CMIS 4 – College Essay
Unlock all answers in this set
Unlock answersquestion
All of the following are examples of malware EXCEPT ____.
answer
updates
question
AI neural networks use ____ to simulate the processing that takes place between neurons in the brain.
answer
software
question
Microsoft Windows uses ____ Drive Encryption.
answer
BitLocker
question
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
answer
high-precision
question
____ threats are network security threats that originate from within a network.
answer
Interior
question
An item such as a smart card is an example of the ____ form of authentication.
answer
something you have
question
An expert system uses _________ , or rules of thumb, to arrive at conclusions or make suggestions.
answer
heuristics
question
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
answer
US-CERT
question
Computational intelligence is a form of _________.
answer
artificial intelligence
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
question
A ____ may be used to filter data that may be undesirable.
answer
firewall
question
The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
answer
artificial intelligence
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
question
A strong advocate of the Singularity concept is ____.
answer
Ray Kurzweil
question
A ____ is commonly packaged with a new computer system.
answer
rescue disk
question
____ artificial intelligence is very popular in the programming of robots.
answer
Behavior-based
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
answer
SSL
question
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
answer
phishing
question
____ proposed a test to determine whether a computer can be said to "think."
answer
Alan Turing
question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
question
Communication and language are key elements in the ____.
answer
Turing Test
question
Expert systems, case-based reasoning, and Bayesian networks are all examples of ____________.
answer
conventional AI
question
One use for a(n) ____ is to search a database for information pertaining to a specific query.
answer
intelligent agent
question
Sites such as eBay are a popular target for ____.
answer
Internet fraud
question
A popular encryption method used to protect data that travels over a wireless network is ____.
answer
WPA
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
question
A company called ____ provides digital certifications for web transactions.
answer
VeriSign
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
question
The only time it is considered safe to send private information over a public wireless network is if it has ____.
answer
none of the above; a public wireless network is never safe for private information
question
One important characteristic of artificial intelligence is when a system modifies its own behavior based on its ability to learn, also known as ____.
answer
machine learning
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
User
question
A ____ allows hackers to gain access to important code or information in a software program.
answer
security hole
question
An expert system relies on ____ to provide subject-specific knowledge.
answer
human experts
question
The concept of machines with intelligence that exceeds human intelligence is referred to as __________.
answer
strong AI
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phishing
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
question
The job of the ____ administrator is to control who has access to various network resources such as files and folders.
answer
network
question
Artists use a branch of artificial intelligence called ____ to express themselves through computers.
answer
artificial creativity
question
AI expert ____ has created an AI program he calls the Cybernetic Poet that can create poetry in the style of human poets.
answer
Ray Kurzweil
question
The component of artificial intelligence that demonstrates the ability to learn from experience and continuously improve performance is called __________.
answer
machine learning
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
question
Facial recognition is used as a(n) ____ process in the Australian SmartGate system.
answer
authentication
question
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.
answer
RAID
question
Conventional AI is also called ___________.
answer
symbolic AI
question
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
answer
an intelligent agent
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
A common form of authentication is a ____.
answer
password
question
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
answer
updates
question
A(n) ____ system is AI software that is programmed to respond like a human expert in a particular field or area.
answer
expert
question
AI applications are ways in which AI methodologies are applied to ____ and provide services.
answer
solve problems
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
question
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
answer
pattern
question
Which of the following is one realistic way to promote Internet security?
answer
Select strong passwords and change them regularly.
question
Computer vision enables ________ to react to visual input.
answer
software
question
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
answer
SSL connection
question
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meanings.
answer
recognize
question
The Mac computer employs the ____ system to encrypt its file data.
answer
FileVault
question
Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____.
answer
typing
question
Using ____ logic, results are based on approximations and sometimes ambiguous criteria.
answer
fuzzy
question
A feature of neural networks includes the ability to quickly ____ stored data when new information is identified.
answer
modify
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
answer
social engineering
question
The concept of the Singularity predicts that computers will be ____.
answer
superintelligent
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
Neural networks, fuzzy systems, and evolutionary computation are all forms of __________, where systems develop intelligence through an iterative learning process.
answer
computational intelligence
question
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
answer
disasters
question
In artificial intelligence, ____ computation is based on a genetic algorithm to solve complex problems.
answer
evolutionary
question
When you enter the wrong GPS position for the start point on a trip you are about to take, this is an example of ____.
answer
a data-entry error