Quiz 4
____________ is a communications control.
A firewall
Your company decides not to implement security procedures because employees refuse to comply anyway. This is an example of risk ________.
Acceptance
___________ controls restrict unauthorized individuals from using information resources.
Access
The __________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated
Data dictionary
________ is an approach to managing information across an entire organization.
Data governance
__________ is a remote attack requiring no user action.
DoS
_____________ is an access control.
Encryption
____________ deals with more objective, rational, and technical knowledge.
Explicit knowledge
The ____________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
Exposure
The _______ creates links between two tables.
Foreign
A(n) __________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity.
Instance
A data __________ stores vast amounts of data in their original format until they are required, rather than forcing the integration of large volumes of data before analysis.
Lake
A data _________ is a low-cost, scaled-down version of a data _________ that is designed for the end-user needs in an SBU or an individual department.
Mart; warehouse
________ are a set of core data that span the enterprise information systems.
Master data
A _____________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
Patent
_____________ is a possible solution to the ransomware problem but is not recommended by the FBI.
Pay the ransom
__________ controls prevent unauthorized individuals from gaining access to a company's facilities.
Physical
A(n) ______________ to an information resource is any danger to which a system may be exposed.
Threat
The relational database model is based on the concept of ________-dimensional tables.
Two
Which of the following is are a characteristic of Big Data?
Variety Velocity Volume
__________ is a remote attack requiring user action.
Virus
A data _________ is a repository of historical data that are organized by subject to support decision makers in the organization.
Warehouse
_____________ is a physical control.
A company gate
_______________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
Cyberterrorism
Hackers would use a botnet to perform a _________.
DDoS
Database systems maximize __________.
Independence
Intellectual capital is another term for ________.
Knowledge
Data marts and data warehouses typically use _______.
OLAP
The ___________ key is an identifier field that uniquely identifies a record.
Primary
___________ is also called digital extortion.
Ransomware
A __________ generally describes an entity.
Record
Database systems minimize _________.
Redundancy
Each relational database table contains records (listed in _______) and attributes (listed in ______).
Rows; columns
_________ is an unintentional threat.
Social engineering
____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social engineering
________ collects personal information about users without their consent.
Spyware
Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of ______.
Tacit Knowledge
________ is the cumulative store of subjective or experiential learning.
Tacit knowledge
Data marts can be implemented ______ quickly than data warehouses and support _______ control.
more; local
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _____________.
tailgating; an unintentional threat to your organization
The most current form of ransomware demands payment in the form of _______.
Bitcoins
_____________ are those data that visitors and customers produce when they visit a website and click on hyperlinks.
Clickstream data
__________ occurs when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.
Information extortion
ou purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is ______ and is _______.
Piracy; illegal
A _____________ is an intellectual work that is not based on public information.
Trade secret
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ______ format.
Unstructured
An information resource's _________________ is the possibility that the system will be harmed by a threat.
Vulnerability
You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.
a human error; unintentional
You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake.
a human error; unintentional
You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake.
a human error; unintentional