Eric Hatch ISYS Test 2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
            ___is the process of capturing and recording network traffic.
answer
        Sniffing
question
            A ____ is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.
answer
        Script Kiddie
question
            ____ are hackers who specialize in unauthorized penetration of information systems.
answer
        Black Hats
question
            ____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.
answer
        White Hats
question
            ____ means that a system must prevent disclosing information to anyone who is not authorized to access it.
answer
        Confidentiality
question
            ____ refers to the accuracy of information resources within an organization.
answer
        Integrity
question
            ____ means that computers and networks are operating and authorized users can access the information they need.
answer
        Availability
question
            Level 1 security involves ____.
answer
        Front-End servers
question
            Level 2 security involves ____.
answer
        Back-end systems
question
            Level 3 security involves ____.
answer
        Corporate networks
question
            Which of the following is considered an intentional threat?
answer
        Social Engineering
question
            A ____ travels from computer to computer in a network, but it does not usually erase data.
answer
        Worm
question
            A logic bomb is a type of ____.
answer
        Trojan Program
question
            A ____ is a programming routine built into a system by its designer or programmer.
answer
        Backdoor
question
            A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
answer
        Denial-of-Service
question
            A ____ attack typically targets Internet servers.
answer
        Denial-of-Service
question
            ____ take advantage of the human element of security systems.
answer
        Social Engineering Attacks
question
            ____ security measures use a physiological element to enhance security measures.
answer
        Biometric
question
            Which of the following is a biometric security measure?
answer
        Signature Analysis
question
            Which of the following is a nonbiometric security measure?
answer
        Firewalls
question
            A(n) ____ is software that acts as an intermediary between two systems.
answer
        Proxy server
question
            ____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
answer
        Intrusion detection systems
question
            Which of the following is a physical security measure?
answer
        Electronic trackers
question
            Which of the following is a type of access control?
answer
        Passwords
question
            A(n) ____ is often used so remote users have a secure connection to the organization's network.
answer
        Virtual private network
question
            Typically, an organization leases the media used for a VPN on a(n) ____ basis.
answer
        as-needed
question
            Data encryption transforms data into a scrambled form called ____.
answer
        Ciphertext
question
            ____ is a commonly used encryption protocol that manages transmission security on the Internet.
answer
        Secure Sockets Layer
question
            ____ ensures data security and integrity over public networks, such as the Internet.
answer
        Transport Layer Security
question
            ____ encryption uses a public key known to everyone and a private key known only to the recipient.
answer
        Asymmetric
question
            In ____ encryption, the same key is used to encrypt and decrypt the message.
answer
        Symmetric
question
            Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.
answer
        CERT
question
            The main function of the ____ model is to provide information on security incidents, including information systems' vulnerabilities, viruses, and malicious programs.
answer
        CIRC
question
            ____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
answer
        Business continuity planning
question
            A ____ plan lists the tasks that must be performed to restore damaged data and equipment.
answer
        Disaster recovery
question
            The amount of data that can be transferred from one point to another in one second is called ____.
answer
        Bandwidth
question
            In _____ data transmission, multiple pieces of data are sent simultaneously.
answer
        Broadband
question
            ____ cables are thick cables that can be used for both data and voice transmissions.
answer
        Coaxial
question
            ____ cables are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.
answer
        Fiber-optic
question
            ____ media operate on line-of-sight.
answer
        Terrestrial microwave
question
            In ____ processing, each department has its own computer for performing processing tasks.
answer
        Decentralized
question
            The ____ layer of the OSI model serves as the window through which applications access network services.
answer
        Application
question
            The _____ layer of the OSI model formats message packets.
answer
        Presentation
question
            The ____ layer of the OSI model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
answer
        Transport
question
            The ____ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network
answer
        Data Link
question
            Another name for a network interface card is a(n) ____.
answer
        Adapter Card
question
            LANs are used most often to ____.
answer
        intergate services, such as e-mail and file sharing
question
            A network ____ represents a network's physical layout.
answer
        Topology
question
            In a bus topology, ____ are used at each end of the cable to absorb the signal.
answer
        Terminators
question
            A hierarchical topology is also called a ____ topology.
answer
        Tree
question
            Traditional mainframe networks use a ____ topology.
answer
        Hierarchical
question
            A ____ is a hardware device that allows several nodes to share one communication channel.
answer
        Multiplexer
question
            The ____ topology is costly and difficult to maintain and expand.
answer
        Mesh
question
            The Transmission Control Protocol (TCP) operates at the OSI model's ____ layer.
answer
        Transport
question
            The process of deciding which path the data takes on a network is called ____.
answer
        Routing
question
            A routing table lists ____.
answer
        nodes on a network
question
            A ____ router can build tables that identify addresses on each network.
answer
        Dynamic
question
            What is the first step in client/server communication?
answer
        The user creates a query
question
            ____ scaling refers to adding more workstations (clients).
answer
        Horizontal
question
            The most common n-tier architecture involves ____ tiers.
answer
        Three
question
            A ____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
answer
        Mobile
question
            ____ is using a cellular phone outside of a carrier's limited service area.
answer
        Surfing
question
            In the context of the technologies developed to improve the efficiency and quality of digital communications, ____ divide(s) each channel into six time slots.
answer
        Time Division Multiple Access (TDMA)
question
            Within the ____ technique for wireless security, a user's computer and the AP use a master key to negotiate for a key that will be used for a session.
answer
        Wi-Fi Protected Access 2
question
            In data communication, ____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
answer
        Convergence
question
            The Internet started in ____.
answer
        1969
question
            Documents that include embedded references to audio, text, images, video, and other documents are called ____.
answer
        Hypermedia
question
            A(n) ____ is the address of a document or site on the Internet.
answer
        URL
question
            The ____ denotes the type of organization or country the address specifies.
answer
        TLD
question
            In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of the directory in which files are stored.
answer
        ~hbidgoli
question
            Symmetric DSL usually has an upstream rate of ____ Mbps.
answer
        1.5
question
            Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
answer
        URLs
question
            Google.com, Bing.com, and Ask.com are examples of ____.
answer
        Search engines
question
            Which of the following protocols is used to send e-mails?
answer
        SMTP
question
            Which of the following protocols is used for retrieving messages?
answer
        POP
question
            ____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
answer
        Discussion groups
question
            Which of the following protocols is used for Internet telephony?
answer
        VolP
question
            ____ is also called a corporate portal.
answer
        An intranet
question
            Which of the following is true of the Internet?
answer
        It has less security measures than an intranet.
question
            The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.
answer
        Extranet
question
            A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.
answer
        Blog
question
            A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
answer
        Wiki
question
            ____ are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
answer
        Social Networking sites
question
            A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
answer
        Podcast
question
            The Internet2 (I2) project started in ____.
answer
        1987
question
            Another term that is use interchangeably with e-commerce is ____.
answer
        e-business
question
            ____ introduced the value chain concept.
answer
        Michael Porter
question
            ____ is a supporting activity in the value chain.
answer
        Technological development
question
            E-commerce fulfills the product information activity using ____.
answer
        Web Sites
question
            "____" means all market participants can trade at the same price.
answer
        Price Transparency
question
            Using the ____ model transfers the old retail model to the e-commerce world by using the medium of the Internet.
answer
        Merchant
question
            Using the ____ model brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
answer
        Brokerage
question
            E-commerce sites that use the ____ model collect information on consumers and businesses and then sell this information to other companies for marketing purposes.
answer
        Informediary
question
            E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
answer
        informediary
question
            ____ is a pure-play company.
answer
        Amazon.com
question
            ____ is a major player in B2B e-commerce.
answer
        Walmart
question
            ____ is a site that facilitates C2C e-commerce.
answer
        eBay
question
            Crisis response is an example of a ____ e-government application.
answer
        government-to-government
question
            E-training for government officials is an example of a ____ application.
answer
        government-to-employee
question
            E-procurement is an example of the ____ B2B e-commerce model.
answer
        seller-side marketplace
question
            The main objective of ____ is to prevent purchases from suppliers that are not on the approved list of sellers and eliminate the processing costs of purchases.
answer
        e-procurement
question
            A ____ generates revenue from the fees charged for matching buyers and sellers.
answer
        third-party exchange market-places
question
            A ____ market concentrates on a specific function or business process and automates this function or process for different industries.
answer
        Horizontal
question
            Mobile commerce (m-commerce) is based on the ____ protocol.
answer
        wireless application
question
            ____ refers to money or scrip that is exchanged only electronically.
answer
        Electronic payment
question
            ____ usually works with a smart card.
answer
        e-cash
question
            An ____ is available for most handheld devices that stores personal and financial information, such as credit card numbers, passwords, and PINs.
answer
        e-wallet
question
            ____ is a popular on-line payment system used on many on-line auction sites.
answer
        PayPal
question
            Which term describes one user viewing one ad?
answer
        Ad impression
question
            _____ display ads appear on top of a browser window, blocking the user's view.
answer
        Pop-up
question
            Which of the following terms is computed by dividing the number of clicks an ad gets by the total impressions bought?
answer
        Click-through rate (CTR)
question
            ____ is an application of artificial intelligence that can be used for Web marketing.
answer
        Intelligent agents
question
            With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
answer
        Push
question
            ____ is a method for improving the volume or quality of traffic to a Web site.
answer
        Search engine optimization
question
            A Web page displayed when the user first visits the site is called _____.
answer
        Splash screen