Exam 2 Part 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking.

The Internet is based on which three key technologies?

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Which of the following is a worm that uses flaws in Windows software to take over a computer remotely?

Conficker

The intentional defacement or destruction of a website is called:

Cybervaldalism

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.

Digital

Which of the following statements about edge computing is not true?

Edge computing increases delays in the transmitting and processing of data.

In the context of data mining, the term sequences refers to:

Events linked over time

A grouping of characters into a word, a group of words, or a complete number is called a field.

False

Digital resiliency focuses solely on the resiliency of the IT function.

False

Only computers behind a corporate firewall are trusted by default when using a zero-trust framework.

False

XML is limited to describing how data should be presented in the form of web pages, while HTML can perform presentation, communication, and storage of data.

False

Which of the following is not a type of input device?

Flat panel (LCD) display screen

Which of the following best describes the importance of creating an accurate data model for your business's database?

It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.

Which of the following statements about botnets is not true?

It is not possible to make a smartphone part of a botnet.

Which of the following statements about Internet security vulnerabilities is not true?

Large public networks, such as the Internet, are less vulnerable than internal networks.

Mobile game developer Yile Technology chose which of the following to store its game's customer profile data?

MongoDB Atlas

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

Normalization

Most computer viruses deliver a:

Payload

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

Peer-to-peer network

Which of the following is a type of logical database model that treats data as if they were stored in two-dimensional tables?

Relational Database

Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?

Router

________ refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down.

Scalability

Which of the following types of computers would you use to support a computer network?

Server

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website that asks for personal information. This is an example of which of the following?

Spear phishing

Which of the following types of computers is traditionally used for scientific exploration and simulations?

Supercomputer

Which of the following types of software manages the resources and activities of a computer?

System Software

Which of the following best illustrates the relationship between entities and attributes?

The entity CUSTOMER with the attribute ADDRESS

Which of the following statements is not true about search engines?

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

In a relational database, a table contains all of the following except:

Three-dimensional relations

Which of the following is an example of a legacy system?

Transaction processing system running on a mainframe

A computer network requires at least two computers.

True

A private cloud is operated for the benefit of a single organization but may be managed by a third party and located off-premises.

True

Client/server computing has largely replaced centralized mainframe computing.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

Data governance encompasses an organization's policies and procedures through which data can be managed as an organizational resource.

True

DoS attacks flood a network server with thousands of requests for service.

True

Most data quality problems stem from errors during data input.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

True

The Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack.

True

Which of the following is the foundation technology for web services?

XML

The project operation:

creates a subset consisting of columns in a table.

DSL (Digital subscriber line):

operates over existing telephone lines to carry voice, data, and video.

The HIPAA Act:

outlines medical security and privacy rules.

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

A data governance policy specifies all of the following except:

the structure of the company's database.


Kaugnay na mga set ng pag-aaral

ATI Systemic Lupus Erythematosus

View Set

AP Statistics Semester One Review

View Set

Social Psychology Final Study Set

View Set

Medical Math, Bloodborne Pathogens, and Safety Precautions

View Set

PHARM - Immune / Infection ATI Questions / Kahoot / Wipe Out

View Set

Missouri Statutes, Rules and Regulations Pertinent to Life Only

View Set

Econ Final Exam Quiz and Test Answers

View Set

Econ 520 - Jin Wang - Homeworks 1-7 multiple choice questions

View Set