CGS chp5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

The likelihood of user compliance

A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan horse

Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

A ___ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

router

A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

surge protector

A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it

switch

Large organizations often use a(n) ___ library for backups and archives of their data.

tape

The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network.

topology

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

true

A network allows users to communicate and share information between computers and various devices.

true

An MIS system can provide different types of information or summaries to managers at different levels.

true

The network that connects the computers in a school's study center or library is considered a LAN

true

A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.

True

In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data.

data analytics

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

worm

Computers which are under the external control of a hacker are known as:

zombies

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethernet

A ___ is a device that connects two LANs or two segments of the same LAN.

bridge

Actions ranging from creating viruses to disrupting computer networks are often referred to as:

cybercrimes

Hacking on the largest possible scale, often referred to as ___, is conducted by countries, terrorist organizations, and large independent hacking groups.

cyberwarfare

The framework known as business intelligence (BI) encompasses all of the data, tools, and strategies used by businesses to improve decision making and make predictions.

true

Wi-Fi radio signals operate on either the 2.4 GHz or ___ GHz bands.

5

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11x

We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions.

Big data

_ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

Coaxial

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

False

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

False

__ computers are able to continue their operation even when problems are present.

Fault-tolerant

_ is the ability of each organization's information system to work with the other, sharing both data and services.

Interoperability

_ involves luring individuals into entering personal information into a website controlled by the hacker.

Phishing

___ is gaining someone's trust by pretending you are someone else.

Pretexting

A(n) ___ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

RAID

___ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

__ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Scalability

_ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Social engineering

__ is a type of malware which is designed to report activity on your computer to another party.

Spyware

When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.

UPS

Any step you take to ward off a threat is called a:

countermeasure

An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.

false

In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.

false

A(n) ___ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft Sharepoint.

intranet

Systems follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

protocols

The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.

ransomware

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

true

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

true

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

true

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus

_ cable normally consists of four pairs of wires that are twisted around each other.

Twisted-pair

__ networks use radio signals that travel through the air to transmit data.

Wireless

The most popular standard for wireless networking is called IEEE-1394 or WiFi-2.

false

The two parts of a packet are the certificate and the key.

false

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

false

oT devices, such as Internet-connected video cameras, are generally immune from being comprised by hackers.

false

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

A(n) ___ examines and blocks Internet traffic in order to protect your private network.

firewall

While storms could be a cause, power ___ are more likely to be caused by disturbances from high-demand equipment in a home or building.

fluctuations

A ___ is a node on a network that serves as an entrance to another network.

gateway

In the early days of computing, a(n) ___ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.

hacker

Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

A ___ provides multiple ports for connecting nodes.

hub

A ___ is used to prevent attenuation when packets are traveling long distances.

repeater

Hackers often set up ___ in areas such as airports where users are expecting to find a free, wireless access point.

rogue hotspots

The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.

scareware

In a(n) ___ topology, all nodes are connected to a hub or switch and communicate through it.

star

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

true

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

true

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

true

The ___ lock can make it difficult for thieves to steal a laptop.

Kensington

Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world.

MAC

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS

The information system that handles the processing and tracking of transactions is called a(n):

TPS

Social engineering is a form of hacking that has a social or political agenda behind it.

false

A type of spyware known as ___ can record the individual keystrokes of a user.

keyloggers

The term ___ encompasses several types of malicious computer programs that are created to harm computer systems and their users.

malware

The means used to link together parts of a computer network are referred to as network:

media

Wireless ___ networks, where nodes connect directly to each other, may be used in large homes or businesses to easily cover the entire area.

mesh

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

A(n) ___, which is a special application that collects and reports certain types of data, can help managers make better decisions.

DSS

__ is the discovery of new patterns or relationships between data.

Data mining

__ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.

Data validation

__ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Two-factor authentication

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

VPN

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.

WAN

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

Who you know

A wireless ___ is the device that all nodes connect to in order communicate wirelessly.

access point

The security principle known as ___ requires that individuals must confirm their identity.

authentication

The security principle known as ___ gives individuals a certain level of access based on who they are.

authorization

Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.

backups

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

bandwidth

A(n) ___ is a central repository that contains stored or archived data gathered from multiple databases.

data warehouse

Many types of software and devices use ___ to scramble your data or communication.

encryption

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.

expert

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.

false

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.

false

Power failures are the primary cause of component failure in computer systems.

false

Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure.

mission-critical

A(n) ___ is a connection point in a network.

node

In an office environment, many organizations set up a(n) ___ to perform various operations such as word processing, accounting, document management, or communications.

office automation system

A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.

true


Ensembles d'études connexes

Section 10: Unit 6 Option Contract and Terminating an Offer in Michigan

View Set

QBank Questions: Course 102 Ch. 3

View Set

Chapter 7- Premature and Small for Date Infants

View Set

chapter 12,13,14 smart book Finance

View Set

Chapter 17: Outcome Identification and Planning

View Set

Licensed Credentials Exam - Assemblies of God (Doctrine)

View Set