Chapter 5 ITCB
attenuation
___ refers to the loss of intensity and clarity of the data signal being transmitted.
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
f
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
false
The two parts of a packet are the certificate and the key.
false
wireless
___ networks use radio signals that travel through the air to transmit data.
data validation
___ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.
DDOS
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
truee
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
Firewall
A(n) ___ examines and blocks Internet traffic in order to protect your private network.
mis
A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.
RAID
A(n) ___ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.
expert
A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.
intranet
A(n) ___ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft Sharepoint.
false
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
falsee
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
true.
An MIS system can provide different types of information or summaries to managers at different levels.
zombies
Computers which are under the external control of a hacker are known as:
bandwidth
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
wan
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
Office automation system
In an office environment, many organizations set up a(n) ___ to perform various operations such as word processing, accounting, document management, or communications.
tape
Large organizations often use a(n) ___ library for backups and archives of their data.
t
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
enccryption
Many types of software and devices use ___ to scramble your data or communication.
false
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
fa
Power failures are the primary cause of component failure in computer systems.
media
The means used to link together parts of a computer network are referred to as network:
tr
The network that connects the computers in a school's study center or library is considered a LAN.
ransomware
The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
authorization
The security principle known as ___ gives individuals a certain level of access based on who they are.
authentication
The security principle known as ___ requires that individuals must confirm their identity.
hacker
Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
true
Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.
backups
Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.
f
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
The likelihood of user compliance
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?
x
Which of the following is NOT one of the specifications of Wi-Fi technology?
who you know
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
5
Wi-Fi radio signals operate on either the 2.4 GHz or ___ GHz bands.
coaxial
___ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
twiisted pair
___ cable normally consists of four pairs of wires that are twisted around each other.
fault-tolerant
___ computers are able to continue their operation even when problems are present.
redundant
___ computers are ones that have multiple hardware systems performing the same task at the same time.
spyware
___ is a type of malware which is designed to report activity on your computer to another party.
scalability
___ is the capacity to provide increasing amounts of computing power, storage, and/or software.
data mining
___ is the discovery of new patterns or relationships between data.
___ software helps protect your computer from various types of malware.
anti-malware
Any step you take to ward off a threat is called a:
countermeasure
A(n) ___ is a central repository that contains stored or archived data gathered from multiple databases.
data warehouse
A ___ is a node on a network that serves as an entrance to another network.
gateway
A ___ provides multiple ports for connecting nodes.
hub
The information system that handles the processing and tracking of transactions is called a(n):
tps
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system.
true
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
true
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
virus