Quiz Review 4-6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How have network computing and telecommunications impact businesses and the world in general?

- computers exchange data with one another - this exchange happens through telecommunication - significant advantages - exchange can happen over any distance and over any network size

Certain types of threats to information systems are intentional. What are they? Pick any threes intentional threats to info systems and explain them

- espionage - information extortion - theft - identity theft - compromises to intellectual property

_____________ consist of 32 bits.

IPv4

_____________ is the protocol of the internet.

TCP/IP

_______________s cover large geographical areas.

WAN

Which of the following is the correct order of networks from largest to smallest?

WAN, MAN, LAN, PAM

Carelessness using unmanaged devices is _________ and is an _________ mistake.

a human error; unintentional

You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake.

a human error; unintentional

You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.

a human error; unintentional

Bandwidth is stated in ________ per second.

bits

A ________ site provides only rudimentary services and facilities.

cold

___________ is an access control

encryption

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

espionage

A ________ site is the most expensive option.

hot

Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.

identity theft

Which of the following does not contribute to the increasing vulnerability of organizational information resources?

increasing skills necessary to be a computer hacker

An/The ________ is a network of networks.

internet

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

spamware

A(n) _________ network is any network within your organization; a(n) _______ is any network external to your organization.

trusted; untrusted

_____________ cables are made of copper.

twisted pair

A typically does not include the actual application the company needs to get business back up and running immediately.

warm


Ensembles d'études connexes

DMS - Partial Pressure and Gas Stoichiometry

View Set

Psychology Final - Chapter 7 - 20 Questions

View Set

Azar 빨강 문장만들기-Chapter 5-2

View Set

Chapter 2 Mod 3 Section 2.05-2.07

View Set

Input - Output - Processing- Storage

View Set

Lesson 20 In-Class Quiz & Self-Assessment

View Set

Clinical Research Tech New Employee Info

View Set

AM History to 1877 Final Study Guide

View Set