Tech Test
In what year was ARPNET turned on?
1969
What is a major difference between a LAN and WAN?
A WAN connected larger geographic areas
In 2001 NIST set out an open competition in search of a new algorithm. Which one was the winner?
AES
Who developed the first network in 1969?
ARPANET
Who was the winner of the AARP caregiver challenge app using A.I. technology?
Care Angel
What is one of the major drawbacks of using encryption?
Cost
_____ are built and owned by business that want to security connect various locations
EPN
Elliptic curve cryptography is used by most modern phones because of low power and what else?
High security
Lieutenant Rocherfort and a team of code breakers assisted in which battle?
Midway
The _____ prepares and sends data, receives data, and controls the flow of data
NIC
A _____ is the smallest and most basic type of network made up of a wireless modem, a computer all revolving around one person
PAN
What do IoT devices not include?
Paper books
PS3 used Elliptic Curve cryptography that was broken by hackers. Why?
Poor implementation by Sony
A _____ extends a private network across a public network
VPN
What is the biggest mobile payment app in China?
What company was affected with the largest data breach?
Yahoo
What doe spear phishing involve?
a targeted attack toward one specific individual
What were the benefits of Care Angel?
ability to send health alerts to family members, offer guidance to seniors, and ability to share information with health care providers
What is not a possible disadvantage of social networks?
awareness and activism
When are symmetric keys often used?
both end users share the same key
What are some important contributions made by female code-breakers?
broke a network of Nazi spies in South America, unraveled address codes used by the Japanese army, and uncovered a crucial pattern to break the Japanese "purple" cipher
Every IoT device that is connected to the internet _____
can be hacked
What are the consequences of cybercrime?
commercial losses and public relation problems
What are 3 advantages of IoT?
cost saving, automation, and increased productivity
What do IoT devices offer?
cost savings
What do drones offer farmers a cost saving solution to?
crop tracking
What are some benefits of computer netowkring?
ease of administration, redundancy, and reducing of IP use
What is spear phishing most common in?
emails
What can be stolen from a mobile device?
emails, passwords, compromising photos, and company data
Among the many benefits, AES is
faster
Where should device analysis be completed when conducting a forensic investigation?
in a controlled restricted access laboratory
What is a common practice by organizations following a cyber attack?
increase security training
What is not an advantage of IoT? 1. cost savings 2. automation 3. increased privacy
increased privacy
Why does social media have an addictive quality?
it is adaptive
What is a major drawback of IoT?
lesser employment prospects
What are examples of how technology facilitates connectivity during social distancing measures?
managers reach out to team members to check on them, using video meetings for daily reporting of tasks, and posting QotWs in team chats
What should the investigator do in a forensic investigation?
protect the evidence
What is a major benefit of a VPN?
provides encrypted traffic between two nodes
What devastating effects can revenge porn and sextortion have on victims?
psychological distress, anxiety, depression, and suicide
What did the John S. and James L. Knight foundation award 50 million dolls of new funding to 11 Universities for?
researching how technology is transforming democracy
What is a major disadvantage of symmetric keys?
same key is used to encrypt and decrypt
Once a file is encrypted, it is ____
secure
What is cyber security the practice of?
securing networks from malicious attacks
What does cyber security not involve?
securing paper files from malicious attacks
A cyber security threat is a malicious act that _____
seeks to damage data, steal data, and disrupt digital life
What is the main purpose of computer networks?
share resources and data between computer systems
What resources do computer networks share?
storage and printers
What do the IoT concepts mean?
taking all the laptop, desktops, and mobile devices and connecting them to the internet
Drones may be legally used for all of the following except: 1. unauthorized surveillance on neighbors 2. shipping and delivery 3. safety inspections 4. storm and farm crop tracking
unauthorized surveillance on neighbors