INFO360 - Exam 3 - Quiz

Ace your homework & exams now with Quizwiz!

What types of organizations do phishing attempts commonly disguise themselves as?

- banks - insurance - financial institution

What are trojan horses commonly used to install?

- key loggers - packet sniffers

What are some symptoms of computer viruses?

- must restart / reboot frequently - critical files delete automatically - prevalent error messages - difficulty saving documents - computer runs slowly

What are some examples of on-going cybercrimes?

- stalking - child predation - blackmail / extortion - terrorism

What are the various purposes of malware (malicious software)?

- steal info - destroy data - hinder computer / network operation - frustrate the user

What are examples of cybercrimes committed during a single event?

- trojan horse - phishing - keystroke logger - identity theft

How does one defend against rootkits?

- update software regularly - be aware of phising emails - watch out for drive-by downloads

How are web-based applications structured?

- web client - server - corporate info systems linked to a database

What are the four steps businesses use to help protect themselves from natural disasters?

1. continuity plan 2. off-site cloud storage 3. data inventory maintenance 4. geographic data redundancy

What are the two types of cyberattacks?

1. disable the computer 2. gain access to the computer's data

How do viruses infect computers?

1. virus arrives via email, file download, or infected website 2. running or opening file activates the virus 3. virus copies itself to other parts of the computer 4. virus spreads to other computers via email, file download, or infected website 5. payload (executes malicious activity)

Why is a target market important to businesses and organizations? A) A target market is the group of consumers most likely to purchase an organization's products and services. B) A target market includes social media users identified as most active on a given platform. C) A target market defines the products and services offered by an organization. D) A target market is the group of consumers on which an organization tests its products.

A) A target market is the group of consumers most likely to purchase an organization's products and services.

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions. A) An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience. B) An organization analyzes the different types of data that Instagram, Twitter, and Snapchat provide for different markets. C) An organization uses third-party software to analyze the data collected by different social media platforms. D) An organization collects data on the type of videos middle-aged women watch on Facebook.

A) An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information? A) In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it. B) Blockchain would not be appropriate to use to secure healthcare records; however, the practice could look into accepting payments via cryptocurrency. C) Because blockchain can be used for quality assurance purposes, using it in healthcare would ensure that no mistakes were made when treating patients. D) In blockchain, a secure connection is created between computers accessing information. This would prevent unauthorized people from accessing any sensitive data.

A) In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.

A computer network must be connected to the Internet to support A) communicating via email with people on other networks. B) using digital video and audio applications for playback and editing. C) using programs or software that are installed on a networked server. D) maximizing the combined storage space of the networked computers.

A) communicating via email with people on other networks.

A digital device that accepts input, processes and stores the input, and provides output is a ________. A) computer B) modem C) router D) switch

A) computer

What is the name of the study of how people make purchases and why they buy products and services? A) consumer behavior B) demographic marketing C) market process D) economic forecasting

A) consumer behavior

Adding software to a digital device, or adding hardware components to a digital device is called ________. A) installing B) booting C) importing D) uninstalling

A) installing

The main advantage of the IPv6 format for IP addresses is that A) it can accommodate many more addresses than the IPv4 format. B) it is shorter and easier to remember than addresses in the IPv4 format. C) it can be given a verbal name without using the Domain Name System (DNS). D) it can be temporarily assigned by your Internet Service Provider (ISP).

A) it can accommodate many more addresses than the IPv4 format.

What manages hardware and software, supports the computer's basic functions, and runs programs? A) operating system B) RAM C) ROM D) BIOS

A) operating system

With Web 3.0, everyday devices connected to the Web will become A) smarter and more capable, given the improved support for the Internet of Things (IoT). B) less expensive, given the use of artificial intelligence in manufacturing instead of workers. C) ubiquitous (everywhere at the same time), given the billions of new smartphone users. D) more interactive, given the billions of web pages that will start supporting user participation.

A) smarter and more capable, given the improved support for the Internet of Things (IoT).

What devices does the walware EventBot, target?

Android devices

Trojans are easily detected by most antivirus software programs. A) True. B) False.

B) False.

A gigabyte equals approximately one ________ bytes. A) thousand B) billion C) million D) trillion

B) billion

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer. A) phablet B) laptop C) desktop D) server

B) laptop

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________. A) desktop B) tablet C) laptop D) server

B) tablet

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger. A) mice B) touchscreens C) microphones D) webcams

B) touchscreens

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to A) hold virtual meetings online via teleconferencing or video-conferencing features. B) view, edit, and add shared information in real time, from anywhere. C) be given access to each other's workspaces and files, for micro-management. D) complete their work using personal devices such as smartphones or tablets.

B) view, edit, and add shared information in real time, from anywhere.

What is the difference between a cloud service and a web service? A) A cloud service provides organizations and groups of individuals with the ability to communicate easily, whereas a web service provides individuals the ability to connect with the Internet. B) A cloud service provides the software needed for devices and systems to communicate with each other, whereas a web service provides users with increased computing power and data management. C) A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other. D) There is no difference between cloud and web services.

C) A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________. A) Memory management B) Download manager C) Control panel D) Device manager

C) Control panel

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet? A) hardware called routers and the packets of information transmitted by the routers B) government-owned servers and the many, private servers of connecting networks C) a "backbone" of connected hardware and a suite of Internet protocol software D) fiber optic/coaxial cables and cellular/satellite signals that both act as communication media

C) a "backbone" of connected hardware and a suite of Internet protocol software

Each time a user clicks or interacts on a social media website A) the user's identity creates a data point. B) connections to other posts and sites occur. C) a data point that can be analyzed is recorded. D) data on behavior is harvested.

C) a data point that can be analyzed is recorded.

The primary goal of a company's social media strategy is to A) entertain media users. B) test future strategies. C) engage potential customers. D) expand company services.

C) engage potential customers.

The amount of time that passes between when a device is asked to perform and when it completes the task is known as A) drag. B) lead time. C) latency. D) recovery.

C) latency.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing? A) Cloud computing provides safer access to the Internet. B) Cloud computing bypasses the need for user passwords and login information. C) Cloud computing allows single users to access shared files. D) Cloud computing diminishes the need to store files and software on a local drive.

D) Cloud computing diminishes the need to store files and software on a local drive.

Which of the following is not a presentation software term? A) Slide B) Speaker Notes C) Slide Master D) Speaker Image

D) Speaker Image

Which is the best explanation of how the World Wide Web (WWW) differs from the Internet? A) The web supports a greater variety of content than the Internet, including audio and video. B) The web's webpages are connected using URLs and hyperlinks, not servers like the Internet. C) The web's standards and protocols are different from those for the Internet, like TCP/IP. D) The web is only one of many applications that runs on and is accessed through the Internet.

D) The web is only one of many applications that runs on and is accessed through the Internet.

An effective social media information system (SMIS) collects and analyzes data about the organization's A) sales or other income generated from its social media activities. B) employees and their work-related activities on social media. C) paid and free advertising on social media and resulting exposure. D) activities and audience on social media and its own website(s).

D) activities and audience on social media and its own website(s).

A high-end jewelry designer creates several different brands of jewelry for women of different ages and tastes. To gain the greatest exposure to her potential customers on social media, her SMIS should be designed to use the platforms that A) enable her to purchase ads that will target and reach her main market. B) have the greatest reach among women who purchase high-end jewelry. C) will best support posts that market her jewelry with photos and videos. D) are most used by the target markets for each jewelry line or brand.

D) are most used by the target markets for each jewelry line or brand.

What is the first step in the six-step process of creating an SMIS? A) analyze and evaluate collected data B) connect potential customers with products and services C) define the organization's target market D) create system goals that align with the goals of the organization

D) create system goals that align with the goals of the organization

Which of the following is a strength of the Linux platform? A) most widely used OS in desktops and laptops B) most widely used OS in smartphones and tablets C) less susceptible to viruses than Mac OS D) free to download and use

D) free to download and use

Some popular social media management systems are becoming more difficult to manage because A) SMIS provider leadership teams face management challenges. B) hardware and software technology is not keeping up with user demand. C) costs continue to rise as technology becomes more complex. D) millions of diverse users across the globe are active participants.

D) millions of diverse users across the globe are active participants.

Components of a social media information system (SMIS) combine to A) support social media awareness by aligning data and procedures. B) form and inform an organization's social media objectives. C) coordinate the work of separate business functions through social media. D) support a company's marketing strategy through social media.

D) support a company's marketing strategy through social media.

What does NIST stand for?

National Institute of Standards and Technology (NIST)

Which type of computer is more commonly attacked by viruses?

PCs (not Macs)

What does TBT stand for?

Tiny Banker Trojan

What is a zombie / bot?

a computer being controlled by a hacker in a DoS state

What is a trojan horse?

a program that appears legitimate but executes an unwanted activity when activated

How do you access the Dark Web?

a specific web browser (i.e. Tor)

What is the major difference between a trojan horse and a virus?

a trojan horse doesn't replicate itself

What is a zero-day vulnerability?

a vulnerability in a system or device that has been disclosed but is not yet patched

What is a rootkit?

allows the hacker to secretly control a computer from a remote location

What is a cybercrime?

any crime involving a computer - either as the object of the crime or the object used to commit the crime

What does operational recovery mean?

backup and recovery

What method have organizations been using to deal with cybersecurity?

behavioral science

What do packet sniffers (analyzers) do?

capture packets transmitted over a network

What are black hat hackers?

criminal hackers (aka: hackers / crackers)

What is cyberwarfare?

cyberattacks coming from a foreign government

What are data packets?

data sent across the internet in many small manageable pieces

What does DoS mean?

denial of service (DoS) attack

What does DDoS stand for?

distributed denial of service attack (DoS attacks on many computers)

How does war driving work?

eavesdroppers drive by buildings to detect SSID and gain access to the network

What are packet sniffers (analyzers) used for?

either - routine examination - to steal info

What is spear phising?

email scam directed towards a specific person or organization

What does ransomware do to a computer's data?

encrypts it

What do cyber controls do?

ensures accuracy of information inside the company

How do DoS attacks work?

flood the network w/ too many requests

What is a botnet?

group of computers under the control of the hacker

What are white hat hackers?

hackers that use their skills to help businesses

What is penetration (pen) testing?

hacking services provided by white hat hackers

What is a firewall?

hardware of software used to keep computers secure from outside threats

How do NATs work?

hide internal IP addresses

What is phising?

illegitimate use of email message that appears to be from an established organization

What does IM refer to?

instant messaging threats

What is a cyberattack?

intentional misuse of computer of network using the internet

What is the Dark Web?

internet content not indexed by popular search engines such as Google

What is an evil twin?

malicious WiFi network

What are worms?

malware that copies itself from one computer to other computers over a network

What is ransomware?

malware that makes a computer's data inaccessible until a ransom is paid

What is social engineering?

manipulating people into divulging their confidential info

How does UEBA work?

monitors computer behavior and flags irregular behavior for review

What does NAT stand for?

network address translation

What is the name of the process that packet sniffers go through?

packet capture

What does P2P stand for?

peer-to-peer network

What is the difference between phishing and pharming?

phishing - takes the user to a fake website pharming - compromises a user's real website

What does cyber security do?

prevents unauthorized access from outside the company

What is pharming?

redirects users to bogus website, even when user types in website URL correctly

How do we calculate risk?

risk = threat x vulnerability x asset

What does SSID stand for?

service set identifier

What is a computer virus?

software that infects the host

What is a key(stroke) logger?

spyware that records all actions typed on a keyboard

What is an organization's first step in protecting their systems?

taking a cybersecurity risk assessment

How do states share cybersecurity incidents with the national Cyber Command?

the Cyber 9-Line portal

What is identity theft?

theft of personal info to impersonate someone else

What is different about newer keystroke loggers?

they are cloud-based

What does UEBA stand for?

user and entity behavior analytics (UEBA)

When are data packets sent?

whenever you: - view a webpage - send an email - share a file - etc.

What is a rogue access point?

wireless access point installed on a secure network w/out explicit authorization from a local network administrator

Did cybercrime increase over the pandemic?

yes

Do fixed internet addresses aid in identification by hackers?

yes


Related study sets

Chapter 35: Caring for Clients with HIV/AIDS

View Set

MGMT 4953 - Test 3 Campbell (Ch. 9 - 11)

View Set

EXAM 4 : antiinfective agents/antiinflammatory agents

View Set