CIS 101 Exam #3 Practice Tests – Flashcards

Unlock all answers in this set

Unlock answers
question
a time virus can be triggered on a certain data
answer
true
question
the Internet Crime Complaint Center (IC3) is a partnership between the
answer
FBI and National White Collar Crime Center
question
creating and spreading online viruses is a cybercrime
answer
true
question
spear phishing
answer
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
question
rootkit
answer
programs that allow hackers to gain access to your computer without your knowledge
question
scareware
answer
malware on your computer used to convince you that your computer has a virus
question
zombie
answer
a computer controlled by a hacker
question
spyware
answer
transmits information about you, such as your Internet-surfing habits
question
a denial-of-service attack can be used to deny hackers access to a computer system
answer
false
question
takes advantage of file transport methods to spread in its own
answer
worm
question
the terms virus and worm mean the same thing
answer
false
question
FBI-related scams involve
answer
people pretending to represent official organizations
question
the act of tricking people into revealing sensitive information and is often associated with credit card fraud
answer
phishing
question
illegally penetrates a system simply to demonstrate the hackers expertise to the system administrator
answer
grey hat hacker
question
packet filtering
answer
method for selectively allowing certain requests to access ports
question
IP address
answer
a computers identity on the Internet
question
firewall
answer
hardware or software for protecting computers from hackers
question
CAPTCHA
answer
program that generates distorted text and require that it be types into a box
question
geotag
answer
data attached to a photo that indicates when/where the photo was taken
question
break into systems for non-malicious reasons such as to test the system security vulnerabilities
answer
white-hat
question
there are no antivirus programs for mobile devices
answer
false (there are antivirus programs for mobile devices)
question
stealth virus is designed to infect multiple file types to fool the antivirus software
answer
false (stealth virus temporarily erases its code from the files where it resides and hides in the active memory of the computer)
question
a virus that is triggered on a certain date
answer
time bomb
question
protects a computer against power surges
answer
surge protector
question
the portion of virus code that is unique to a particular computer virus
answer
virus signature
question
any criminal action perpetrated primarily through the use of a computer
answer
cybercrime
question
another name for a sniffer
answer
packet analyzer
question
with regard to computer protection, quarantining is
answer
placing a found virus in a secure area on the hard drive
question
the acronym HTML stands for
answer
hypertext markup language
question
second generation languages are also known as assembly languages
answer
true
question
the capability of moving a completed programming solution easily from one type of computer to another
answer
portability
question
most browsers can execute Java _______ which are small Java-based programs
answer
applets
question
object-oriented _______ are defined by the information (data) and the actions (methods) associated with them
answer
classes
question
in the _______ phase of the SDLC, exploration of the depth of a problem and development of program specifications take place
answer
analysis
question
the standard set of vocabulary for pseudocode is specific and detailed
answer
false
question
when programmers need to create several different examples of a class, each is known as an object
answer
true
question
portability
answer
the capability to move a completed solution easily from one type of computer to another
question
reusability
answer
the ability to apply classes from other projects to a new project
question
inheritance
answer
a new class can automatically pick up data and methods of an existing class
question
method
answer
an object oriented function or behavior
question
data
answer
raw input
question
would NOT be used to build websites with interactive capabilities
answer
Fortran
question
a data-flow diagram provides a visual representation of an algorithm
answer
false
question
process that converts program code into machine language
answer
compilation
question
in a _____ system each step is dependent on the previous step
answer
waterfall
question
in the "making a plan" step of the PDLC a _____ is written in natural, ordinary language describing exactly what the computer program is to do
answer
algorithm
question
a control structure that continues to be performed while a test condition is true
answer
loop
question
process of running a program over and over to find errors and make sure the program behaves in the way it should is
answer
debugging
question
enables users to define their own data-based tags and facilitates exchange of information between websites
answer
XML
question
the final stage of the program development life cycle (PDLC)
answer
testing and documentation
question
a combination of natural language and programming language that is used to document an algorithm
answer
pseudocode
question
in object-oriented terms, an original class is the ______ class
answer
base
question
a group of related records is called a table
answer
true
question
a filter is limited to extracting data from a single table
answer
true
question
a group of related data that can be stored, sorted, organized, and queried
answer
database
question
the information in a data mart spans an entire enterprise
answer
false
question
a group of related records is called a
answer
table
question
you would use a _____ to temporarily display records of residents of the city of Boston
answer
filter
question
_______ databases are better at handling unstructured data such as audio clips, video clips, and pictures
answer
object-oriented
question
a data dictionary also referred to as
answer
a database schema
question
category of information in a database
answer
field
question
a collection of related data that can be stored, sorted, organized, and queried
answer
database
question
group of related fields
answer
record
question
group of related records
answer
table
question
field that has a value unique to each record
answer
primary key
question
the process that extracts data from source databases, reformats the data, and stores them in the warehouse (when creating a data warehouse)
answer
data staging
question
used to ensure that data is organized most efficiently
answer
normalization
question
the process when TPS (transaction-processing system) database being queried and updated while the transaction is taking place
answer
real-time processing
question
helps to ensure data integrity by maintaining information in only one place
answer
data centralization
question
the format that data in a multidimensional database is organized in
answer
cube format
question
provides a view of data fields to be filled in with appropriate labels to assist a user in entering data into the database
answer
input form
question
when using Access, the text of the Gettysburg Address would be stored in a short text field
answer
false
question
in a database, a group of related records is referred to as a
answer
table
question
data mining analyzes and investigates large amounts of data with the intention of discovering significant patterns or trends
answer
true
question
tries to replicate the decision-making process of human experts to solve specific problems
answer
expert system
question
identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility
answer
possessed
question
a phishing attack is an attempt to access an account by repeatedly trying different passwords
answer
false (trying to get personal information from people to do identity theft)
question
a bridge sends information between two networks
answer
false
question
a ________ server tracks who is logging on to the network as well as which services on the network are available to each other
answer
authentication
question
can often be equipped to act as a hardware firewall
answer
router
question
a network in a small geographic area
answer
LAN
question
used by a single individual connecting devices using wireless media
answer
PAN
question
can be used for a small home-based business
answer
HAN
question
links users in a specific geographic area (usually a city)
answer
MAN
question
network of two or more LANs
answer
WAN
question
each node connected to the network communicates directly with every other node
answer
peer-to-peer network
question
can contain servers as well as individual computers
answer
client/server network
question
physical address assigned each network adapter
answer
media access control (MAC)
question
a server that stores and manages files for network users
answer
file server
question
uses more than one topology when building a network
answer
hybrid topology
question
keeps track of user logins to the network and which services are available to each user
answer
authentication
question
acts as a repository for application software
answer
application
question
hosts websites that can be accessed via the Internet
answer
web
question
allows client computers to access a database
answer
database
question
a server not physically located at a company's site
answer
cloud
question
ring networks use the _____ method to avoid data collisions
answer
token
question
set of common rules that control communications among network devices
answer
protocol
question
special type of data packet
answer
token
question
device that absorbs a signal so that it is not reflected back
answer
terminator
question
computer system designed to attract unauthorized users
answer
honey pot
question
holds multiple data packets
answer
frame
question
places data packets inside other data packets
answer
tunneling technology
question
sends data from one collision domain to another
answer
bridge
question
worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network
answer
false
question
MAC addresses and IP addresses are the same thing
answer
false
question
retinal scanning is an example of ________ authentication
answer
biometric
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New