CIS 204 exam 2
The radio communication standard used in modern wireless LANs is
802.11
The image below illustrates a feature associated with cloud computing. The variables (the x axis and the y axis of the chart) are "Demand" and "Time." Which feature does it illustrate?
Elasticity
"Internet" and "Web" can be used interchangeably.
False
Which of the following types of transmission wires have the greatest bandwidth?
Fiber optic
_____ is a satellite-based tracking system that enables users to determine a person's position.
Global positioning system
The small geographical perimeter within which a wireless router provides service is called a ________.
Hotspot
When a device connects to a network, it is automatically assigned a(n) _____.
IP address
From left to right, what are the three types of services included in the columns with the hidden headings?
IaaS, PaaS, SaaS
Data is routed through "hubs;" as illustrated in the image below, these "hubs" or ____________ are located around the United States (and around the world).
Internet exchange points or servers
A(n) _____ connects two or more devices in a limited geographical area in which multiple devices could be connected over several hundred feet and for multiple users.
LAN
Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have?
LAN
When you login to Canvas, your request is sent back to JMU for confirmation that you are a member of the JMU community and have permission to access Canvas. JMU checks a database to make sure your credentials are present. It also sends you a message through Duo so you can confirm that you actually made the request. This process is called ______________.
authentication
The online article, "What if the cloud took a hit?" includes the following quote: "Clouds can fail or be brought down in many ways -- ranging from malicious attacks by terrorists to lighting strikes, flooding or simply a mundane error by an employee." The author of the article states that we "need to plan for these eventualities" by ______________.
creating a disaster recovery plan
What is measured in "bits" and written as Kbps, Mbps, etc.?
bandwidth
Keyboards and other "close-proximity" devices use the ________________ standard.
bluetooth
Alisha's startup has another record month. She posts pictures of her best selling handbag to Facebook and Instagram. Her friends and customers leave her positive comments. Alisha's post and her friends' comments are an example of ________.
content data
According to your textbook, which of the following is NOT considered a benefit of cloud computing?
control of data location
Social ________ provide platforms that enable the creation of social networks, or social relationships among people with common interests.
media providers
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
network
When I connected my laptop to JMU's network using a wireless access point on campus, my laptop had a different IP address than when I had connected it to my home wireless system. Does this mean my MAC address also changed?
no
Which of the following terms is NOT typically associated with cloud computing?
on-prem
________________ is a transmission technology that breaks up blocks of text/data into packets.
packet switching
Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________.
phishing
uses deception to acquire sensitive information
phising
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a Post It note and put it on your laptop screen. This is an example of ________________.
poor security
You are an employee of a large pharmaceutical firm that has thousands of drug patents. Your job is to review those patents. To reduce costs, the company has moved to a cloud environment for storage of their patent and other business records. When you access their patent records,you are probably using a ____________ cloud.
private
Which of the following statements is true about IEEE 802.3?
protocol for wired LAN connections
If you subscribe to Adobe.com's SaaS service to have access to Photoshop and other Creative Suite tools, you would be using a _________ cloud.
public
What are the 3 types of cloud environments mentioned in the videos? NOTE: this refers to types of clouds, not types of cloud services.
public, private, hybrid
Mobile cell phones use ________________ signals to connect to cell towers.
radio
The article, "What if the cloud took a hit?" describes the main points of the World Economic Forum (WEF) Global Risks Report 2018. This report indicates that extreme weather and natural disasters, cyberattacks, and cyber warfare are the "the most costly disasters in the world." What type of cyberattack does the report highlight in particular?
ransomware
In the context of IS Security, the _____________ is the defense or protective measure.
safegaurd
IS Security is a trade-off between ___________ and ____________.
security, freedom
________ is the investment in social relations with the expectation of returns in the marketplace.
social capital
targets large groups of people
spear phising
can record your keystrokes or capture passwords
spyware
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
switch
The circled item labeled "A" on the left side is a(n) _________. The circled item labeled "B" on the right side is a(n) _________. Exam_1_A_B.jpg
switch, router
In the context of IS Security, the ___________ is what a criminal wants.
target
Which of the following usually happens in a malicious denial-of-service attack (illustrated in the image below)?
A hacker floods a Web server with many millions of bogus service requests.
A protocol is ____________.
A standard set of rules and procedures for the control of communications in a network.
Use the following image to match the letters on the left with the address component on the right
A=IP address B=URL c=Net ID D=subnet E=domain name F= Domain
In order for computers to route a request such as "www.amazon.com," the _________ must translate the words into numbers.
DNS server
UTP cable connects to the computer through the _________________.
NIC
________ present(s) the largest risk for an organization's infrastructure loss.
Natural disaters
If you're using your Bluetooth headset with your phone, you are using a __________.
PAN
Referring to the image below, which type of cloud service would likely handle all aspects of an application - the software, the resources to run it, and storing the data?
Saas
A ________ is an information system that supports the sharing of content among networks of users.
SMIS
Which of the following categories of cloud services is similar to "taking a taxi" instead of buying or renting a car?
SaaS
"HTTP" indicates the protocol for the WWW.
True
A WAN often uses the internet to transmit data from one location to another.
True
If you were asked to install wire to connect computers, printers, switches and other devices in a LAN, you would probably use ________________.
UTP
The term "tunnel" is most closely associated with which of the following?
VPN
Computers that reside in different geographic locations but are in the same network are physically connected through a(n) ________.
WAN
In order for my laptop to connect to the wireless network, it must have a(n) _____________
WNIC
In the image below, what is the antenna in the circled area called? data_communication_SOHO_sm.jpg
Wireless access point
According to JMU's web page, Safeguard Your Identity and Password, which of the following is the most frequent way that passwords are compromised?
You give them to criminals who fooled you with a "phishing" message or fake web site.
You send an email to a friend across the country. The message leaves your house, goes to your ISP, goes out to the internet and heads towards a "hub" in Northern Virginia. However, that hub is down. What will likely happen?
Your email is redirected to another hum
Jalo was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Jalo's system is ________.
adware
software that automatically pisplays or downloads advertising material
adware
Which of the following is considered a threat caused by human error
an employee inadvertently installing an old database on top of the current one
Verizon and other wireless phone service providers break a geographical area (such as a city) into __________, which allow the company to reuse frequencies multiple times throughout that geographical area.
cells
stiff, high bandwidth capacity, insulated copper
coaxial cable
The storage of ________ differentiates social media information systems (SMIS) from Web site applications.
connection data
In the address, "www.jmu.edu," the "edu" is called a(n) ____________.
domain
Flexible, cheap, can carry signals for 200-300 feet, susceptible to interference
ethernet cable
Only private clouds offer IaaS services.
false
Internet companies probably use ______________ to connect WANS.
fiber optic cable
glass and cladding, very high bandwidth capacity, more secure from interference
fiber optic cable
Exam2_Image2.jpg The ISP in the diagram is often referred to as the __________
gateway to the internet
uses comp to gain unautorized info
hack
Griffin has been working really hard lately and asks his manager for a raise. His manager tells him that he is already the highest paid employee on the floor. Griffin doesn't believe his manager, and illegally accesses the employee database to look at salary data. Griffin's act can be termed as ________.
hacking
A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.
hotspot
Layla is purchasing a new laptop from an online vendor. Which of the following will be displayed in the address bar of the vendor's browser that will let Layla know that the online retailer is using the Secure Sockets Layer (SSL) protocol?
https
HTTP stands for ....
hyper text transfer protocol
If the MAC address changed in my computer, what would have happened?
i replaced the NIC
The overall purpose of the table above is to (TCP/IP layered protocol scheme)
identify the protocols and standards for different aspects of connectivity between computers (from physical to the Web).
According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________.
influence
The most common wireless technology for TV and DVD remote control devices is _______.
infrared
NIC stands for network ______________ card.`
interface
Which of the following statements is true about IEEE 802.3?
it is protocol for wired LAN connections
A ________ is a string of bits used to encrypt data.
key
A _____ is any danger to which an information resource may be exposed.
threat
What is the purpose of a NIC?
to enable access to the network
software that hides in other computer programs
trojan horse
Connection data is data about relationships.
true
Mobile devices such as your phone use the 3G or 4G wireless communication standards.
true
When you send an email to someone in another network, your email content is broken up into pieces, each of which might take a different path to reach the destination.
true
If your request for a web page (for example, when you type in www.amazon.com) goes to a hub that is down, your request will find another hub that will help it reach its destination.
truw
Which of the following types of wire is also referred to as "ethernet cable"?
twisted pair (inshieleded twisted pair)
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
user
Which of the following refers to the three tiers in the three-tier architecture?
user,server,database
________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.
user-generated content
A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.
viral hook
Segment of computer code that performs malicious actions by attaching to another computer program.
virus
An information system's _____ is the possibility that the system will be harmed by a threat.
vulnerablity
________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
web servers
The IEEE standard for __________ networking is 802.11
wireless
segment of computer codes that performs malicious actions and will replicate or spread by itself
worm