Quiz 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____________ is a communications control.

A firewall

Your company decides not to implement security procedures because employees refuse to comply anyway. This is an example of risk ________.

Acceptance

___________ controls restrict unauthorized individuals from using information resources.

Access

The __________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated

Data dictionary

________ is an approach to managing information across an entire organization.

Data governance

__________ is a remote attack requiring no user action.

DoS

_____________ is an access control.

Encryption

____________ deals with more objective, rational, and technical knowledge.

Explicit knowledge

The ____________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

Exposure

The _______ creates links between two tables.

Foreign

A(n) __________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity.

Instance

A data __________ stores vast amounts of data in their original format until they are required, rather than forcing the integration of large volumes of data before analysis.

Lake

A data _________ is a low-cost, scaled-down version of a data _________ that is designed for the end-user needs in an SBU or an individual department.

Mart; warehouse

________ are a set of core data that span the enterprise information systems.

Master data

A _____________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

Patent

_____________ is a possible solution to the ransomware problem but is not recommended by the FBI.

Pay the ransom

__________ controls prevent unauthorized individuals from gaining access to a company's facilities.

Physical

A(n) ______________ to an information resource is any danger to which a system may be exposed.

Threat

The relational database model is based on the concept of ________-dimensional tables.

Two

Which of the following is are a characteristic of Big Data?

Variety Velocity Volume

__________ is a remote attack requiring user action.

Virus

A data _________ is a repository of historical data that are organized by subject to support decision makers in the organization.

Warehouse

_____________ is a physical control.

A company gate

_______________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

Cyberterrorism

Hackers would use a botnet to perform a _________.

DDoS

Database systems maximize __________.

Independence

Intellectual capital is another term for ________.

Knowledge

Data marts and data warehouses typically use _______.

OLAP

The ___________ key is an identifier field that uniquely identifies a record.

Primary

___________ is also called digital extortion.

Ransomware

A __________ generally describes an entity.

Record

Database systems minimize _________.

Redundancy

Each relational database table contains records (listed in _______) and attributes (listed in ______).

Rows; columns

_________ is an unintentional threat.

Social engineering

____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social engineering

________ collects personal information about users without their consent.

Spyware

Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of ______.

Tacit Knowledge

________ is the cumulative store of subjective or experiential learning.

Tacit knowledge

Data marts can be implemented ______ quickly than data warehouses and support _______ control.

more; local

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _____________.

tailgating; an unintentional threat to your organization

The most current form of ransomware demands payment in the form of _______.

Bitcoins

_____________ are those data that visitors and customers produce when they visit a website and click on hyperlinks.

Clickstream data

__________ occurs when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.

Information extortion

ou purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is ______ and is _______.

Piracy; illegal

A _____________ is an intellectual work that is not based on public information.

Trade secret

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ______ format.

Unstructured

An information resource's _________________ is the possibility that the system will be harmed by a threat.

Vulnerability

You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.

a human error; unintentional

You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake.

a human error; unintentional

You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake.

a human error; unintentional


Ensembles d'études connexes

The_Victorian_Age_British_Writers

View Set

TestOut Linux Pro practice questions

View Set

CH. 32 Prep U - Health Assessment of Children

View Set

298 Programable logic controllers/ Lesson 3 Programming the System

View Set

Spanish I Study Guide (questions 1-34)

View Set

Psyc- Module 10: developmental issues, prenatal development, and the newborn

View Set