CIS Study Guide for Exam 3
Websites reside on __________.
A server
Which of the following is an example of a one-to-many relationship?
A student takes more than one course.
In the SQL statement "FROM Parts", Parts refers to what?
A table
What was the internet's original name?
ARPANET
Website reengineering and business facelifts in e-commerce are components of which part of an e-commerce business plan?
Agility
ISPs provide which of the following? Email Web hosting Broadband All of the above
All of the above
The usability of a browser can be described as ________________. Ease of use Displaying any website as intended A robust set of tools All of the above
All of the above
In the SQL statement "SELECT Lname", Lname refers to what?
An attribute
Which of the following is an example of B2E?
An employee purchasing goods from the company store
What is the first step in developing a computer security plan?
Assess all risks
What is the IT term for when smart devices are rendered nonfunctional?
Bricking
Which software provides an interface that displays information on the World Wide Web?
Browser
Which of the following seller-customer relationships describes how Craigslist does e-commerce?
C2C
Who is responsible to ensure that security is maintained over IT assets?
CIO
The term for stored pages of previously visited web pages is ________.
Cache
The internet can be described as which type of model?
Client/server
Put the IoT life cycle actions in the correct order.
Collect, communicate, analyze, act
What does the top-level domain ".com" stand for?
Commercial
Which is NOT a use of a business intranet?
Conducting business-to-consumer transactions
What is the term for text files used for tracking what sites are visited on the World Wide Web?
Cookies
Ensuring that the ZIP CODE attribute is populated with usable data is called ________.
Data validation
The security of a database is the responsibility of the _________.
Database administrator
A set of tools that provide programmers with the ability to create, modify, and extract data is known as a _______________.
Database management system
One or more tables in a database with each record indexed is called a __________.
Database structure
Social engineering is _________________.
Deception used to manipulate individuals into divulging confidential information
HCI is a measure of a website's ____________.
Design
What is the term used when a criminal sifts through trash for information?
Dumpster diving
Which of the following is NOT a standard email protocol?
EMSP
What do database designers use to design and construct databases?
Entity relationship diagrams
What is another name for a bookmark?
Favorite
A column in a database table is called a ________.
Field
Which attribute points to a primary key in another table within a database?
Foreign Key
What is the term for someone who attempts to steal information from a computer?
Hacktivist
The ____________ file is a list of cached websites on a computer.
History
What is the term for a clickable navigation element?
Hyperlink
What system is used to address each node on the internet?
IP
_____________ is the term for when someone wrongfully uses another person's information for criminal gain.
Identity theft
What does ISP stand for in the realm of the internet?
Internet Service Provider
The ________ is composed of millions of smart devices and sensors connected to the internet.
Internet of Things
What is one reason the internet is moving from IPv4 to IPv6?
IoT devices have used up all the IPv4 addresses.
Which type of malware is installed on a computer to capture or monitor keystrokes and transmit information to a third party?
Keylogging
Redirecting a user to a bogus website with an official-looking URL is known as ________.
Pharming
A scam using a fraudulent email that appears to have come from a legitimate source requesting information is known as _________________.
Phishing
A separate window that opens within a browser without user interaction is known as a _________________.
Popup
The function that is used to retrieve data from a database is called a(n) ___________.
Query
What is the latest type of malicious software that has the ability to completely cripple a computer and require payment to re-enable the computer?
Ransomware
Which of the following is the correct order of steps for risk management?
Recognition, consequences, assessment, strategies
A row in a database table is called a ________.
Record
Database normalization is a process used to _______________.
Reduce redundancy
Which of the following is NOT a type of ransomware?
Reverse phishing
The most widely used query language for a DBMS is _______________.
SQL
A map of a database that shows tables and relationships is called a(n) _______.
Schema
Yahoo, Google, and Bing are examples of _____________.
Search engines
The use of deception to manipulate individuals to divulge confidential or personal information is known as ____________.
Social engineering
Email, faxes, mobile phones, blogs, and news groups are victims of which type of malware threat?
Spam
Which type of malware gleans personal data and information about the user without his or her knowledge?
Spyware
In a website attack involving a denial of service, who is most affected by the malicious software?
Those who want to use the website
One way a deceptive website can know where a visitor has been on the web is through the use of _____________.
Tracking cookies
What allows a website you have previously visited to know information about you when you return to it?
Tracking cookies
What is the term for a malicious program that seems harmless until it is executed?
Trojan horse
Which type of malware usually activates at a future date?
Trojan horse
True or false: A relational database must have more than one table.
True
True or false: All email should be considered public information.
True
True or false: Attribute and Field are different terms for the same thing.
True
True or false: Metasearch engines utilize multiple search engines to return results.
True
True or false: Without a firewall, an intranet just becomes part of the internet.
True
Voiceover Internet Protocol (VoIP) is the use of internet networks to carry voice phone calls. Which of the following is NOT true of VoIP?
Uses TCP protocol
Which type malware has the ability to be self-replicating?
Worm
Which type of malware does NOT need to attach itself to an existing program or email to spread?
Worm
Web pages are usually programmed using ____________. a. HTML b. JavaScript c. CSS d. A and B only e. A, B, and C
e. A, B, and C
Which of the following are components of e-commerce? a. Advertising b. Buying c. Selling d. Distribution e. B and C only f. A, B, C, and D
f. A, B, C, and D