IT test (final exam)
list different authentication methods
1. something you know 2. something you have 3. something about you
the internet is migrating to internet protocol version 6 (IPv6), which uses ______ addresses to provide for many more devices than earlier versions
128-bit
why are advances in 5G technology expected to influence the IoT?
5G enables many devices to transmit data quickly to the cloud
which of the following systems can help identify your current geolocation?
GPS
how do fair information practices in the United States and the European Union differ?
Unlike the EU, the U.S. has no single, overarching national data privacy policy
which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data?
`predict and adapt
What is internet of things?
a network of physical objects embedded with sensors, processors, software, and network connectivity capability
one drawback with relying on IoT application to maintains the safety of critical systems is that ______
a poor or absent network connection can result in missing data
Emily researches private clouds while working on a proposal to move her organization to the cloud. She learns that ____
a private cloud is often comparable in cost to or less expensive than an on-premises environment
_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU)
a register
important functions of the chief information officer include
all of these
what must a networked device possess to truly belong to the IoT?
an IP address
Tesla and google have been pioneers in developing IoT devices that analyze data from the cloud and from on-board cameras and sensors to determine when to speed up, slow down, change lanes, or turn while moving. What are these devices called?
autonomous vehicles
the high-speed communications links that span the globe over land and under sea make up the internet _____
backbone
when you successfully connect your computer to a printer using ______, the two devices will be 10 to 30 feet apart and the computer will transmit to the printer at a rate of about 2 mbps
bluetooth
one of the first things developers of IoT applications should focus on is _____
building in security from the start
Which of the following is a markup language for defining the visual design of a web page or group of pages?
cascading style sheets (CSS)
______ is the process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks
certification
Graydon noticed jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. on the other hand, if he reports the incident, both his friend and probably all their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
choosing an alternative
The world wide web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as _______
client/server architecture
_______ refers to a computing environment where software and storage are provided as an internet service and accessed with a web browser
cloud computing
to successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled
computer forensics investigation
A common reason an organization chooses a private rather than a public cloud environment is _____
concerns about data security
which type of IoT application relies on individual devices that each gather a small amount of data and enables manual monitoring using simple threshold-based exception altering?
connect and monitor
which type if IoT application enables automatic monitoring combined with remote control, trend analysis, ans reporting by using individual devices that each gather a small amount of data?
control and react
the software on a client computer accessing the web must be able to _______
display the results returned by web servers
A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building
false
a wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits
false
solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips
false
the transmission control protocol (TCP) is responsible for managing IP addresses and internet domain names
false
today, many organizations can function and compete effectively without computer-based information systems
false
when you receive a text message that there is a problem with your bank account and you are required to click on link to submit some information, you are likely seeing a vishing attack
false
the first two steps an organization must take to perform a security risk assessment are to identify ____ respectively
hardware, software, and information systems used to achieve business objectives and possible occurrences that would negatively impact them
IoT technology can be used to control thermostats, home security systems, appliances, and motorized blinds via a smartphone app. This is known as ______
home automation
the area covered by one or more interconnected wireless access points is commonly called a(n)
hot spot
which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?
hybrid
in which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them?
implement the decision
one example of an ethical dilemma related to safety-critical system is whether to risk making the product more expensive, and potentially less appealing to customers, by
including hardware mechanisms to back up or verify software functions.
Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines?
increased redundancy
A(n) ___ device provides data and instructions to the computer and receives results from it.
input/output
If your home air conditioner has an IP address, it is part of the _____
internet of things
which of the following takes automation to a deep, broad level--one where interconnectivity between various devices exists in a way it never did before?
internet of things
An internal corporate network built using internet and world wide web standards and products is known as a(n)________
intranet
how does software-defined networking reduce both the risk of human error and overall network support and operations costs?
it automates configuration, policy management, and other tasks
which of the following is the correct description of a firewall
it is a software and hardware combination that limits the incoming and outgoing internet traffic
what happens to the data gathered by IoT sensors
it passes over the network and is gathered and stored
legal consequences following a successful cyberattack on a well-known organization often include
lawsuits initiated by consumers who incurred damages
the component of a computer that provides the CPU with a working storage area for program instructions and data is called the ______
main memory
which network topology uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area?
mesh
A ______ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city
metropolitan area network (MAN)
Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?
more cell towers will need to be installed
why is an iceberg, most of which is underwater, an appropriate analogy for the consequences of a cyberattack?
most people only think of the direct impact of the attack, not the many other, oft-hidden effects
Marleys computer has a math chip to perform mathematical calculations and a graphics chip to manipulate graphics while the CPU is busy with other activities. What processing approach is she using?
multiprocessing using coprocessors
what a very short-range wireless connectivity technology enables exchange of data over a few inches of space between two devices, such as a smartphone and point-of-sale terminal?
near field communication (NFC)
in a typical network, routing and switching of data and enabling access to applications are performed by hundreds or thousands of ______
network devices
Ethical Business Practices
often raise an organizations priority with suppliers and other business partners
the purpose of ____ is to use email messages to make the recipients reveal personal data
phishing
A single-tenant cloud computing environment is also known as a(n)
private cloud
completing an instruction involves two phases-instruction and execution- which are each broken down into two steps for a total of four steps. which of the following is NOT one of the four steps?
process data
CPU clock speed is the predetermined rate at which the processor
produces a series of electronic pulses
web servers must be programmed to ______
receive and process user requests
after a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the
recovery cost
dodge work for a manufacturing firm where IoT and smart building systems monitor and control the usage of electrical systems. This benefits the firm primarily through _______
reduced costs
which type of networking device directs data packets to other networks until each packet reaches its destination, and thus forms the internet backbone?
router
Annie, who works for a banking organization, recommends that her employers utilize the IoT in the form of video surveillance cameras and smart locks. Which business benefit of the IoT does Annie probably think they will gain from this change?
safety of the premises and their physical and digital assets
the class of computer systems used by multiple concurrent users offers business the potential to increase their processing capability to handle more users, more data, or more transactions in a given period, which is known as
scalability
a ______is a valuable tool that enables a user to find information on the web by specifying words or phrases known as keywords, which are related to a topic of interest
search engine
autonomous vehicles will rely on 5G for their _______
sensors
A _____ is a computer employed by Many users to perform specific task, such as running network or internet applications
server
which of the following is used to create a program that runs on a web server and deals with generation of the content of a web page to satisfy an end-user's request?
server-side programming
which of the following choices will help you score better (that is, as more secure) on a security self-assessment?
setting your home wireless routers encryption method to WPA2
which of the following will prevent a product from being rated as a high-quality software system?
software defects
A _______ network is one in which all network devices are connected to one another through a single central device called the hub node
star
Mavis asks her mobile carriers representative how the upcoming rollout of 5G technology will affect smartphones that can use it. The representative explains that smartphones that operate on 5G networks will ______
support enhanced augmented and virtual reality experiences
the ancestor of the internet was _____
the ARPANET
Americans who are in favor of expanded government surveillance programs argue that
the U.S. government is obligated to do all that it can to ensure citizens' security
the Supreme Court has ruled that the right to anonymous expression is protected by
the first amendment
in a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is
the information systems security analyst
J.T.'s new refrigerator is part of the IoT. In the user manual, he reads that this fridge collects data on temperatures and compressor operation. Assuming J.T. sets up his fridge's internet connection, where does the data from J.T.'s refrigerator end up?
the manufacturer's operational historical database
_______ consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the internet.
the web
security is a serious issue with IoT applications because _____
they can expose internal systems to hacking, viruses, and malware
one reason at&t and Verizon have plans to expand their 5G networks is that ______
they can support many more devices at one time than 4G networks
which type of IoT application assists with the creation of new business models, products, and services through the combination of sensor data and external data to provide new insights?
transform and explore
A client is any computer on a network that sends messages requesting services from the servers on the network
true
A virtual private network (VPN) can support a secure connection between a company's employees and remote users, usually through a third-party service provider
true
In the utilities industry, IoT sensors are used extensively to capture operational data and help the utility provider achieve 24/7 uptime
true
an employee marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the computer fraud and abuse act
true
default usernames and passwords should always be changed
true
linux is an open-source operating system
true
the internet is the infrastructure on which the web exists
true
the term ethics refers to the set of principles about what is right and wrong that individuals use to make choices, whereas the term law refers to a system of rules that tells us what we can and cannot do.
true
there are laws that require businesses to prove their data is secure
true
while information systems were once primarily used to automate manual processes, they have transformed the nature of work and the shape of the organizations themselves
true
domain names must always hav at least _____ parts, with each part separated by a dot (period)
two
As a result of the analysis of aggregated sensor data, an IoT device may receive ______
updates, alerts, or even automatic adjustments
discuss what makes a password strong
using capital letters as well as lowercase letters, numbers, and other characters to make a password 8 characters or longer will make your password strong
on the back of a credit card the three-digit number above the signature panel is used to
verify the card if legitimate and not a stolen card number
IoT devices help organizations deepen their understanding of consumer preferences and behaviors using data from _____
video surveillance, social media, mobile, and internet usage
an information system that operates in the ___ sphere of influence supports teamwork between two or more people who work together to achieve a common goal, regardless of where those team members live.
workgroup
you wish to use your personal laptop computer at work. however, the IT department folks are unwilling to allow you. the likely reason is
your non-work related use of the laptop could increase vulnerability