MIS 2113 Exam 4 Review
A GB is roughly how many bytes?
1 billion
Password Rules
12-15 characters, keep it weird, no bunches of special characters, only use for one site, change once a year
1 and 0
All content stored and processed on a computer are stored as ... (two numbers)
Module 4 contents
CIA, threat and control, landscape, phishing email, information privacy
Key Components
CPU, RAM, Cache
True or False: if you have a Mac or Linux operation system, you are immune to malware
False
Inputs
Keyboard, Mouse
Outputs
LCD Screen, Loudspeakers, Printer
You are working on an Excel assignment. When will your computer to store the Excel file so that the CPU/processor can execute the operations you are requesting?
RAM
Module 1 contents
SQL, select and join statement, AVG, Entity-Relationship, ERD
Bus
a circuit that connects one part of the motherboard to another
Best Wireless Connection
ac
#1 cause of data loss is ...
accidental deletion
What was Module 2?
analyze and visualize data
Integrity
assurance that information is trustworthy and accurate over the lifecycle of the data
What was Module 3?
automate data operations
A virus overheats your machine and destroys all of your files (CIA?)
availability
A virus takes down internet service for all customers (CIA?)
availability
Reliable access to data (CIA?)
availability
Employee accidentally views records of a patient (CIA?)
confidentiality
Limit access to data (CIA?)
confidentiality
Your personal information is stolen and sold on the black market (CIA?)
confidentiality
CIA Triade
confidentiality, integrity, availability
People
employees, suppliers, clients
CPU
executes instructions pulling inputs from various places
Module 2 contents
functions, formulas, logical and reference, charts, pivot tables
RAM Size Unit
gigabytes (GB)
CPU Speed Unit
gigahertz (GHz)
Availability
guarantee of reliable access by authorized people
Bus Speed
how much data an move across he bus simultaneously
The weakest link of cybersecurity is ...
humans
What is the fastest and cheapest way to make your computer faster? (increase Ram, increase Cache, get a larger hard drive, get a faster processor)
increase RAM
Technology
infrastructure, security, mobility
Data is accurate (CIA?)
integrity
Student wishes to change a test score (CIA?)
integrity
Cookies
little text files stored on your computer that allow a website to remember you
Module 3 contents
logic, flowcharts, input-process-output, VBA
What could happen when you click on a phishing email link?
malware, viruses, keylogger, ransomware, bot
Bus Speed Unit
megahertz (MHz)
"Spear" Phishing
messages that are customized for you
Which of these is not an OUTPUT for a computer? (mouse, screen, printer)
mouse
Social Engineering
obtaining confidential information by manipulating and/or deceiving people
Windows 10 is an example of an ...
operating system
Keylogger (PPT?)
people
Social Engineering (PPT?)
people
Spear Phishing Attempt (PPT?)
people
3 Lenses of CIA Triade
people, processes, technology
A spear phishing attempt designed to steal personal information and sell it on the black market (CIA/PPT?)
people/confidentiality
Processes
policies, procedures, guidelines
Software updates, encryption, backup, and redundancy are examples of what?
preventing attacks on technology
Which of these is not an INPUT for a computer? (printer, mouse, keyboard, touchscreen)
printer
Password policy (PPT?)
process
Policy requiring all files to be encrypted (PPT?)
process
Rule indicating what websites an employee may view (PPT?)
process
A policy requiring all data to be verified for accuracy (CIA/PPT?)
process/integrity
Processing
processor or central processing unit
What was Module 4?
protect data
Software
provides instructions to CPU
Phishing
sending fake emails and creating fake websites that often look real
Confidentiality
set of rules that limits access to information
An attack targeted at an individual is ...
spear phishing attack
Memory
storage for all your documents and files
What was Module 1?
store and retrieve data
Cache
stores frequently used instructions on the CPU
RAM
stores things that are currently being used in programs
Encryption/Backup (PPT?)
technology
Zero Day Exploit (PPT?)
technology
A zero day exploit used to shut down a nuclear power plant (CIA/PPT?)
technology/availability
Dual Data Rate Memory
the memory can transmit data twice per cycle instead of once, which makes the memory faster
Privacy
the right to be left alone and to be free of unreasonable personal intrusions
Information Privacy
the right to determine when, and to what extent, information about you can be gathered and/or communicated to others
Cybersecurity
the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this