BAIS Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements about botnets is not true?

It is not possible to make a smartphone part of a botnet.

Which of the following statements about Internet security vulnerabilities is not true?

Large public networks, such as the Internet, are less vulnerable than internal networks.

Which of the following is a core part of the zero-trust framework?

Least privilege access

Which type of network is used to connect digital devices within a city or metropolitan area?

MAN

Which of the following technologies is used to reduce Wi-Fi network interference from nearby systems in the same spectrum?

MIMO

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

Each computer on a network must contain which of the following?

NIC

________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.

Operational

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

Peer-to-peer network

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

Which of the following pulls content from websites and feeds it automatically to a user's computer?

RSS

Which of the following is a type of malware that takes control of a user's computer, blocking access to files, and demands payment in return for giving back access?

Ransomware

Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?

Router

Which of the following is the undisputed global market leader in cloud-based CRM systems?

Salesforce.com

A statement ranking information risks and identifying security goals would be included in which of the following?

Security policy

Which of the following enables a business to connect customer conversations and relationships from social networks to CRM processes?

Social CRM

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website that asks for personal information. This is an example of which of the following?

Spear phishing

The two primary protocols used for secure information transfer over the Internet today are:

TLS and HTTPS

Which of the following statements about the results of a 2022 survey of 140 ERP users conducted by Panorama Consulting Group about enterprise application implementation challenges is not true?

Technical issues were the most common reason for cost overruns.

Which of the following Internet services enables remote logon onto another computer?

Telnet

Which of the following statements is not true?

The Internet backbone is owned by the federal government in the United States.

Which of the following statements about blockchain is not true?

The data represented in a blockchain is maintained in a central database.

Which of the following statements is not true about search engines?

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

Companies that own Internet back networks are called:

Tier 1 ISPs

Which of the following deals with the "last mile of service" and provides Internet access to consumers and businesses?

Tier 3 ISPs

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

UTM

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

War driving

The 802.11 set of standards is known as:

Wi-Fi

Implementation controls:

audit the systems development process at various points to ensure that the process is properly controlled and managed.

All of the following are currently being used as traits that can be profiled by biometric authentication except:

body odor

Evil twins are:

bogus wireless network access points that look legitimate to users.

The domain name "https://books.pearson.com," which element is the third-level domain?

books

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

bps

Operational CRM applications include tools for all of the following except:

calculating CLTV

The measurement of the number of customers who stop using or purchasing products or services from a company is called:

churn rate

The traditional telephone system is an example of a ___________ network.

circuit-switched

The intentional defacement or destruction of a website is called:

cybervandalism

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

A(n) ____________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.

digital

A cracker is an ethical hacker hired by an organization to test the organization's security measures

false

Apple's iOS operating system is the mobile platform targeted by most hackers.

false

Computer networks are based on the same principles as traditional telephone networks.

false

Digital resiliency focuses solely on the resiliency of the IT function.

false

Fiber-optic cable is less expensive and easier to install than other physical transmissions media.

false

Internet2 is an advanced networking consortium focused on the development of the metaverse.

false

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

false

Only computers behind a corporate firewall are trusted by default when using a zero-trust framework.

false

RFID technology is being gradually replaced by less costly technologies such as WSNs.

false

The updated WPA2 standard has eliminated all vulnerabilities that might allow attackers to recover passwords.

false

When a hacker gains access to a database containing personal private information and uses the information to impersonate someone, this is an example of:

identity theft

The Sarbanes-Oxley Act:

imposes responsibility on companies and management to safeguard the accuracy of financial information.

A Trojan horse:

is software that appears to be benign but does something other than expected.

DSL (Digital subscriber line):

operates over existing telephone lines to carry voice, data, and video.

The HIPAA Act:

outlines medical security and privacy rules.

Most computer viruses deliver a:

payload

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:

phishing

Wireless sensor networks (WSNs) are used for the following tasks except:

processing consumer transactions

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

radiation

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

sniffing

The domain .gov is a(n):

top-level domain

A computer network requires at least two computers.

true

A hub is a networking device that spends packets of data to all other devices on the network.

true

All 50 states have enacted legislation requiring private or governmental entities to notify individuals of security breaches involving their personally identifiable information.

true

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.

true

Analytical CRM uses tools to analyze customer data collected from the firm's customer touch points and from other sources.

true

Authentication refers to verifying that a person is who he or she claims to be.

true

Churn rate is an important indicator of the growth or decline of a company's customer base.

true

Client/server computing has largely replaced centralized mainframe computing.

true

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

true

Computer networks that use packet switching are more efficient than telephone networks that use circuit switching.

true

DoS attacks flood a network server with thousands of requests for service.

true

HTTPS uses TLS for encryption and authentication.

true

In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.

true

In addition to being an online retailer, Amazon is also a powerful product search engine.

true

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

true

Phishing is a form of spoofing.

true

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

true

The Internet is the largest implementation of client/server computing.

true

The Internet of Things refers to a vision of a pervasive Internet/Web, in which common objects are connected to and controlled via the Internet.

true

The Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack.

true

The dark web is intentionally hidden from search engines and is assessable only with a special web browser.

true

Web-based self-service capabilities are a part of certain CRM systems.

true

Web3 is envisioned as being even more decentralized than the current Internet and would be controlled by its users rather than dominated by big corporations.

true

Together, a protocol prefix, a domain name, a directory path, and document name, are called a(n):

uniform resource locator

A ___________ is software for locating and managing stored web pages.

web server

Which signal types are represented by a continuous waveform?

Analog

What are the four layers of the TCP/IP reference model?

Application, Transport, Internet, and Network Interface

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking.

The Internet is based on which three key technologies?

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Which of the following is a worm that uses flaws in Windows software to take over a computer remotely?

Conficker

Cloudflare suffered which of the following types of attacks?

DDoS

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Disaster recovery planning

Which of the following statements about enterprise applications is not true?

Enterprise applications are best implemented when extensive changes in business processes are required.

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

$1,250

The WiMax standard can transmit up to a distance of approximately:

30 miles

Search engine marketing accounts for almost ___________ of digital ad spending.

40 percent

Which of the following statements about 5G is true?

5G is designed to support the transmission of data in the gigabit range.

Which of the following is not an example of a computer as a target of crime?

Illegally accessing stored electronic communication


Ensembles d'études connexes

Pediatrics Test 3: GU, NEURO, CV

View Set

Series 79 Practice Quiz Section 2

View Set

Legal Environment of Business Unit 1 Test

View Set

Stat 210 Final Study Guide Part 1

View Set

marketing ch.9, marketing ch.10, marketing ch.12

View Set

Salesforce Marketing Cloud Admin Test 2

View Set

2: Solutions 2.01: Solutions: Wiva k12 Chemistry

View Set

Advance auto parts Emissions assessment

View Set