BCOR 330

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How does each additional block added to the blockchain strengthen the integrity of the entire chain?

Because each block contains information on recording time and sequence for both its transaction and the transaction immediately preceding it, with more blocks there is more transaction history information, making it difficult to falsify.

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

DOS

Which statement correctly defines the components of the World Wide Web (WWW)? More than one answer may be correct.

HTTP is a protocol for the transmission of hypermedia documents (such as HTML) and was designed for communication between web browsers and web servers. A URL is the address of a document or other content/resources found on the web. HTML is a language commonly used format for publishing web documents and content.

To retain a row or column, but remove it from view, right-click on the row or column heading and select

Hide.

To quickly show if the values in a column or row are greater than, less than, or equal to a certain value, use the ________ function.

IF

How does a Network Address Translation (NAT) type of firewall work?

It hides internal IP addresses

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Which of the following was not a consequence of the data breach?

Many Target employees went to prison.

All of the following are popular spreadsheet packages except

Microsoft Access.

A popular cloud-based spreadsheet is

Microsoft Excel 365.

List examples of software as a service (SaaS). More than one answer may be correct.

Microsoft Office 365 Google apps Smartsheet

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.

PMT

Select two methods of selecting a range of adjoining cells in Excel.

Select the first cell in the range and drag down to the last cell. Select the first cell in the range then hold down the shift key and select the last cell in the range.

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

Which of the following are true about spear phishing attacks? More than one answer may be correct.

Spear phishing is a type of attack designed to target specific individuals. Spear phishing attacks are designed to install malware on a device

Which of the following is a characteristic of the Internet that helps explain how it works? More than one answer may be correct.

The Internet has connections points called nodes. Data is usually stored on specialized computers called servers. Data is transferred between networks through hardware called routers.

What is a characteristic shared by all devices that can be infected by a computer virus?

They are connected to the Internet.

How did the attackers gain access to Target's IT systems?

They used malware to capture access credentials.

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

Data governance policies help to ensure an organization's data is valid, understandable, complete, and ________

accessible

California's SB-327 for IoT Security mandates that security features of Internet-ready devices must be ________Blank. More than one answer may be correct.

appropriate to the intended use of the device suitable for the type of data the device will contain and relay constructed to protect the device and any data it stores

Spreadsheets are used for

budgeting. counting, adding, and subtracting. corporate financials.

Saving a spreadsheet file in .csv format only saves the

cell values.

A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?

cloud services security

Big Data includes all of these forms of data except

construction data.

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery.

Data redundancy is the ________of data

duplication

The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called

folksonomy.

In the coming years, the Internet of Things is expected to ________ and the use of network analytics is expected to ________.

grow; grow

Big Data together with data analytics is used for

identifying market trends. creating new services and products. anticipating customer needs.

Database Management Systems (DBMS) assign users different access rules to protect the data and users from ________Blank, data leaks, and the misuse of data.

identity theft

In intent-based networking, the network system designers specify ________ and the network hardware ________ to adapt to changing traffic conditions.

operational goals; acts independently

RAM storage and ________Blank processing are two main in-memory computing components.

parallel

The size of Big Data ranges from

terabytes to zettabytes.

All of the following are true about spreadsheets except

they are limited to 255 rows and 63 columns.

Big Data is characterized by each of these except

valence

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

What is the purpose of using color in spreadsheets?

Color makes data easier to read.

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

Man-in-the-mobile (MitMo) occurs when

malware infects smartphones and other mobile devices.

Areas covered in digital governance include data architecture, data ________

quality

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.

restoration of impaired systems improvements to cybersecurity plans communication with all stakeholders

When a user has determined their destination, GIS can assist in providing directions. This is called

route information.

The steps in the data project life cycle, according to Harvard University's Data Science Ready Project include which three of the following?

sensing collection wrangling

Because they make it easy to arrange, display, and calculate numerical data, ________ programs are commonly used in nearly every business setting.

spreadsheet

Because they make it easy to arrange, display, and calculate numerical data, ________ programs are often used in budgeting, accounting, finance, grading, gambling houses, and even sports analysis.

spreadsheet

The main tools used by data analysts include which three of the following?

spreadsheets databases and query languages data visualization tools

An independent data mart is a(n) ________Blank system created separate from a data warehouse and focused on specific organizational functions.

stand-alone

Which of these tasks is malware designed to do? More than one answer may be correct.

steal information destroy data incapacitate networks and computers

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the five steps of the data project life cycle. The final stage in this life cycle is

storage

An ERD requires the use of various ________Blank and ________Blank that help visualize two types of information: the entities within the system and the interrelationship among the entities.

symbols connectors

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's

syntax

When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______Blank data.

third-party

What was the most likely motivation of the hackers who attacked Target?

to make money

What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?

to share data with other spreadsheet users regardless of which spreadsheet program is being used

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 25, 50, and 75.

= (25 + 50 + 75) / 3

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 4, 2, 5, and 5.

= (4 + 2 + 5 + 5) / 4

What is the difference between a cloud service and a web service?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

List characteristics of computer viruses. More than one answer may be correct.

A computer virus is software that infects computers and is created using computer code. Viruses can destroy programs or alter the operations of a computer or network.

Which of the following is an example of an organization combining data analytics with GIS information? More than one answer may be correct.

A restaurant uses the location of users when they enter key word searches that lead to their online menu to determine where they should focus advertisements on their new delivery options. A clothing store texts a 25 percent off coupon to customers who have shopped in their store when they are within a two-mile radius of the store.

Which of the following is a situation that UEBA would flag for review? More than one answer may be correct.

A user normally spends less than an hour accessing a secure server. One day, she spends almost all of her time accessing the data on that server. A user who normally log on to the server every day between 8:55 and 9:00 a.m. doesn't log on for five consecutive days.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing diminishes the need to store files and software on a local drive.

When working in Tableau, users can assume which three roles?

Creators Explorers Viewers

Select three examples of the impact of advancements in business management systems on the expectations of users.

Employees expect to make changes to their tax withholding online. A manager expects to view changing sales projections from different stores from a computer in her office. students expect to be able to view a syllabus, from any course, at any time from their phone.

Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table.

Insert

Which of the following applications or services will Web 3.0 be built to support? More than one answer may be correct.

IoT SaaS ubiquitous computing

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Which of the following are tips to avoid falling victim to a social engineering attack?

Make sure to research the facts contained in an email message. Slow down and think about the scenario. Be mindful of web searches to make sure you are landing on legitimate sites.

Although the attackers were able to obtain data for many credit card accounts, many others remained safe. Why?

Target had encrypted the contents of its customer account database.

The infection of a digital device by a computer virus happens in stages. What is the second step in this process?

The infection of a digital device by a computer virus happens in stages. What is the second step in this process?

For data to be considered open data, it must have what three characteristics?

The public must have access and datasets must be available for use. Datasets must have access rights that allow them to be reused and redistributed. Datasets must be universally available so that anyone can use the data.

A function that looks for a value in the leftmost column of a table, and then returns a value located in the same row as the first value, is called a

VLookup

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.

View

There are many RDBMS query tools we can use. Those query tools include crosstab queries, ________Blank queries, parameter queries, and queries specific to SQL.

action

Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.

an intentional event or action that damages computer hardware an unintentional or accidental event that deletes important network data or information the incorrect use or abuse of a computer assets an error, flaw, or weakness in a network asset

How does Cisco's perform encrypted traffic analysis?

by comparing the packet's metadata to known threats

A computer network must be connected to the Internet to support

communicating via email with people on other networks.

How did the attackers finally steal the account data?

copied it from point-of-sale machines used in transactions

Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. According to Google, there are five essential aspects of analytical skills including which three of the following?

curiosity understanding context data strategy

Using a traditional filing system (noncomputer) led to many problems like ________Blank and ________Blank.

data redundancy inconsistency

Which of the following is a typical challenge for large businesses managing their network traffic?

deciding the relative priority of data delivery

What readily available information did the attackers use in their attack?

email addresses of vendor employees the specific vendors used by Target default access credentials for server management software Target's implementation of Microsoft's virtualization technology

In blockchain, transaction data is stored in blocks. Each block in the blockchain contains ________, which helps create secure transactions. More than one answer may be selected.

hash digital fingerprint unique identifier

The active cell in a spreadsheet is the cell into which the user can input data. In most spreadsheet programs the active cell can be identified by which three items?

heavy border highlighted column and row headings name box (in the upper left corner of the sheet)

Data centralization is critical for increasing data ________Blank.

integrity

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency.

Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?

man-in-the-middle (MitM)

A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

mobile software development kit

What type of computer users are considered miners?

people who validate cryptocurrency transactions on the digital ledger

When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______Blank identifiable information.

personally

Which of the following is an example of data at rest? More than one answer may be correct.

photos stored on a phone's memory card backup files stored on an offsite server

How does predictive analytics help network operation?

potential problems are identified early

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

present value (PV).

The amount of money borrowed in a loan is often referred to as the loan's balance or the ________ of the loan.

principal

The core way Cisco helps businesses is by

providing networking hardware and services.

While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

proximity location

In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed?

#VALUE!

If you type =8 / 2 * 4 + 1 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

17

Which of the following are applications of GIS? More than one answer may be correct.

A gas station uses the location of where travelers are when they search for a gas station on their mobile phone map to determine the best spot to put a billboard advertising their location. Three new neighborhoods are under construction in different parts of a large, rural town. A telecommunications company wants to determine the best locations for cell towers to service all three neighborhoods.


Set pelajaran terkait

MARK 3336 EXAM 4 PRACTICE QUESTIONS

View Set

A&P DSM chapter 14 sections 14.1-14.3

View Set

🌻🌻 1 st respirtory 🌻🌻

View Set

Section 8, Unit 2: Underwriting Guidelines for FHA Loans

View Set

Adaptive Processes Exam 3 - Practice Questions

View Set