Technology at Your Service, Concepts Review: Chapter 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Wi-Fi radio signals operate on either the 2.4 GHz or ___ GHz bands. 3 4.7 5 0.7

5

We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions. Big data Data validation Data mining Data warehouse

Big data

___ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered. Risk assessment Data validation Data mining Interoperability

Data validation

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business. True False

False

IoT devices, such as Internet-connected video cameras, are generally immune from being comprised by hackers. True False

False

The ___ lock can make it difficult for thieves to steal a laptop. Kensington Ethernet DSS TPS

Kensington

___ involves luring individuals into entering personal information into a website controlled by the hacker. Switching Phishing Pretexting Striping

Phishing

___ is gaining someone's trust by pretending you are someone else. Switching Phishing Pretexting Authentication

Pretexting

The information system that handles the processing and tracking of transactions is called a(n): TPS MIS office automation system DSS

TPS

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat? The probability of a threat The degree of vulnerability The likelihood of user compliance The penalty or injury that may occur if the threat succeeds in causing harm

The likelihood of user compliance

A is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. virus zombie worm Trojan horse

Trojan horse

An MIS system can provide different types of information or summaries to managers at different levels. True False

True

Hacking on the largest possible scale, often referred to as ___ is conducted by countries, terrorist organizations, and large independent hacking groups. cyberwarfare RAID nuclear hacking social engineering

cyberwarfare

Many types of software and devices use ___ to scramble your data Or communication. attenuation RAIDs encryption WAPs

encryption

Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure. expert systems MIS mission-critical

mission-critical

A(n) ___ is a connection point in a network. node hotspot intranet TPS

node

The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief. DDoS ransomware pretexting phishing

ransomware

Hackers often set up ____ in areas such as airports where users are a expecting to find a free, wireless access point. nodes rogue hotspots

rogue hotspots

The means used to link together parts of a computer network are referred to as network ___ points hotspots topologies media

topologies

Computers which are under the external control of a hacker are known as: worms zombies nodes extranets

zombies

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat. True False

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity. True False

True

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers. True False

True

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account. User validation Two-factor authentication Authorization VPN

Two-factor authentication

Which of the following is NOT one of the three general strategies that are used to authenticate individuals? What you know What you have Who you know Who you are

Who you know


Kaugnay na mga set ng pag-aaral

13.8.8 - File Encryption - Practice Questions

View Set

6th Grade Social Studies - Australia

View Set

chapter 6: merchandising operations and the multistep income statement

View Set

Example and Application Practice - Midterm 1 PSYC 309A

View Set