BAIS Exam 2
Which of the following statements about botnets is not true?
It is not possible to make a smartphone part of a botnet.
Which of the following statements about Internet security vulnerabilities is not true?
Large public networks, such as the Internet, are less vulnerable than internal networks.
Which of the following is a core part of the zero-trust framework?
Least privilege access
Which type of network is used to connect digital devices within a city or metropolitan area?
MAN
Which of the following technologies is used to reduce Wi-Fi network interference from nearby systems in the same spectrum?
MIMO
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
Modem
Each computer on a network must contain which of the following?
NIC
________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
Operational
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?
Peer-to-peer network
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
Which of the following pulls content from websites and feeds it automatically to a user's computer?
RSS
Which of the following is a type of malware that takes control of a user's computer, blocking access to files, and demands payment in return for giving back access?
Ransomware
Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?
Router
Which of the following is the undisputed global market leader in cloud-based CRM systems?
Salesforce.com
A statement ranking information risks and identifying security goals would be included in which of the following?
Security policy
Which of the following enables a business to connect customer conversations and relationships from social networks to CRM processes?
Social CRM
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website that asks for personal information. This is an example of which of the following?
Spear phishing
The two primary protocols used for secure information transfer over the Internet today are:
TLS and HTTPS
Which of the following statements about the results of a 2022 survey of 140 ERP users conducted by Panorama Consulting Group about enterprise application implementation challenges is not true?
Technical issues were the most common reason for cost overruns.
Which of the following Internet services enables remote logon onto another computer?
Telnet
Which of the following statements is not true?
The Internet backbone is owned by the federal government in the United States.
Which of the following statements about blockchain is not true?
The data represented in a blockchain is maintained in a central database.
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Companies that own Internet back networks are called:
Tier 1 ISPs
Which of the following deals with the "last mile of service" and provides Internet access to consumers and businesses?
Tier 3 ISPs
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
UTM
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?
War driving
The 802.11 set of standards is known as:
Wi-Fi
Implementation controls:
audit the systems development process at various points to ensure that the process is properly controlled and managed.
All of the following are currently being used as traits that can be profiled by biometric authentication except:
body odor
Evil twins are:
bogus wireless network access points that look legitimate to users.
The domain name "https://books.pearson.com," which element is the third-level domain?
books
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
bps
Operational CRM applications include tools for all of the following except:
calculating CLTV
The measurement of the number of customers who stop using or purchasing products or services from a company is called:
churn rate
The traditional telephone system is an example of a ___________ network.
circuit-switched
The intentional defacement or destruction of a website is called:
cybervandalism
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
A(n) ____________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.
digital
A cracker is an ethical hacker hired by an organization to test the organization's security measures
false
Apple's iOS operating system is the mobile platform targeted by most hackers.
false
Computer networks are based on the same principles as traditional telephone networks.
false
Digital resiliency focuses solely on the resiliency of the IT function.
false
Fiber-optic cable is less expensive and easier to install than other physical transmissions media.
false
Internet2 is an advanced networking consortium focused on the development of the metaverse.
false
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
false
Only computers behind a corporate firewall are trusted by default when using a zero-trust framework.
false
RFID technology is being gradually replaced by less costly technologies such as WSNs.
false
The updated WPA2 standard has eliminated all vulnerabilities that might allow attackers to recover passwords.
false
When a hacker gains access to a database containing personal private information and uses the information to impersonate someone, this is an example of:
identity theft
The Sarbanes-Oxley Act:
imposes responsibility on companies and management to safeguard the accuracy of financial information.
A Trojan horse:
is software that appears to be benign but does something other than expected.
DSL (Digital subscriber line):
operates over existing telephone lines to carry voice, data, and video.
The HIPAA Act:
outlines medical security and privacy rules.
Most computer viruses deliver a:
payload
All of the following are specific security challenges that threaten the communications lines in a client/server environment except:
phishing
Wireless sensor networks (WSNs) are used for the following tasks except:
processing consumer transactions
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
radiation
Pharming involves:
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:
sniffing
The domain .gov is a(n):
top-level domain
A computer network requires at least two computers.
true
A hub is a networking device that spends packets of data to all other devices on the network.
true
All 50 states have enacted legislation requiring private or governmental entities to notify individuals of security breaches involving their personally identifiable information.
true
An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.
true
Analytical CRM uses tools to analyze customer data collected from the firm's customer touch points and from other sources.
true
Authentication refers to verifying that a person is who he or she claims to be.
true
Churn rate is an important indicator of the growth or decline of a company's customer base.
true
Client/server computing has largely replaced centralized mainframe computing.
true
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
true
Computer networks that use packet switching are more efficient than telephone networks that use circuit switching.
true
DoS attacks flood a network server with thousands of requests for service.
true
HTTPS uses TLS for encryption and authentication.
true
In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.
true
In addition to being an online retailer, Amazon is also a powerful product search engine.
true
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
true
Phishing is a form of spoofing.
true
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
true
The Internet is the largest implementation of client/server computing.
true
The Internet of Things refers to a vision of a pervasive Internet/Web, in which common objects are connected to and controlled via the Internet.
true
The Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack.
true
The dark web is intentionally hidden from search engines and is assessable only with a special web browser.
true
Web-based self-service capabilities are a part of certain CRM systems.
true
Web3 is envisioned as being even more decentralized than the current Internet and would be controlled by its users rather than dominated by big corporations.
true
Together, a protocol prefix, a domain name, a directory path, and document name, are called a(n):
uniform resource locator
A ___________ is software for locating and managing stored web pages.
web server
Which signal types are represented by a continuous waveform?
Analog
What are the four layers of the TCP/IP reference model?
Application, Transport, Internet, and Network Interface
Which of the following statements about wireless security is not true?
Bluetooth is the only wireless technology that is not susceptible to hacking.
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Which of the following is a worm that uses flaws in Windows software to take over a computer remotely?
Conficker
Cloudflare suffered which of the following types of attacks?
DDoS
Which of the following focuses primarily on the technical issues of keeping systems up and running?
Disaster recovery planning
Which of the following statements about enterprise applications is not true?
Enterprise applications are best implemented when extensive changes in business processes are required.
Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?
$1,250
The WiMax standard can transmit up to a distance of approximately:
30 miles
Search engine marketing accounts for almost ___________ of digital ad spending.
40 percent
Which of the following statements about 5G is true?
5G is designed to support the transmission of data in the gigabit range.
Which of the following is not an example of a computer as a target of crime?
Illegally accessing stored electronic communication