Quiz 4 & 5 Questions

6 September 2022
4.7 (114 reviews)
29 test answers

Unlock all answers in this set

Unlock answers (25)
question
What is referred to as spam in the information systems context?
answer
Junk e-mail, usually sent in bulk by automatic mailing software
question
____ encryption uses a public key known to everyone and a private key known only to the recipient.
answer
Asymmetric
question
What is the bar in excel called to enter information?
answer
Formula bar
question
Which of the following would usually NOT be considered intellectual property of a business?
answer
Purchased inventory for resale
question
An acceptable use policy helps an organization prevent legal action by users, in cases such as termination
answer
True
question
In a recent court case, Marriott won the right to continue to block external Wi-Fi access in their hotels
answer
False
question
What is net neutrality?
answer
An issue of whether Internet carriers can change certain customers, such as Netflix, more for faster transmission or better service
question
When we protect information resources, what are we NOT protecting?
answer
Free speech rights- making sure information is available freely, regardless of copyright
question
What type of protection can prevent threats from entering via a computer network?
answer
Firewall
question
What are the "bots" in a "bot net"?
answer
Computers that have been hijacked by software, to be remotely commanded by the hijacker
question
What is ransomware?
answer
A computer virus that encrypts a user's storage, until the victim pays money to unlock it
question
What is the threat called "salami slicing" involve?
answer
Stealing very small amounts of money over a long period of time, such as rounding down interest payments
question
What is NOT a malicious goal of a "denial-of-service" attack?
answer
To make an organization pay upgrade or maintenance fees to legitimate suppliers
question
What is the best defense to mitigate disk failure, fire/flood, and ransomware threats?
answer
Regular backups, stored in an offsite location
question
A network ____ represents a network's physical layout.
answer
Topology
question
Which of the following security measures is NOT based on biometrics?
answer
Passwords
question
The component of a personal network that inspects network packets and determines whether they should be sent to the local area network, or the wide area network is a
answer
Router
question
A modem interfaces computers to analog transmission networks such as subscriber cable service or telephone lines
answer
True
question
The process of deciding which path the data takes on a network is called
answer
Routing
question
What was the major problem with decentralized computing, where each location or department had their own computer resources
answer
The computing resources were siloed, inconsistent, and didn't share information easily through the organization
question
In a distributed network configuration, where is "what-if" analysis by users, to develop new strategies, usually carried out?
answer
In the user's workstation or tablet
question
What is a network protocol?
answer
A set of digital rules for data exchange between a sender and receiver
question
A star network topology offers much better fault tolerance than a ring or mesh topology
answer
False
question
Local area networks (LANs) are used to _____.
answer
Link computers located close together, such as in a classroom or building
question
The Open Systems Interconnect Model depends on the physical network to keep data packets in order when received; it cannot deal with out-of-order packets
answer
False
question
In a 3-tier client/server structure, the client workstation and application server are usually separated from what other server?
answer
Database server
question
The computers in an organization's offices in New York and Chicago are connected by what type of network?
answer
Wide Area Network
question
What technology is used to prevent "sniffing" (unauthorized interception) of network traffic from a wireless link?
answer
Encryption
question
What is an example of "social engineering", which targets the user, instead of computer technology, to give away confidential information?
answer
Phishing