INFO360 - Exam 3 - Quiz
What types of organizations do phishing attempts commonly disguise themselves as?
- banks - insurance - financial institution
What are trojan horses commonly used to install?
- key loggers - packet sniffers
What are some symptoms of computer viruses?
- must restart / reboot frequently - critical files delete automatically - prevalent error messages - difficulty saving documents - computer runs slowly
What are some examples of on-going cybercrimes?
- stalking - child predation - blackmail / extortion - terrorism
What are the various purposes of malware (malicious software)?
- steal info - destroy data - hinder computer / network operation - frustrate the user
What are examples of cybercrimes committed during a single event?
- trojan horse - phishing - keystroke logger - identity theft
How does one defend against rootkits?
- update software regularly - be aware of phising emails - watch out for drive-by downloads
How are web-based applications structured?
- web client - server - corporate info systems linked to a database
What are the four steps businesses use to help protect themselves from natural disasters?
1. continuity plan 2. off-site cloud storage 3. data inventory maintenance 4. geographic data redundancy
What are the two types of cyberattacks?
1. disable the computer 2. gain access to the computer's data
How do viruses infect computers?
1. virus arrives via email, file download, or infected website 2. running or opening file activates the virus 3. virus copies itself to other parts of the computer 4. virus spreads to other computers via email, file download, or infected website 5. payload (executes malicious activity)
Why is a target market important to businesses and organizations? A) A target market is the group of consumers most likely to purchase an organization's products and services. B) A target market includes social media users identified as most active on a given platform. C) A target market defines the products and services offered by an organization. D) A target market is the group of consumers on which an organization tests its products.
A) A target market is the group of consumers most likely to purchase an organization's products and services.
Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions. A) An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience. B) An organization analyzes the different types of data that Instagram, Twitter, and Snapchat provide for different markets. C) An organization uses third-party software to analyze the data collected by different social media platforms. D) An organization collects data on the type of videos middle-aged women watch on Facebook.
A) An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.
A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information? A) In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it. B) Blockchain would not be appropriate to use to secure healthcare records; however, the practice could look into accepting payments via cryptocurrency. C) Because blockchain can be used for quality assurance purposes, using it in healthcare would ensure that no mistakes were made when treating patients. D) In blockchain, a secure connection is created between computers accessing information. This would prevent unauthorized people from accessing any sensitive data.
A) In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.
A computer network must be connected to the Internet to support A) communicating via email with people on other networks. B) using digital video and audio applications for playback and editing. C) using programs or software that are installed on a networked server. D) maximizing the combined storage space of the networked computers.
A) communicating via email with people on other networks.
A digital device that accepts input, processes and stores the input, and provides output is a ________. A) computer B) modem C) router D) switch
A) computer
What is the name of the study of how people make purchases and why they buy products and services? A) consumer behavior B) demographic marketing C) market process D) economic forecasting
A) consumer behavior
Adding software to a digital device, or adding hardware components to a digital device is called ________. A) installing B) booting C) importing D) uninstalling
A) installing
The main advantage of the IPv6 format for IP addresses is that A) it can accommodate many more addresses than the IPv4 format. B) it is shorter and easier to remember than addresses in the IPv4 format. C) it can be given a verbal name without using the Domain Name System (DNS). D) it can be temporarily assigned by your Internet Service Provider (ISP).
A) it can accommodate many more addresses than the IPv4 format.
What manages hardware and software, supports the computer's basic functions, and runs programs? A) operating system B) RAM C) ROM D) BIOS
A) operating system
With Web 3.0, everyday devices connected to the Web will become A) smarter and more capable, given the improved support for the Internet of Things (IoT). B) less expensive, given the use of artificial intelligence in manufacturing instead of workers. C) ubiquitous (everywhere at the same time), given the billions of new smartphone users. D) more interactive, given the billions of web pages that will start supporting user participation.
A) smarter and more capable, given the improved support for the Internet of Things (IoT).
What devices does the walware EventBot, target?
Android devices
Trojans are easily detected by most antivirus software programs. A) True. B) False.
B) False.
A gigabyte equals approximately one ________ bytes. A) thousand B) billion C) million D) trillion
B) billion
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer. A) phablet B) laptop C) desktop D) server
B) laptop
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________. A) desktop B) tablet C) laptop D) server
B) tablet
Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger. A) mice B) touchscreens C) microphones D) webcams
B) touchscreens
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to A) hold virtual meetings online via teleconferencing or video-conferencing features. B) view, edit, and add shared information in real time, from anywhere. C) be given access to each other's workspaces and files, for micro-management. D) complete their work using personal devices such as smartphones or tablets.
B) view, edit, and add shared information in real time, from anywhere.
What is the difference between a cloud service and a web service? A) A cloud service provides organizations and groups of individuals with the ability to communicate easily, whereas a web service provides individuals the ability to connect with the Internet. B) A cloud service provides the software needed for devices and systems to communicate with each other, whereas a web service provides users with increased computing power and data management. C) A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other. D) There is no difference between cloud and web services.
C) A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________. A) Memory management B) Download manager C) Control panel D) Device manager
C) Control panel
Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet? A) hardware called routers and the packets of information transmitted by the routers B) government-owned servers and the many, private servers of connecting networks C) a "backbone" of connected hardware and a suite of Internet protocol software D) fiber optic/coaxial cables and cellular/satellite signals that both act as communication media
C) a "backbone" of connected hardware and a suite of Internet protocol software
Each time a user clicks or interacts on a social media website A) the user's identity creates a data point. B) connections to other posts and sites occur. C) a data point that can be analyzed is recorded. D) data on behavior is harvested.
C) a data point that can be analyzed is recorded.
The primary goal of a company's social media strategy is to A) entertain media users. B) test future strategies. C) engage potential customers. D) expand company services.
C) engage potential customers.
The amount of time that passes between when a device is asked to perform and when it completes the task is known as A) drag. B) lead time. C) latency. D) recovery.
C) latency.
What is the key reason to implement cloud computing into one's personal and/or business data and information processing? A) Cloud computing provides safer access to the Internet. B) Cloud computing bypasses the need for user passwords and login information. C) Cloud computing allows single users to access shared files. D) Cloud computing diminishes the need to store files and software on a local drive.
D) Cloud computing diminishes the need to store files and software on a local drive.
Which of the following is not a presentation software term? A) Slide B) Speaker Notes C) Slide Master D) Speaker Image
D) Speaker Image
Which is the best explanation of how the World Wide Web (WWW) differs from the Internet? A) The web supports a greater variety of content than the Internet, including audio and video. B) The web's webpages are connected using URLs and hyperlinks, not servers like the Internet. C) The web's standards and protocols are different from those for the Internet, like TCP/IP. D) The web is only one of many applications that runs on and is accessed through the Internet.
D) The web is only one of many applications that runs on and is accessed through the Internet.
An effective social media information system (SMIS) collects and analyzes data about the organization's A) sales or other income generated from its social media activities. B) employees and their work-related activities on social media. C) paid and free advertising on social media and resulting exposure. D) activities and audience on social media and its own website(s).
D) activities and audience on social media and its own website(s).
A high-end jewelry designer creates several different brands of jewelry for women of different ages and tastes. To gain the greatest exposure to her potential customers on social media, her SMIS should be designed to use the platforms that A) enable her to purchase ads that will target and reach her main market. B) have the greatest reach among women who purchase high-end jewelry. C) will best support posts that market her jewelry with photos and videos. D) are most used by the target markets for each jewelry line or brand.
D) are most used by the target markets for each jewelry line or brand.
What is the first step in the six-step process of creating an SMIS? A) analyze and evaluate collected data B) connect potential customers with products and services C) define the organization's target market D) create system goals that align with the goals of the organization
D) create system goals that align with the goals of the organization
Which of the following is a strength of the Linux platform? A) most widely used OS in desktops and laptops B) most widely used OS in smartphones and tablets C) less susceptible to viruses than Mac OS D) free to download and use
D) free to download and use
Some popular social media management systems are becoming more difficult to manage because A) SMIS provider leadership teams face management challenges. B) hardware and software technology is not keeping up with user demand. C) costs continue to rise as technology becomes more complex. D) millions of diverse users across the globe are active participants.
D) millions of diverse users across the globe are active participants.
Components of a social media information system (SMIS) combine to A) support social media awareness by aligning data and procedures. B) form and inform an organization's social media objectives. C) coordinate the work of separate business functions through social media. D) support a company's marketing strategy through social media.
D) support a company's marketing strategy through social media.
What does NIST stand for?
National Institute of Standards and Technology (NIST)
Which type of computer is more commonly attacked by viruses?
PCs (not Macs)
What does TBT stand for?
Tiny Banker Trojan
What is a zombie / bot?
a computer being controlled by a hacker in a DoS state
What is a trojan horse?
a program that appears legitimate but executes an unwanted activity when activated
How do you access the Dark Web?
a specific web browser (i.e. Tor)
What is the major difference between a trojan horse and a virus?
a trojan horse doesn't replicate itself
What is a zero-day vulnerability?
a vulnerability in a system or device that has been disclosed but is not yet patched
What is a rootkit?
allows the hacker to secretly control a computer from a remote location
What is a cybercrime?
any crime involving a computer - either as the object of the crime or the object used to commit the crime
What does operational recovery mean?
backup and recovery
What method have organizations been using to deal with cybersecurity?
behavioral science
What do packet sniffers (analyzers) do?
capture packets transmitted over a network
What are black hat hackers?
criminal hackers (aka: hackers / crackers)
What is cyberwarfare?
cyberattacks coming from a foreign government
What are data packets?
data sent across the internet in many small manageable pieces
What does DoS mean?
denial of service (DoS) attack
What does DDoS stand for?
distributed denial of service attack (DoS attacks on many computers)
How does war driving work?
eavesdroppers drive by buildings to detect SSID and gain access to the network
What are packet sniffers (analyzers) used for?
either - routine examination - to steal info
What is spear phising?
email scam directed towards a specific person or organization
What does ransomware do to a computer's data?
encrypts it
What do cyber controls do?
ensures accuracy of information inside the company
How do DoS attacks work?
flood the network w/ too many requests
What is a botnet?
group of computers under the control of the hacker
What are white hat hackers?
hackers that use their skills to help businesses
What is penetration (pen) testing?
hacking services provided by white hat hackers
What is a firewall?
hardware of software used to keep computers secure from outside threats
How do NATs work?
hide internal IP addresses
What is phising?
illegitimate use of email message that appears to be from an established organization
What does IM refer to?
instant messaging threats
What is a cyberattack?
intentional misuse of computer of network using the internet
What is the Dark Web?
internet content not indexed by popular search engines such as Google
What is an evil twin?
malicious WiFi network
What are worms?
malware that copies itself from one computer to other computers over a network
What is ransomware?
malware that makes a computer's data inaccessible until a ransom is paid
What is social engineering?
manipulating people into divulging their confidential info
How does UEBA work?
monitors computer behavior and flags irregular behavior for review
What does NAT stand for?
network address translation
What is the name of the process that packet sniffers go through?
packet capture
What does P2P stand for?
peer-to-peer network
What is the difference between phishing and pharming?
phishing - takes the user to a fake website pharming - compromises a user's real website
What does cyber security do?
prevents unauthorized access from outside the company
What is pharming?
redirects users to bogus website, even when user types in website URL correctly
How do we calculate risk?
risk = threat x vulnerability x asset
What does SSID stand for?
service set identifier
What is a computer virus?
software that infects the host
What is a key(stroke) logger?
spyware that records all actions typed on a keyboard
What is an organization's first step in protecting their systems?
taking a cybersecurity risk assessment
How do states share cybersecurity incidents with the national Cyber Command?
the Cyber 9-Line portal
What is identity theft?
theft of personal info to impersonate someone else
What is different about newer keystroke loggers?
they are cloud-based
What does UEBA stand for?
user and entity behavior analytics (UEBA)
When are data packets sent?
whenever you: - view a webpage - send an email - share a file - etc.
What is a rogue access point?
wireless access point installed on a secure network w/out explicit authorization from a local network administrator
Did cybercrime increase over the pandemic?
yes
Do fixed internet addresses aid in identification by hackers?
yes