Quiz Review 4-6
How have network computing and telecommunications impact businesses and the world in general?
- computers exchange data with one another - this exchange happens through telecommunication - significant advantages - exchange can happen over any distance and over any network size
Certain types of threats to information systems are intentional. What are they? Pick any threes intentional threats to info systems and explain them
- espionage - information extortion - theft - identity theft - compromises to intellectual property
_____________ consist of 32 bits.
IPv4
_____________ is the protocol of the internet.
TCP/IP
_______________s cover large geographical areas.
WAN
Which of the following is the correct order of networks from largest to smallest?
WAN, MAN, LAN, PAM
Carelessness using unmanaged devices is _________ and is an _________ mistake.
a human error; unintentional
You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake.
a human error; unintentional
You leave your laptop at your desk while you go to the restroom. This is _________ and is an _________ mistake.
a human error; unintentional
Bandwidth is stated in ________ per second.
bits
A ________ site provides only rudimentary services and facilities.
cold
___________ is an access control
encryption
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
espionage
A ________ site is the most expensive option.
hot
Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.
identity theft
Which of the following does not contribute to the increasing vulnerability of organizational information resources?
increasing skills necessary to be a computer hacker
An/The ________ is a network of networks.
internet
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
spamware
A(n) _________ network is any network within your organization; a(n) _______ is any network external to your organization.
trusted; untrusted
_____________ cables are made of copper.
twisted pair
A typically does not include the actual application the company needs to get business back up and running immediately.
warm