Eric Hatch ISYS Test 2 – Flashcards
115 test answers
Unlock all answers in this set
Unlock answers 115question
____ means that a system must prevent disclosing information to anyone who is not authorized to access it.
answer
Confidentiality
Unlock the answer
question
____ refers to the accuracy of information resources within an organization.
answer
Integrity
Unlock the answer
question
____ means that computers and networks are operating and authorized users can access the information they need.
answer
Availability
Unlock the answer
question
Level 1 security involves ____.
answer
Front-End servers
Unlock the answer
question
Level 2 security involves ____.
answer
Back-end systems
Unlock the answer
question
Level 3 security involves ____.
answer
Corporate networks
Unlock the answer
question
Which of the following is considered an intentional threat?
answer
Social Engineering
Unlock the answer
question
A ____ travels from computer to computer in a network, but it does not usually erase data.
answer
Worm
Unlock the answer
question
A logic bomb is a type of ____.
answer
Trojan Program
Unlock the answer
question
A ____ is a programming routine built into a system by its designer or programmer.
answer
Backdoor
Unlock the answer
question
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
answer
Denial-of-Service
Unlock the answer
question
A ____ attack typically targets Internet servers.
answer
Denial-of-Service
Unlock the answer
question
____ take advantage of the human element of security systems.
answer
Social Engineering Attacks
Unlock the answer
question
____ security measures use a physiological element to enhance security measures.
answer
Biometric
Unlock the answer
question
Which of the following is a biometric security measure?
answer
Signature Analysis
Unlock the answer
question
Which of the following is a nonbiometric security measure?
answer
Firewalls
Unlock the answer
question
A(n) ____ is software that acts as an intermediary between two systems.
answer
Proxy server
Unlock the answer
question
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
answer
Intrusion detection systems
Unlock the answer
question
Which of the following is a physical security measure?
answer
Electronic trackers
Unlock the answer
question
Which of the following is a type of access control?
answer
Passwords
Unlock the answer
question
A(n) ____ is often used so remote users have a secure connection to the organization's network.
answer
Virtual private network
Unlock the answer
question
Typically, an organization leases the media used for a VPN on a(n) ____ basis.
answer
as-needed
Unlock the answer
question
Data encryption transforms data into a scrambled form called ____.
answer
Ciphertext
Unlock the answer
question
____ is a commonly used encryption protocol that manages transmission security on the Internet.
answer
Secure Sockets Layer
Unlock the answer
question
____ ensures data security and integrity over public networks, such as the Internet.
answer
Transport Layer Security
Unlock the answer
question
____ encryption uses a public key known to everyone and a private key known only to the recipient.
answer
Asymmetric
Unlock the answer
question
In ____ encryption, the same key is used to encrypt and decrypt the message.
answer
Symmetric
Unlock the answer
question
Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.
answer
CERT
Unlock the answer
question
The main function of the ____ model is to provide information on security incidents, including information systems' vulnerabilities, viruses, and malicious programs.
answer
CIRC
Unlock the answer
question
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
answer
Business continuity planning
Unlock the answer
question
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.
answer
Disaster recovery
Unlock the answer
question
The amount of data that can be transferred from one point to another in one second is called ____.
answer
Bandwidth
Unlock the answer
question
In _____ data transmission, multiple pieces of data are sent simultaneously.
answer
Broadband
Unlock the answer
question
____ cables are thick cables that can be used for both data and voice transmissions.
answer
Coaxial
Unlock the answer
question
____ cables are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.
answer
Fiber-optic
Unlock the answer
question
____ media operate on line-of-sight.
answer
Terrestrial microwave
Unlock the answer
question
In ____ processing, each department has its own computer for performing processing tasks.
answer
Decentralized
Unlock the answer
question
The ____ layer of the OSI model serves as the window through which applications access network services.
answer
Application
Unlock the answer
question
The _____ layer of the OSI model formats message packets.
answer
Presentation
Unlock the answer
question
The ____ layer of the OSI model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
answer
Transport
Unlock the answer
question
The ____ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network
answer
Data Link
Unlock the answer
question
Another name for a network interface card is a(n) ____.
answer
Adapter Card
Unlock the answer
question
LANs are used most often to ____.
answer
intergate services, such as e-mail and file sharing
Unlock the answer
question
A network ____ represents a network's physical layout.
answer
Topology
Unlock the answer
question
In a bus topology, ____ are used at each end of the cable to absorb the signal.
answer
Terminators
Unlock the answer
question
A hierarchical topology is also called a ____ topology.
answer
Tree
Unlock the answer
question
Traditional mainframe networks use a ____ topology.
answer
Hierarchical
Unlock the answer
question
A ____ is a hardware device that allows several nodes to share one communication channel.
answer
Multiplexer
Unlock the answer
question
The ____ topology is costly and difficult to maintain and expand.
answer
Mesh
Unlock the answer
question
The Transmission Control Protocol (TCP) operates at the OSI model's ____ layer.
answer
Transport
Unlock the answer
question
The process of deciding which path the data takes on a network is called ____.
answer
Routing
Unlock the answer
question
A routing table lists ____.
answer
nodes on a network
Unlock the answer
question
A ____ router can build tables that identify addresses on each network.
answer
Dynamic
Unlock the answer
question
What is the first step in client/server communication?
answer
The user creates a query
Unlock the answer
question
____ scaling refers to adding more workstations (clients).
answer
Horizontal
Unlock the answer
question
The most common n-tier architecture involves ____ tiers.
answer
Three
Unlock the answer
question
A ____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
answer
Mobile
Unlock the answer
question
____ is using a cellular phone outside of a carrier's limited service area.
answer
Surfing
Unlock the answer
question
In the context of the technologies developed to improve the efficiency and quality of digital communications, ____ divide(s) each channel into six time slots.
answer
Time Division Multiple Access (TDMA)
Unlock the answer
question
Within the ____ technique for wireless security, a user's computer and the AP use a master key to negotiate for a key that will be used for a session.
answer
Wi-Fi Protected Access 2
Unlock the answer
question
In data communication, ____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
answer
Convergence
Unlock the answer
question
The Internet started in ____.
answer
1969
Unlock the answer
question
Documents that include embedded references to audio, text, images, video, and other documents are called ____.
answer
Hypermedia
Unlock the answer
question
A(n) ____ is the address of a document or site on the Internet.
answer
URL
Unlock the answer
question
The ____ denotes the type of organization or country the address specifies.
answer
TLD
Unlock the answer
question
In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of the directory in which files are stored.
answer
~hbidgoli
Unlock the answer
question
Symmetric DSL usually has an upstream rate of ____ Mbps.
answer
1.5
Unlock the answer
question
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
answer
URLs
Unlock the answer
question
Google.com, Bing.com, and Ask.com are examples of ____.
answer
Search engines
Unlock the answer
question
Which of the following protocols is used to send e-mails?
answer
SMTP
Unlock the answer
question
Which of the following protocols is used for retrieving messages?
answer
POP
Unlock the answer
question
____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
answer
Discussion groups
Unlock the answer
question
Which of the following protocols is used for Internet telephony?
answer
VolP
Unlock the answer
question
____ is also called a corporate portal.
answer
An intranet
Unlock the answer
question
Which of the following is true of the Internet?
answer
It has less security measures than an intranet.
Unlock the answer
question
The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.
answer
Extranet
Unlock the answer
question
A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.
answer
Blog
Unlock the answer
question
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
answer
Wiki
Unlock the answer
question
____ are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
answer
Social Networking sites
Unlock the answer
question
A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
answer
Podcast
Unlock the answer
question
The Internet2 (I2) project started in ____.
answer
1987
Unlock the answer
question
Another term that is use interchangeably with e-commerce is ____.
answer
e-business
Unlock the answer
question
____ introduced the value chain concept.
answer
Michael Porter
Unlock the answer
question
____ is a supporting activity in the value chain.
answer
Technological development
Unlock the answer
question
E-commerce fulfills the product information activity using ____.
answer
Web Sites
Unlock the answer
question
"____" means all market participants can trade at the same price.
answer
Price Transparency
Unlock the answer
question
Using the ____ model transfers the old retail model to the e-commerce world by using the medium of the Internet.
answer
Merchant
Unlock the answer
question
Using the ____ model brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
answer
Brokerage
Unlock the answer
question
E-commerce sites that use the ____ model collect information on consumers and businesses and then sell this information to other companies for marketing purposes.
answer
Informediary
Unlock the answer
question
E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
answer
informediary
Unlock the answer
question
____ is a pure-play company.
answer
Amazon.com
Unlock the answer
question
____ is a major player in B2B e-commerce.
answer
Walmart
Unlock the answer
question
____ is a site that facilitates C2C e-commerce.
answer
eBay
Unlock the answer
question
Crisis response is an example of a ____ e-government application.
answer
government-to-government
Unlock the answer
question
E-training for government officials is an example of a ____ application.
answer
government-to-employee
Unlock the answer
question
E-procurement is an example of the ____ B2B e-commerce model.
answer
seller-side marketplace
Unlock the answer
question
The main objective of ____ is to prevent purchases from suppliers that are not on the approved list of sellers and eliminate the processing costs of purchases.
answer
e-procurement
Unlock the answer
question
A ____ generates revenue from the fees charged for matching buyers and sellers.
answer
third-party exchange market-places
Unlock the answer
question
A ____ market concentrates on a specific function or business process and automates this function or process for different industries.
answer
Horizontal
Unlock the answer
question
Mobile commerce (m-commerce) is based on the ____ protocol.
answer
wireless application
Unlock the answer
question
____ refers to money or scrip that is exchanged only electronically.
answer
Electronic payment
Unlock the answer
question
____ usually works with a smart card.
answer
e-cash
Unlock the answer
question
An ____ is available for most handheld devices that stores personal and financial information, such as credit card numbers, passwords, and PINs.
answer
e-wallet
Unlock the answer
question
____ is a popular on-line payment system used on many on-line auction sites.
answer
PayPal
Unlock the answer
question
Which term describes one user viewing one ad?
answer
Ad impression
Unlock the answer
question
_____ display ads appear on top of a browser window, blocking the user's view.
answer
Pop-up
Unlock the answer
question
Which of the following terms is computed by dividing the number of clicks an ad gets by the total impressions bought?
answer
Click-through rate (CTR)
Unlock the answer
question
____ is an application of artificial intelligence that can be used for Web marketing.
answer
Intelligent agents
Unlock the answer
question
With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
answer
Push
Unlock the answer
question
____ is a method for improving the volume or quality of traffic to a Web site.
answer
Search engine optimization
Unlock the answer
question
A Web page displayed when the user first visits the site is called _____.
answer
Splash screen
Unlock the answer