Tech Test

¡Supera tus tareas y exámenes ahora con Quizwiz!

In what year was ARPNET turned on?

1969

What is a major difference between a LAN and WAN?

A WAN connected larger geographic areas

In 2001 NIST set out an open competition in search of a new algorithm. Which one was the winner?

AES

Who developed the first network in 1969?

ARPANET

Who was the winner of the AARP caregiver challenge app using A.I. technology?

Care Angel

What is one of the major drawbacks of using encryption?

Cost

_____ are built and owned by business that want to security connect various locations

EPN

Elliptic curve cryptography is used by most modern phones because of low power and what else?

High security

Lieutenant Rocherfort and a team of code breakers assisted in which battle?

Midway

The _____ prepares and sends data, receives data, and controls the flow of data

NIC

A _____ is the smallest and most basic type of network made up of a wireless modem, a computer all revolving around one person

PAN

What do IoT devices not include?

Paper books

PS3 used Elliptic Curve cryptography that was broken by hackers. Why?

Poor implementation by Sony

A _____ extends a private network across a public network

VPN

What is the biggest mobile payment app in China?

WeChat

What company was affected with the largest data breach?

Yahoo

What doe spear phishing involve?

a targeted attack toward one specific individual

What were the benefits of Care Angel?

ability to send health alerts to family members, offer guidance to seniors, and ability to share information with health care providers

What is not a possible disadvantage of social networks?

awareness and activism

When are symmetric keys often used?

both end users share the same key

What are some important contributions made by female code-breakers?

broke a network of Nazi spies in South America, unraveled address codes used by the Japanese army, and uncovered a crucial pattern to break the Japanese "purple" cipher

Every IoT device that is connected to the internet _____

can be hacked

What are the consequences of cybercrime?

commercial losses and public relation problems

What are 3 advantages of IoT?

cost saving, automation, and increased productivity

What do IoT devices offer?

cost savings

What do drones offer farmers a cost saving solution to?

crop tracking

What are some benefits of computer netowkring?

ease of administration, redundancy, and reducing of IP use

What is spear phishing most common in?

emails

What can be stolen from a mobile device?

emails, passwords, compromising photos, and company data

Among the many benefits, AES is

faster

Where should device analysis be completed when conducting a forensic investigation?

in a controlled restricted access laboratory

What is a common practice by organizations following a cyber attack?

increase security training

What is not an advantage of IoT? 1. cost savings 2. automation 3. increased privacy

increased privacy

Why does social media have an addictive quality?

it is adaptive

What is a major drawback of IoT?

lesser employment prospects

What are examples of how technology facilitates connectivity during social distancing measures?

managers reach out to team members to check on them, using video meetings for daily reporting of tasks, and posting QotWs in team chats

What should the investigator do in a forensic investigation?

protect the evidence

What is a major benefit of a VPN?

provides encrypted traffic between two nodes

What devastating effects can revenge porn and sextortion have on victims?

psychological distress, anxiety, depression, and suicide

What did the John S. and James L. Knight foundation award 50 million dolls of new funding to 11 Universities for?

researching how technology is transforming democracy

What is a major disadvantage of symmetric keys?

same key is used to encrypt and decrypt

Once a file is encrypted, it is ____

secure

What is cyber security the practice of?

securing networks from malicious attacks

What does cyber security not involve?

securing paper files from malicious attacks

A cyber security threat is a malicious act that _____

seeks to damage data, steal data, and disrupt digital life

What is the main purpose of computer networks?

share resources and data between computer systems

What resources do computer networks share?

storage and printers

What do the IoT concepts mean?

taking all the laptop, desktops, and mobile devices and connecting them to the internet

Drones may be legally used for all of the following except: 1. unauthorized surveillance on neighbors 2. shipping and delivery 3. safety inspections 4. storm and farm crop tracking

unauthorized surveillance on neighbors


Conjuntos de estudio relacionados

SmartBook Ch. 1 Homework Questions

View Set

APUSH Chapter 11-13 w/Amira's Edits

View Set

Copyright for Educators: Legal and Ethical Use

View Set

Ch 38: Mental Health Assessment of Older Adults

View Set