Cyber Security Semester Exam
self driven, reduces human intervention
2 features of automation
eliminates equipment and management, access data anywhere, subscribe to only needed services
3 benefits of cloud computing
transactional data
A business is analyzing sales information as the sales data is being generated from the point-of-sale (POS) machines. What type of data is captured and processed as the events happen?
3D Printer
A student has a digitized version of an idea for a product. What machine can the student use to turn the idea into a solid object?
Encrypt with VPN
An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
fog computing
An organization is concerned with the amount of sensor data that is being generated locally, analyzed in the cloud, and returned for processing at the local site. Which solution will keep the data closer to the source for preprocessing?
volume, velocity, variety
Big data attributes?
global variable
Can be used anywhere in the program
The Internet
Largest network
security
Making data accessible to only authorized users addresses which data storage problem associated with big data?
simulate and visualize one or more networks
Purpose of packet tracer?
The slot allows a block with a bevel tab on the bottom to be connected above the block shown.
Refer to the exhibit. A specific Blockly block has a slot on the top. What is the purpose of this slot?
decision
Refer to the exhibit. What does the exhibited flow chart symbol commonly represent when it's a diamond?
process
Refer to the exhibit. What does the exhibited flow chart symbol represent when it's a rectangle?
LAN
What type of network is wired computers in a classroom?
Which Python programming function is used to display output?
only conduct transactions on websites after verifying the URL is correct
Which action can help reduce online risk?
velocity
Which attribute of big data involves an exponential data growth rate?
access
Which challenge of big data storage is characterized by the need to make data accessible from anywhere at anytime?
ping
Which command is used to test network connectivity and provide a response to each packet received by the remote host?
"SyntaxError"
Which output would be displayed if the code that is shown below is entered in a Python interpreter? y = ['yellow', 'red', 'green', 'purple', 'white'] print y
Raspberry Pi
Which platform is a low cost, credit-card-sized computer?
phrases, letters & numbers, special characters
Which three elements should be combined when creating a strong password? (Choose three.)
randolph, 12345678, adfnsanjs
Which three passwords are the least secure? (Choose three.)
Packet Tracer
Which tool allows a user to simulate real networks?
following email links that have already been scanned by the email server sharing information on social media
Which two online activities pose high security risks? (Choose two.)
fog
Which type of computing is located at the edge of a business or corporate network and that allows data from sensors to be preprocessed?
analyzed data
Which type of data can be used by a business to support managerial analysis tasks and organizational decision making?
WAN
Which type of network is used to connect a company located in one area of a city to another location in a city far away?
WiMax
Which type of wireless network is used to connect devices within a city to create a metropolitan-area network (MAN)?
to research a person
Why would an IT person use Zabasearch?
employing access controls
assign roles and privilege levels
# of variables, data points per variable, is data timeline?, items needing comparisons
criteria for best chart selection
unstructured
data collected through websites, audio, or tweets
To gain new insights
purpose of data analytics
implementing human resource security measures
research and background checks on employees
regularly testing incident responses
test emergency response scenarios
educating users
train users on security procedures
Their controller can be infected
How are USB flash drives a security risk?
personal info could be leaked
How can a virtual assistant be a security risk?
GPS calculates route based on traffic. Robots are used in mines to reduce risk of injury to humans
What are 2 examples of automation?
vehicle id, birth date, bank account #
What are three examples of personally identifiable information? (Choose three.)
easily scalable cluster sizes, automatic replication of data across clusters, uses HDFS as a fault tolerant file system
What are three features of Hadoop? (Choose three.)
update firmware, use WPA2-AES encryption.
What are two recommended steps to protect and secure a wireless network? (Choose two.)
Khan Academy & Code Academy
What are two resources that could help someone learn to program? (Choose two.)
home gateway
What provides auto discovery services for smart devices on a network?
Drag variable block into workspace area
How is a new variable created in Blockly?
true
True of False? Structured data is easier to analyze and store than unstructured data
false
True or False? Data is defined as big data if it is more than 1 petabyte.
false
True or False? Distributed data processing involves large databases being centrally processed by powerful mainframe computers and stored in giant disk arrays.
true
True or False? Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or PC.
true
True or False? The Internet of Things can help organizations improve the efficiency and productivity of manufacturing processes and operations.
true
True or False? The Internet of Things will connect inanimate objects to the network with intelligent sensors.
false
True or False? Web scraping tools are used to extract and manipulate structured data.
true
True or false? CSV, JSON, and XML all manipulate structured data?
easy to read/write and runs without conversion to machine language
Two features of Python?
SSID and IP Address
Two requirements to connect to a home wireless network?
programs and supplied data
What 2 things do all digital devices need to work?
Activation
What IBN element orchestrates policies and configures systems?
facial recognition
What ML technology can track and identify people?
a network
What allows digital devices to interconnect and transmit data?
Mimics cognitive functions, and Perceives their environment to act.
What are 2 characteristics of artificial intelligence?
generating and collecting data from multiple sources
What characterizes data management problems associated with big data storage?
Continuous verification, insights, visibility and corrective actions and end to end verification relying on AI and ML
What does assurance in IBN do?
robotics
What field is tied to automation?
the wireless network
What information is conveyed by the SSID that is configured on an IoT device?
programming tool for beginners
What is Blockly?
valuing assets to justify security expidentures
What is a goal of performing a risk assessment?
To make decisions and actions based on outside info
What is a requirement for a smart device?
a device that detects or measures an event or physical property
What is a sensor?
ML
What is a subset of AL that uses stats to enable computers to learn?
Mac Address Filtering
What is a wireless router security best practice that limits access to only specific internal hosts?
Arduino
What is an open source platform that takes input from a variety of sensors to control objects?
Devices that think on their own, evaluate data, and modify themselves based on that data. Mimics human cognitive functions
What is artificial intelligence?
a system of data centers or connected servers that provide anywhere/anytime access to data and applications
What is cloud computing?
Internet of Things (IoT)
What is comprised of millions of smart devices and sensors connected to the internet?
32
What is displayed after the following code is entered into a Python interpreter? addition = 22 +10 print(addition)
AI
What is intelligence demonstrated by machines?
Creates intent, translates it to policies, and checks integrity
What is key to the transition element in IBN?
home gateway
What is needed in a smart home to connect sensors and smart devices to a network?
crowd funding
What is one way to pay for prototyping?
artificial intelligence
What is the core component of Intent-Based Networking?
protecting data
What is the goal of a white hat hacker?
1,2,4,5,3,6
What is the output when the following code is entered into a Python program interpreter? [1,2,4,5] + [3,6]
data mining
What is the process of discovering patterns and relationships in large data sets in order to convert raw data into meaningful information?
SSID
What is used to identify a wireless network?
flow chart
What is used to illustrate how a given process will run?
imagination
What limits the objects that can become sensors?
a smart device
What lowers power consumption during peak demand?
"SyntaxError: Missing parentheses in call to 'print'"
What output is expected when the function that is shown below is entered in a Python program interpreter? >>>print Cisco 1
microcontroller
What provides IoT sensors with network access?
Machine Learning
What technology enables things like speech recognition, product recommendations, and fraud detection?
intent based networking
What technology uses AI and others to reconfigure a network to comply to standards?
prototyping
What tests new "things" not on a network?
AI, ML, and Automation
What three technologies acomplish desired intents in an intent based network
Speech and Facial Recognition
What two applications use ML?
design and programming
What two skills help with prototyping?
structured data
What type of data is being collected when an organization is using spreadsheets and forms for data input?
sensor
What type of device could allow a refrigerator to place a replacement order for an item contained within it?
PAN
What type of network is btw Bluetooth and a vehicle?