BTE Final Exam Part 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Current payment systems require?

third party intermediaries that often charge high processing fees

____ are always recorded in the ledger

transactions

Attack by a programmer, where software programs hide in other computer programs and reveal their designed behavior only when they are activated.

-Trojan Horse

Attacks by a Programmer Developing a System

-Trojan Horse -Back Door -Logic Bomb

Examples of other areas of threats

-contract labor -consultants -janitors -guards

Examples of Communication Controls

-firewalls -anti-malware systems -encryption

Common Human Errors

1. Carelessness with laptops 2. Carelessness with computing devices 3. Opening questionable e-mails 4. Careless Internet surfing 5. Poor password selection and use 6. Carelessness with one's office 7. Carelessness with discarded equipment 8. Careless monitoring of environmental hazards

Five types of blockchain technology

1. Distributed 2. Concensus 3. Secured 4. Immutable 5. Provenance

What are the six steps in programming with C++?

1. Editor 2. Preprocessor 3. Complier 4. Linker 5. Loader 6. Execution

software packages that attempt to identify and eliminate viruses and worms, and other malicious software

Anti-malware Systems

studies the thought processes of humans and recreates the effects of those processes via machines, such as computers and robots. Behavior by a machine that, if performed by a human being, would be considered intelligent.

Artificial Intelligence (AI)

With this type of blockchain technology, everyone (or a Regulator) must validate and approve the new transaction/block.

Consensus

a statutory grant that provides the creators or owners of intellectual property with ownership of the property, also for a designated period.

Copyright

T or F: The Turing test shows intelligent systems are really close to exhibiting significant intelligence.

False

T or F: The absence of errors while compiling a program implies that the program preforms the intended computation successfully

False

a system that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network.

Firewalls

SCADA attacks typically occur on ___________. Hacker networks Industrial control systems Personal computers Government networks

Industrial control systems

This component of the expert system uses a computer program (written using a high-level programming language) that provides a methodology for reasoning and formulating conclusions.

Inference Engine

An attacker either threatens to steal, or actually steals, information from a company. The perpetrator demands payment for not stealing the information, for returning stolen information, or for agreeing not to disclose the information.

Information Extortion

All of the processes and policies designed to protect an organization's information from unauthorized access, use, disclosure, disruption, modification, or destruction.

Information Security

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. -Competitive intelligence -Espionage -Information extortion -Intellectual property

Information extortion

Organization with two firewalls and demilitarized zone

Internet, External Firewall, Servers, Internal Firewall, Corporate LAN Internet.

Basic firewalls for home computer

Internet, Internet Service Provider, Broadband Connection, Home Computer

Biometrics is something the user _______. Does Has Is Knows

Is

What is blockchain?

It is a distributed database leveraging distributed processing it is an unchangeable system of recordkeeping that is seeing a growing use well beyond financial transactions. Data is copied on multiple servers or computers and encrypted into blocks, which are then linked by hashes to previous blocks. This allows the system to reject any non-valid transactions.

This component of the expert system uses direct use of knowledge to solve specific problems in a particular domain.

Knowledge Base

An expert system's ______________________ is composed of facts and rules. A. Explanation subsystem B. Knowledge base C. Inference engine D. User interface

Knowledge base

Knowledge Acquisition

Knowledge is acquired from domain experts or from documented sources.

______________________ is NOT a benefit of an expert system. A. Knowledge accessibility B. Liability C. Productivity D. Reliability

Liability

Attack by a programmer; a segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.

Logic Bomb

Symbol:Parallelogram

Name: -Input/Output Function: -A parallelogram represents input or output

Symbol: Rectangle

Name: -Process Function: -A rectangle represents a process

Symbol: Oval

Name: -Start/end Function: -An oval represents a start or end point.

Symbol: Diamond

Name: -decision Function: -A diamond indicates a decision

Is the subfield of AI that gives computers the ability to interact with humans in a more typical way?

Natural language processing

A system of programs and data structures that simulates the underlying functions of the biological brain

Neural Networks Examples: -Bruce Nuclear Facility (Ontario, Canada) -Research into Diseases (Alzheimer's, Parkinson's, Epilepsy, etc.) -Banking System Fraud Detection

Machine learning systems often use _________ to learn from data. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

Neural networks

___________ are used to research diseases like Alzheimer's, Parkinson's, and epilepsy. A. Expert systems B. Genetic algorithms C. Intelligent agents D. Neural networks

Neural networks

_______________ are "trained" by being fed large amounts of data and rules about data relationships. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

Neural networks

_______________ usually involve a large number of processors operating in parallel. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

Neural networks

The __________________ proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human.

Turing Test

This component of the expert system uses dialogue between the user and the computer triggers the inference engine to match the problem symptoms with the knowledge contained in the knowledge base and then generate advice

User Interface

____ Segment of computer code that performs malicious actions by attaching to another computer program.

Virus

Which of the following is NOT an unintentional threat to information systems? -Careless monitoring of environmental hazards. -Choosing a weak password. -Having an unlocked desk or filing cabinet after going home. -Viruses.

Viruses

Remote attack; segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).

Worm

In a programming language, these commands can be interpreted into?

a code understood by a machine.

New Block is concatenated with prior Block by using ______

a cryptographic hash

A Ledger is ___

a system of records for a business

Neural networks are best used for analyzing ________ data. A. complex, complete B. complex, incomplete C. simple, complete D. simple, incomplete

complex, incomplete

A programming language is a ____

computer language engineered to create a standard form of commands.

In C++ what does a text editor do?

create the source code (source program

In the blockchain, every recording uses ______ or _______

private cryptographic key, digital signature

For nonrepudiation, the sender encrypts plain text using a ____ while the receiver uses the sender's ____ to decrypt it. Thus, the receiver knows who sent it.

private key, public key

asymmetric encryption; the sender encrypts the information using the receiver's _____. The receiver decrypts the message using his/her ____.

public key, private key

in C++, begin with the symbol __ and are processed by the __

#, preprocessor

How to write code in C++

#include <iostream> using namespace std; int main() { cout << "My first C++ program." << endl; return 0; }

Information Security Controls

- Physical Controls - Access Controls - Communication Controls

Compromises to intellectual property; the property created by individuals or corporations that is protected

- Trade Secret - Patent - Copyright

What are the four facts about Bitcoin?

-An unregulated shadow-currency -Created as a decentralized digital currency exchange system to exchange digital currency without the banks as intermediaries, while keeping (pseudo) anonymity -Resource intensive (requires Proof of Work Consensus) -Created in 2008 after the Global Financial crisis

What does the complier do?

-Check that the program obeys the language rules -Translate the program into machine language (object program)

Remote Attacks Needing No User Action

-Denial of Service Attack -Distributed Denial of Service Attack

What two areas pose significant threats in human errors?

-Human Resources -Information Systems

What are the two types of alien software?

-Spyware -Adware

What are the five factors that contribute to vulnerability?

-Today's interconnected, interdependent, wirelessly networked business environment -Smaller, faster, cheaper computers & storage devices -Decreasing skills necessary to be a computer hacker -International organized crime taking over cybercrime -Lack of management support

Benefits of Expert Systems

1. Increased output and productivity: ESs can configure components for each custom order, increasing production capabilities. 2. Increased quality: ESs can provide consistent advice and reduce error rates. 3. Capture and dissemination of scarce expertise: Expertise from anywhere in the world can be obtained and used. 4. Operation in hazardous environments: Sensors can collect information that an ES interprets, enabling human workers to avoid hot, humid, or toxic environments. 5. Accessibility to knowledge and help desks: ESs can increase the productivity of help desk employees, or even automate this function. 6. Reliability: ESs do not become tired or bored, call in sick, or go on strike. They consistently pay attention to details. 7. Ability to work with incomplete or uncertain information: Even with an answer of "don't know," an ES can produce an answer, although it may not be a definite one. 8. Provision of training: The explanation facility of an ES can serve as a teaching device and a knowledge base for novices. 9. Enhancement of decision-making and problem-solving capabilities: ESs allow the integration of expert judgment into analysis (e.g., diagnosis of machine malfunction and even medical diagnosis). 10. Decreased decision-making time: ESs usually can make faster decisions than humans working alone. 11. Reduced downtime: ESs can quickly diagnose machine malfunctions and prescribe repairs.

What are the three components of expert systems

1. Knowledge Base 2. Inference Engine 3. User Interface

Difficulties of Using Expert Systems

1. Transferring domain expertise from human experts to the expert system can be difficult because people cannot always explain what they know 2. Even if the domain experts can explain their entire reasoning process, automating that process may not be possible 3. In some contexts, there is a potential liability from the use of expert systems.

Remote Attacks Requiring User Action

1. Virus 2. Worm 3. Phishing Attack 4. Spear Phishing Attack

Which of these facts about a Ledger is NOT correct? 1. A ledger describes the inputs and outputs of a business 2. A ledger consists of transactions, often governed by contracts 3. A ledger is used purely for reporting of cash 4. A ledger is a system of record

A ledger is used purely for reporting of cash

Which of the following is NOT one of the most dangerous employees to information security? -Accountants -HR employees -Janitors -MIS employees

Accountants

Knowledge Representation

Acquired knowledge is organized as rules or frames (object-oriented) and stored electronically in a knowledge base.

You are a doctor at a successful practice in the US. You are contacted by WebMD.com to provide your expertise on your successful new cancer identification technique. This is considered knowledge _______. A. Acquisition B. Inferencing C. Representation D. Transfer

Acquisition

software that is installed on your computer through duplicitous methods

Alien Software

What is bitcoin? 1. A private network 2. Another name for blockchain 3. An unregulated shadow currency 4. The technology that underpins the Ledger

An unregulated shadow currency

_____Determines which actions, rights, or privileges the person has, based on his or her verified identity.

Authentication

Which of the following is the correct order of the steps of programming with C++? A. 1. Editor 2. Preprocessor 3. Complier 4. Loader 5. Linker 6. Execution B. 1. Editor 2. Preprocessor 3. Complier 4. Linker 5. Loader 6. Execution C. 1. Preprocessor 2. Editor 3. Complier 4. Loader 5. Linker 6. Execution D. 1. Preprocessor 2. Editor 3. Loader 4. Complier5. Linker 6. Execution

B. 1. Editor 2. Preprocessor 3. Complier 4. Linker 5. Loader 6. Execution

Attack by a programmer; typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.

Back Door (also called a trap door)

Anonymity is important. Blockchain or Bitcoin?

Bitcoin

Based on Proof of Work Blockchain or Bitcoin?

Bitcoin

Transactions are viewable by all members of the network. Blockchain or Bitcoin?

Bitcoin

Each new record (write) to the database is a___

Block

In the context of blockchain, the transaction is represented online as a?

Block

Identity of members is known. Blockchain or Bitcoin?

Blockchain

Permissioned network. Blockchain or Bitcoin?

Blockchain

Bitcoin is based on ____

Blockchain methodology

Which of the following is NOT an example of alien software? Adware Blockware Spamware Spyware

Blockware

Examples of different programming languages

C C++ Java Python

In C++, something thats used to give an input from a keyboard?

C-in

Which of the following is a characteristic of AI? A. Difficult and expensive to duplicate and disseminate knowledge B. Erratic and inconsistent total cost of knowledge C. Low creativity D. Knowledge isn't preserved well

C. Low creativity

___ guarantees that the program follows the rules of the language, it does not guarantee that the program will run correctly

Compiler

_____ identifies the syntax errors and also suggests how to correct them

Complier

______ converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format

Cryptography

Which of the following is NOT an example of a machine learning system? A. Customer detection B. Face recognition C. Fraud detection D. Spam recognition

Customer detection

Identify which customers may respond positively to a particular promotion.

Customer segmentation

Malicious acts in which attackers use a target's computer systems, particularly via the Internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

Cyberterrorism and Cyberwarfare

The computer expert system that beat Gary Kasparov in chess?

Deep Blue

An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function)

Denial of Service Attack

An attacker first takes over many computers, typically by using malicious soft ware. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.

Distributed Denial of Service Attack

The primary method that the blockchain network will improve the way business interact?

Distributed Ledger; all counter parties can save time when recording transactions

the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Encryption

Involves the unauthorized viewing and accessing of data

Espionage

____ An unauthorized individual attempts to gain illegal access to organizational information.

Espionage or Trespass

___________ are the most widely applied and commercially successful intelligent systems. A. Expert systems B. Genetic algorithms C. Intelligent agents D. Neural networks

Expert systems

Symbol: Arrow

Function: -A line is a connector that shows relationships between the representative shapes

A smart ID card is something the user _______. Does Has Is Knows

Has

In the blockchain network, ______ are mainly used to ensure that a file has remained unchanged.

Hash functions

Greater Threat =

Higher level employees + greater access privileges

Acts performed without malicious intent that nevertheless represent a serious threat to information security

Human Errors

The computer expert system that defeated Jeopardy! game show contestants?

IBM Watson

Deliberate assumption of another person's identity, usually to gain access to his or her financial information or to frame him or her for a crime.

Identity Theft

Printed, handwritten characters are recognized automatically based on previous examples.

Optical character recognition

Blockchain consists of multiple parties that are also known as?

Peers

use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.

Phishing Attack

What are Physical Controls?

Prevent unauthorized individuals from gaining access to a company's facilities. Common physical controls include walls, doors, fencing, gates, locks, badges, guards, and alarm systems.

Which of the following is not a use of neural networks? Bruce Nuclear Facility Research into Diseases Banking System Fraud Detection Preventing money-laundering

Preventing money-laundering

It is a set of rules, symbols, and special words

Programming language

This type of blockchain technology blocks must show connection to (fingerprint of) prior block, keeping a trail

Provenance

In cryptography, the sender decrypts the information using the receiver ___, the receiver decrypts using their ___

Public Key, Private Key

Knowledge __________ occurs when knowledge is organized as rules or frames and stored electronically in a knowledge base.

Representation

What are Access Controls?

Restrict unauthorized individuals from using information resources and involve two major functions: authentication and authorization

_____ are used to monitor or to control chemical, physical, and transport processes such as those used in oil refineries, water and sewage treatment plants, electrical generators, and nuclear power plants.

SCADA systems

You start browsing your favorite home improvement company's website and notice someone has changed all the logos to their main competitor's logos. This is an example of ___________. -Espionage -Identity theft -Information extortion -Sabotage

Sabotage

Deliberate acts that involve defacing an organization's Web site, potentially damaging the organization's image and causing its customers to lose faith.

Sabotage or Vandalism

Phishing is an example of __________. -Copyright infringement -Espionage -Sabotage -Remote Software attack

Software attack

What is Adware?

Software that causes pop-up advertisements to appear on your screen.

What is Spyware?

Software that collects personal information about users without their consent.

includes voice and signature recognition.

Something the user does

regular identification (ID) cards, smart ID cards, and tokens.

Something the user has

also known as biometrics, examines a person's innate physical characteristics (e.g., fingerprint scans, palm scans, retina scans, iris recognition, and facial recognition).

Something the user is

includes passwords and pass phrases.

Something the user knows

target large groups of people. attack the perpetrators find out as much information about an individual as possible to improve their chances of gaining personal information.

Spear Phishing Attack

Solving a Problem with Programming

Step 1: Analyze the problem Step 2: Implement the algorithm Step 3: Maintain the program

Knowledge Inferencing

The computer is programmed so that it can make inferences based on the stored knowledge.

In the context of blockchain what is a node?

The computers that are connected to the network

In a "While Loop" which of the following is true?

The expression provides an entry condition to the loop

Knowledge Transfer

The inferenced expertise is transferred to the user in the form of a recommendation.

Computing and storage devices (powerful with vastly increased storage) are becoming smaller and as a result easier to be stolen.

Theft of Equipment or Information

Categorize news articles as to whether they are about politics, sports, entertainment, and so on.

Topic identification

an intellectual work, such as a business plan, that is a company secret and is not based on public information.

Trade Secret

Coca-Cola's formula is an example of a ___________. Copyright Patent Trade secret All of the above

Trade secret

You are the HR manager at ABC Corp. You are using an expert system to "score" candidates for the new sales manager job. The scores you receive are an example of knowledge __________. A. Acquisition B. Inferencing C. Representation D. Transfer

Transfer

_____ is the use of secret numerical codes to scramble messages. a. Encryption b. Graphics c. Decryption d. Conversion

a. Encryption

A _____ does not replicate itself; it most often enters the computer, at the user's request, masquerading as a harmless data file. a. Trojan horse b. Worm c. Virus d. All of the above

a. Trojan horse

Denial of service (DOS) attacks _____. a. prevent legitimate users from accessing networks or Web sites b. result when users fail to make payments to their service providers c. are mere threats from hackers pretending to be the Internet service provider d. are examples of phishing

a. prevent legitimate users from accessing networks or Web sites

Information is _____. a. the useful interpretation of facts and figures b. names and number from a large phonebook c. raw facts and figures d. proven facts

a. the useful interpretation of facts and figures

A virus typically infects a system when _____. a. the user opens the contaminated file. b. the user tries to delete the contaminated file. c. the user shuts his or her system off. d. the user attempts to transmit data.

a. the user opens the contaminated file

in the buying organization, a transaction _____ onto the ledger

adds assets

In programming, an ____ is a step-by-step problem-solving process

algorithm

What is a patent?

an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

A ___________ is a remote attack requiring user action. back door denial-of-service attack logic bomb phishing attack

phishing attack

Which statement is true regarding firewalls? a. They are located within individual monitors. b. They filter all messages to the user's security policy. c. They serve as a "traffic switch," telling a message where to go. d. They do none of the above.

b. They filter all messages to the user's security policy.

_____ can travel from computer to computer without your needing to open any software to spread the contaminated file. a. Computer viruses b. Worms c. Trojan horses d. All of the above

b. Worms

Keyboards, monitors, and printers are types of _____. a. control b. hardware c. software d. databases

b. hardware

Spyware is downloaded by users _____. a. in order to prevent viruses from attacking b. who are likely not aware that their computer activities will be monitored c. to prevent spam d. who want easy access to their coworkers' files

b. who are likely not aware that their computer activities will be monitored

A ___________ is an attack by a programmer developing a system. back door denial-of-service attack phishing attack virus

back door

A neural network is a system of programs and data structures that simulates the underlying functions of the _____

biological brain

Unlike the _______ which is open, public and anonymous making its security and trust questionable - ______ is private, permissioned and running on smart contracts.

bitcoin application, blockchain for business

it is an unchangeable system of recordkeeping that is seeing a growing use well beyond financial transactions

blockchain

With cryptocurrency each user has _____

both public and individual private keys.

A transaction always happens between ___ and ___

buyer and seller

Data is copied on multiple servers or computers and encrypted into blocks, which are then linked _____ previous blocks. This allows the system to _____ transactions.

by hashes to, reject any non-valid

_____ gain unauthorized access to computers or networks, perhaps in an attempt to steal information. a. Phishers b. Pharmers c. Hackers d. Spammers

c. Hackers

Greg feels comfortable that no one can open and read his e-mails. He must have _____. a. anti-virus software b. spyware c. encryption software d. a Trojan horse

c. encryption software

The company's security policy includes access rules that identify every type of message that the company does not want to pass through the _____. a. spyware b. router c. firewall d. switch

c. firewall

Expert systems ______ replace human experts by applying expertise in a _____ domain. A. can; general B. can; specific C. cannot; general D. cannot; specific

can; specific

in C++, what does a linker do ?

combines object program with other programs in the library to create executable code

A firewall is a _______ control. access communication physical virtual

communication

Information technology is improving _____. a. big businesses b. small businesses c. start-up businesses d. all of the above

d. all of the above

Sally received an e-mail message that offered her free software to help her count calories. This email message could be _____. a. an attempt to attach spyware to her computer b. spam c. a Trojan horse d. any of the above

d. any of the above

Phishing involve the use of _____. a. intellectual property theft b. firewalls that prevent hacking c. viruses sent from one station to another in a LAN d. deceptive e-mails that imitate popular Web sites

d. deceptive e-mails that imitate popular Web sites

In the blockchain, transactions are recorded in the ___?

database

A ___________ is a remote attack needing NO user action. back door denial-of-service attack logic bomb phishing attack

denial-of-service attack

In C++, an Integrated Development Environment (IDE)....

develop programs in a high-level language

Machine-to-machine payment using the bitcoin protocol could allow for?

direct payment between individuals, as well as support micropayments.

This type of blockchain technology is a ledger that keeps records of transactions, value, and ownership of assets. Copies of recording (ledger) are kept in different databases

distributed

Weak passwords are a(n) ___________ threat. -outside -employee -hardware -software

employee

With blockchain technology, for consumers, this means you will be able to scan a code on an item you want to buy and find out _____

exactly where it has been before landing in your hands.

In a logic flow (while loop repetition), an infinite loop continues to _____

execute endlessly (expression never false)

In a logic flow (while loop repetition), the _____ provides an entry condition to the loop

expression

Two-way selection syntax (Logic Flow)

if (expression) statement 1 else statement 2 IF expression is true, statement1 is executed; otherwise (else), statement2 is executed

This type of blockchain technology; once a transaction is recorded into a block, a block can't be changed nor deleted

immutable

Cybercriminals _________ -are violent criminals. -can be easily arrested, once they are found. -don't make that much money; they do it for fun. -target known software security weaknesses.

target known software security weaknesses.

Cryptocurrency operates ____

independently of a central bank.

Knowledge ____________: the computer is programmed so that it can make inferences based on the stored knowledge.

inferencing

The term ________ describes the various commercial applications of artificial intelligence.

intelligent systems

The Turing test involves a human and computer ______________. A. answering the phone B. interviewing C. playing Jeopardy! D. playing chess

interviewing

what is cryptocurrency?

is a digital currency that uses cryptography for security measures.

Neural networks usually involve a _______ number of processors operating in _____. A. large; parallel B. large; real-time C. small; parallel D. small; real-time

large; parallel

In C++, the ___ contains prewritten code you can use

library

In C++, the ___ executable program into the main memory

loader loads

Programming is a process ___

of problem solving

Transactions/Blocks are processed

one at a time

With a private key, only the _____

owner can access it

in the selling organization, a transaction ____ from the ledger

removes assets

This type of blockchain technology uses cryptography to process digital transactions or verifiable digital signature

secured

Businesses agree on Contracts, which __

set conditions of transactions

In programming, a ___ is achieved in a finite amount of time

solution

In a logic flow (while loop repetition), the _____ (body of the loop) continues to execute until the expression is no longer true

statement


Ensembles d'études connexes

ABC-er og leseopplæringsmetoder

View Set

Chapter 24 reproduction of animals

View Set

1) Why was the Berlin Wall built?

View Set

Intro to Environmental Science Quiz Review 7, 8, 9

View Set

Chapter 9: Uninsured / Under-insured motorist coverage

View Set

ATI RN Nursing Care of Children Online Practice 2019 B

View Set