Eric Hatch ISYS Test 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
___is the process of capturing and recording network traffic.
answer
Sniffing
question
A ____ is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.
answer
Script Kiddie
question
____ are hackers who specialize in unauthorized penetration of information systems.
answer
Black Hats
question
____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.
answer
White Hats
question
____ means that a system must prevent disclosing information to anyone who is not authorized to access it.
answer
Confidentiality
question
____ refers to the accuracy of information resources within an organization.
answer
Integrity
question
____ means that computers and networks are operating and authorized users can access the information they need.
answer
Availability
question
Level 1 security involves ____.
answer
Front-End servers
question
Level 2 security involves ____.
answer
Back-end systems
question
Level 3 security involves ____.
answer
Corporate networks
question
Which of the following is considered an intentional threat?
answer
Social Engineering
question
A ____ travels from computer to computer in a network, but it does not usually erase data.
answer
Worm
question
A logic bomb is a type of ____.
answer
Trojan Program
question
A ____ is a programming routine built into a system by its designer or programmer.
answer
Backdoor
question
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.
answer
Denial-of-Service
question
A ____ attack typically targets Internet servers.
answer
Denial-of-Service
question
____ take advantage of the human element of security systems.
answer
Social Engineering Attacks
question
____ security measures use a physiological element to enhance security measures.
answer
Biometric
question
Which of the following is a biometric security measure?
answer
Signature Analysis
question
Which of the following is a nonbiometric security measure?
answer
Firewalls
question
A(n) ____ is software that acts as an intermediary between two systems.
answer
Proxy server
question
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
answer
Intrusion detection systems
question
Which of the following is a physical security measure?
answer
Electronic trackers
question
Which of the following is a type of access control?
answer
Passwords
question
A(n) ____ is often used so remote users have a secure connection to the organization's network.
answer
Virtual private network
question
Typically, an organization leases the media used for a VPN on a(n) ____ basis.
answer
as-needed
question
Data encryption transforms data into a scrambled form called ____.
answer
Ciphertext
question
____ is a commonly used encryption protocol that manages transmission security on the Internet.
answer
Secure Sockets Layer
question
____ ensures data security and integrity over public networks, such as the Internet.
answer
Transport Layer Security
question
____ encryption uses a public key known to everyone and a private key known only to the recipient.
answer
Asymmetric
question
In ____ encryption, the same key is used to encrypt and decrypt the message.
answer
Symmetric
question
Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.
answer
CERT
question
The main function of the ____ model is to provide information on security incidents, including information systems' vulnerabilities, viruses, and malicious programs.
answer
CIRC
question
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
answer
Business continuity planning
question
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.
answer
Disaster recovery
question
The amount of data that can be transferred from one point to another in one second is called ____.
answer
Bandwidth
question
In _____ data transmission, multiple pieces of data are sent simultaneously.
answer
Broadband
question
____ cables are thick cables that can be used for both data and voice transmissions.
answer
Coaxial
question
____ cables are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.
answer
Fiber-optic
question
____ media operate on line-of-sight.
answer
Terrestrial microwave
question
In ____ processing, each department has its own computer for performing processing tasks.
answer
Decentralized
question
The ____ layer of the OSI model serves as the window through which applications access network services.
answer
Application
question
The _____ layer of the OSI model formats message packets.
answer
Presentation
question
The ____ layer of the OSI model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
answer
Transport
question
The ____ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network
answer
Data Link
question
Another name for a network interface card is a(n) ____.
answer
Adapter Card
question
LANs are used most often to ____.
answer
intergate services, such as e-mail and file sharing
question
A network ____ represents a network's physical layout.
answer
Topology
question
In a bus topology, ____ are used at each end of the cable to absorb the signal.
answer
Terminators
question
A hierarchical topology is also called a ____ topology.
answer
Tree
question
Traditional mainframe networks use a ____ topology.
answer
Hierarchical
question
A ____ is a hardware device that allows several nodes to share one communication channel.
answer
Multiplexer
question
The ____ topology is costly and difficult to maintain and expand.
answer
Mesh
question
The Transmission Control Protocol (TCP) operates at the OSI model's ____ layer.
answer
Transport
question
The process of deciding which path the data takes on a network is called ____.
answer
Routing
question
A routing table lists ____.
answer
nodes on a network
question
A ____ router can build tables that identify addresses on each network.
answer
Dynamic
question
What is the first step in client/server communication?
answer
The user creates a query
question
____ scaling refers to adding more workstations (clients).
answer
Horizontal
question
The most common n-tier architecture involves ____ tiers.
answer
Three
question
A ____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
answer
Mobile
question
____ is using a cellular phone outside of a carrier's limited service area.
answer
Surfing
question
In the context of the technologies developed to improve the efficiency and quality of digital communications, ____ divide(s) each channel into six time slots.
answer
Time Division Multiple Access (TDMA)
question
Within the ____ technique for wireless security, a user's computer and the AP use a master key to negotiate for a key that will be used for a session.
answer
Wi-Fi Protected Access 2
question
In data communication, ____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
answer
Convergence
question
The Internet started in ____.
answer
1969
question
Documents that include embedded references to audio, text, images, video, and other documents are called ____.
answer
Hypermedia
question
A(n) ____ is the address of a document or site on the Internet.
answer
URL
question
The ____ denotes the type of organization or country the address specifies.
answer
TLD
question
In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of the directory in which files are stored.
answer
~hbidgoli
question
Symmetric DSL usually has an upstream rate of ____ Mbps.
answer
1.5
question
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
answer
URLs
question
Google.com, Bing.com, and Ask.com are examples of ____.
answer
Search engines
question
Which of the following protocols is used to send e-mails?
answer
SMTP
question
Which of the following protocols is used for retrieving messages?
answer
POP
question
____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
answer
Discussion groups
question
Which of the following protocols is used for Internet telephony?
answer
VolP
question
____ is also called a corporate portal.
answer
An intranet
question
Which of the following is true of the Internet?
answer
It has less security measures than an intranet.
question
The Federal Express Tracking System allows customers to enter a package's tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.
answer
Extranet
question
A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.
answer
Blog
question
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content.
answer
Wiki
question
____ are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
answer
Social Networking sites
question
A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
answer
Podcast
question
The Internet2 (I2) project started in ____.
answer
1987
question
Another term that is use interchangeably with e-commerce is ____.
answer
e-business
question
____ introduced the value chain concept.
answer
Michael Porter
question
____ is a supporting activity in the value chain.
answer
Technological development
question
E-commerce fulfills the product information activity using ____.
answer
Web Sites
question
"____" means all market participants can trade at the same price.
answer
Price Transparency
question
Using the ____ model transfers the old retail model to the e-commerce world by using the medium of the Internet.
answer
Merchant
question
Using the ____ model brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
answer
Brokerage
question
E-commerce sites that use the ____ model collect information on consumers and businesses and then sell this information to other companies for marketing purposes.
answer
Informediary
question
E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
answer
informediary
question
____ is a pure-play company.
answer
Amazon.com
question
____ is a major player in B2B e-commerce.
answer
Walmart
question
____ is a site that facilitates C2C e-commerce.
answer
eBay
question
Crisis response is an example of a ____ e-government application.
answer
government-to-government
question
E-training for government officials is an example of a ____ application.
answer
government-to-employee
question
E-procurement is an example of the ____ B2B e-commerce model.
answer
seller-side marketplace
question
The main objective of ____ is to prevent purchases from suppliers that are not on the approved list of sellers and eliminate the processing costs of purchases.
answer
e-procurement
question
A ____ generates revenue from the fees charged for matching buyers and sellers.
answer
third-party exchange market-places
question
A ____ market concentrates on a specific function or business process and automates this function or process for different industries.
answer
Horizontal
question
Mobile commerce (m-commerce) is based on the ____ protocol.
answer
wireless application
question
____ refers to money or scrip that is exchanged only electronically.
answer
Electronic payment
question
____ usually works with a smart card.
answer
e-cash
question
An ____ is available for most handheld devices that stores personal and financial information, such as credit card numbers, passwords, and PINs.
answer
e-wallet
question
____ is a popular on-line payment system used on many on-line auction sites.
answer
PayPal
question
Which term describes one user viewing one ad?
answer
Ad impression
question
_____ display ads appear on top of a browser window, blocking the user's view.
answer
Pop-up
question
Which of the following terms is computed by dividing the number of clicks an ad gets by the total impressions bought?
answer
Click-through rate (CTR)
question
____ is an application of artificial intelligence that can be used for Web marketing.
answer
Intelligent agents
question
With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
answer
Push
question
____ is a method for improving the volume or quality of traffic to a Web site.
answer
Search engine optimization
question
A Web page displayed when the user first visits the site is called _____.
answer
Splash screen
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New