by most antivirus software programs.

False

Trojans are not considered malware.

False

White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include Rootkits , Back door programs and Pop-up ads

False

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ________ .

Firewall

Describe web services

HTTP is commonly used to create web services.

) A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (includingHIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?

In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.

A form of spyware that records all actions typed on a keyboard is called a __________ logger.

Keystroke

User communities rely on which of these software components to engage with a social media information system (SMIS)? More than one answer may be correct.

Metrics that correspond to social media goals can serve as key-performance indicators (KPIs) for them.

List examples of software as a service (SaaS)

Microsoft Azure

The technology that provides a type of firewall protection by hiding internal IP addresses is called ___________

NAT

Businesses need to take steps to protect computer systems, data, and information from __________ disasters.

Natural

Activities where white-hat hackers are paid to hack into private networks and applications is referred to as __________ testing.

Penetration

The illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company is referred to as __________ In order to appear legitimate, the message often contains the company's logo and identifying information.

Phishing

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___________ .

Ransomware

One version of this type of malware encrypts a victims data until a payment is made. Another version threatens to make public a victim's personal data unless a payment is made. This type of malware is called _________

Ransomware

The use of computers and digital technology to manipulate people so they divulge confidential information such as usernames, passwords, account information is called ____________ engineering.

Social

Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsors.

Social media providers build and host website platforms and sponsors invest in these platforms to enhance their social media presence.

Which of the following is not a presentation software term?

Speaker image

Unlike phishing which does not have a specific target and is designed to reach the maximum amount of people, _________ phishing is a precise type of attack.

Spear

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?

The web is only one of many applications that runs on and is accessed through the Internet.

Security risk can be calculated using the following calculation: Risk =

Threat x Vulnerability x Asset

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

Trello

As reported by Andrei Ene, Tiny Banker _________ is one of the worst malware attacks in the last 10 years.

Trojan

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _______

Trojan

Cyberwarfare can cause widespread damage to IT infrastructure.

True

Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities.

True

Worms computer viruses are considered malware.

True

Which of the following are examples of information businesses get from social media to make more informed decisions? More than one answer may be correct.

Which social media site would be the best place for their business to advertise?

organizations hire computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These experts use a variety of techniques including hacking, penetration testing, and vulnerability testing. These types of experts are known as ____________ hackers.

White-hat

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

An effective social media information system (SMIS) collects and analyzes data about the organization's

activities and audience on social media and its own website(s).

The main purpose of a social media information system (SMIS) is to

allow social workers to share content

A high-end jewelry designer creates several different brands of jewelry for women of different ages and tastes. To gain the greatest exposure to her potential customers on social media, her SMIS should be designed to use the platforms that

are most used by the target markets for each jewelry line or brand.

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

What parts do people play in social media information systems?

collectors of data points for analysis, observers, and bystanders

A computer network must be connected to the Internet to support

communicating via email with people on other networks.

A digital device that accepts input, processes and stores the input, and provides output is a ________.

computer

Describe the benefits 5G networks will provide cell phone carriers and users.

connected cities

What is the name of the study of how people make purchases and why they buy products and services?

consumer behavior

The purpose of programs that analyze connection data is to

create information about user behavior and patterns to benefit a sponsor.

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

From the following list, select the functions of an Internet Service Provider (ISP).

creating protocols and other standards for transmitting messages

A deliberate misuse of computers and networks, use malicious code to modify the normal operations of a computer or network.

cyber attacks

Which of the following are considered major cloud service providers? More than one answer may be correct.

eBay offers cloud solutions for Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP).

Which of the following is a strength of the Linux platform?

free to download and use

Four Steps to Protect Computers and networks from Natural Disasters : Business continuity plan , Off-site cloud storage, Maintenance of data inventory and _____________ .

geographic data redundancy

An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?

infrastructure as a service (IaaS)

Adding software to a digital device, or adding hardware components to a digital device is called ________.

installing

The main advantage of the IPv6 format for IP addresses is that

it can accommodate many more addresses than the IPv4 format.

The difference between a company's fundamental value and its total value is that

its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.

) A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

laptop

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency

Malware is short for _______ software

malicious

Setting social media metrics is the second step in creating a social media information system (SMIS) because

metrics are needed to quantify the organization's progress toward achieving its social media goals.

Some popular social media management systems are becoming more difficult to manage because

millions of diverse users across the globe are active participants.

For the IoT to work properly, you must have which of the following?

offline capabilities

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

What is the second step in the six-step process of creating an SMIS?

outline measurements of success

With Web 3.0, everyday devices connected to the Web will become

smarter and more capable, given the improved support for the Internet of Things (IoT).

Examples of IoT devices include which of the following?

smartphones

User communities rely on which of these software components to engage with a social media information system (SMIS)? More than one answer may be correct.

smartphones, devices with sufficient memory

Specialized hardware or software that capture packets transmitted over a network are called packet _________

sniffers

Components of a social media information system (SMIS) combine to

support a company's marketing strategy through social media.

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________.

tablet

What do most companies use as their main conduit for reaching and connecting with customers?

their website

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

touchscreens

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.


Conjuntos de estudio relacionados

5.2 STATISTICS PROBABILITIES MARCH 30

View Set

Hexagon Interview includes react, Redux,

View Set

Chapter 14: Communicate Customer Value: Direct, On-line, Social Media and Mobile Marketing

View Set

CH 3 (Making Sense of Arguments)

View Set

Chapter 9 - Global Economic Growth and Development

View Set

business process chapter 14 smartbook

View Set