MIS 2113 Exam 4 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

A GB is roughly how many bytes?

1 billion

Password Rules

12-15 characters, keep it weird, no bunches of special characters, only use for one site, change once a year

1 and 0

All content stored and processed on a computer are stored as ... (two numbers)

Module 4 contents

CIA, threat and control, landscape, phishing email, information privacy

Key Components

CPU, RAM, Cache

True or False: if you have a Mac or Linux operation system, you are immune to malware

False

Inputs

Keyboard, Mouse

Outputs

LCD Screen, Loudspeakers, Printer

You are working on an Excel assignment. When will your computer to store the Excel file so that the CPU/processor can execute the operations you are requesting?

RAM

Module 1 contents

SQL, select and join statement, AVG, Entity-Relationship, ERD

Bus

a circuit that connects one part of the motherboard to another

Best Wireless Connection

ac

#1 cause of data loss is ...

accidental deletion

What was Module 2?

analyze and visualize data

Integrity

assurance that information is trustworthy and accurate over the lifecycle of the data

What was Module 3?

automate data operations

A virus overheats your machine and destroys all of your files (CIA?)

availability

A virus takes down internet service for all customers (CIA?)

availability

Reliable access to data (CIA?)

availability

Employee accidentally views records of a patient (CIA?)

confidentiality

Limit access to data (CIA?)

confidentiality

Your personal information is stolen and sold on the black market (CIA?)

confidentiality

CIA Triade

confidentiality, integrity, availability

People

employees, suppliers, clients

CPU

executes instructions pulling inputs from various places

Module 2 contents

functions, formulas, logical and reference, charts, pivot tables

RAM Size Unit

gigabytes (GB)

CPU Speed Unit

gigahertz (GHz)

Availability

guarantee of reliable access by authorized people

Bus Speed

how much data an move across he bus simultaneously

The weakest link of cybersecurity is ...

humans

What is the fastest and cheapest way to make your computer faster? (increase Ram, increase Cache, get a larger hard drive, get a faster processor)

increase RAM

Technology

infrastructure, security, mobility

Data is accurate (CIA?)

integrity

Student wishes to change a test score (CIA?)

integrity

Cookies

little text files stored on your computer that allow a website to remember you

Module 3 contents

logic, flowcharts, input-process-output, VBA

What could happen when you click on a phishing email link?

malware, viruses, keylogger, ransomware, bot

Bus Speed Unit

megahertz (MHz)

"Spear" Phishing

messages that are customized for you

Which of these is not an OUTPUT for a computer? (mouse, screen, printer)

mouse

Social Engineering

obtaining confidential information by manipulating and/or deceiving people

Windows 10 is an example of an ...

operating system

Keylogger (PPT?)

people

Social Engineering (PPT?)

people

Spear Phishing Attempt (PPT?)

people

3 Lenses of CIA Triade

people, processes, technology

A spear phishing attempt designed to steal personal information and sell it on the black market (CIA/PPT?)

people/confidentiality

Processes

policies, procedures, guidelines

Software updates, encryption, backup, and redundancy are examples of what?

preventing attacks on technology

Which of these is not an INPUT for a computer? (printer, mouse, keyboard, touchscreen)

printer

Password policy (PPT?)

process

Policy requiring all files to be encrypted (PPT?)

process

Rule indicating what websites an employee may view (PPT?)

process

A policy requiring all data to be verified for accuracy (CIA/PPT?)

process/integrity

Processing

processor or central processing unit

What was Module 4?

protect data

Software

provides instructions to CPU

Phishing

sending fake emails and creating fake websites that often look real

Confidentiality

set of rules that limits access to information

An attack targeted at an individual is ...

spear phishing attack

Memory

storage for all your documents and files

What was Module 1?

store and retrieve data

Cache

stores frequently used instructions on the CPU

RAM

stores things that are currently being used in programs

Encryption/Backup (PPT?)

technology

Zero Day Exploit (PPT?)

technology

A zero day exploit used to shut down a nuclear power plant (CIA/PPT?)

technology/availability

Dual Data Rate Memory

the memory can transmit data twice per cycle instead of once, which makes the memory faster

Privacy

the right to be left alone and to be free of unreasonable personal intrusions

Information Privacy

the right to determine when, and to what extent, information about you can be gathered and/or communicated to others

Cybersecurity

the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this


Conjuntos de estudio relacionados

Repaso para el examen de inglés

View Set

A&P Endocrine System Multiple Choice

View Set

BIOS240 Water and Salt Physiology

View Set

2 - State Exam Simulator - 150 Practice Exam Questions

View Set

Chapter 57: Introduction to the Urinary System -

View Set

Wildland Fire behavior-Chapter 4 {(*)Highlights & (-)Red Notes}

View Set