Exam 2 Part 2
Which of the following statements about wireless security is not true?
Bluetooth is the only wireless technology that is not susceptible to hacking.
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Which of the following is a worm that uses flaws in Windows software to take over a computer remotely?
Conficker
The intentional defacement or destruction of a website is called:
Cybervaldalism
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.
Digital
Which of the following statements about edge computing is not true?
Edge computing increases delays in the transmitting and processing of data.
In the context of data mining, the term sequences refers to:
Events linked over time
A grouping of characters into a word, a group of words, or a complete number is called a field.
False
Digital resiliency focuses solely on the resiliency of the IT function.
False
Only computers behind a corporate firewall are trusted by default when using a zero-trust framework.
False
XML is limited to describing how data should be presented in the form of web pages, while HTML can perform presentation, communication, and storage of data.
False
Which of the following is not a type of input device?
Flat panel (LCD) display screen
Which of the following best describes the importance of creating an accurate data model for your business's database?
It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.
Which of the following statements about botnets is not true?
It is not possible to make a smartphone part of a botnet.
Which of the following statements about Internet security vulnerabilities is not true?
Large public networks, such as the Internet, are less vulnerable than internal networks.
Mobile game developer Yile Technology chose which of the following to store its game's customer profile data?
MongoDB Atlas
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
Normalization
Most computer viruses deliver a:
Payload
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?
Peer-to-peer network
Which of the following is a type of logical database model that treats data as if they were stored in two-dimensional tables?
Relational Database
Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?
Router
________ refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down.
Scalability
Which of the following types of computers would you use to support a computer network?
Server
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website that asks for personal information. This is an example of which of the following?
Spear phishing
Which of the following types of computers is traditionally used for scientific exploration and simulations?
Supercomputer
Which of the following types of software manages the resources and activities of a computer?
System Software
Which of the following best illustrates the relationship between entities and attributes?
The entity CUSTOMER with the attribute ADDRESS
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
In a relational database, a table contains all of the following except:
Three-dimensional relations
Which of the following is an example of a legacy system?
Transaction processing system running on a mainframe
A computer network requires at least two computers.
True
A private cloud is operated for the benefit of a single organization but may be managed by a third party and located off-premises.
True
Client/server computing has largely replaced centralized mainframe computing.
True
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
Data governance encompasses an organization's policies and procedures through which data can be managed as an organizational resource.
True
DoS attacks flood a network server with thousands of requests for service.
True
Most data quality problems stem from errors during data input.
True
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
True
The Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack.
True
Which of the following is the foundation technology for web services?
XML
The project operation:
creates a subset consisting of columns in a table.
DSL (Digital subscriber line):
operates over existing telephone lines to carry voice, data, and video.
The HIPAA Act:
outlines medical security and privacy rules.
Pharming involves:
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
A data governance policy specifies all of the following except:
the structure of the company's database.