What are Common human errors
Carelessness with One’s Office or Carelessness Using Unmanaged Devices or Carelessness with Discarded Equipment or Careless Monitoring of Environmental Hazards
What is one type of source of data
internal source or personal source or external source
what is an advantage of a twisted-pair wire
inexpensive or widely available or easy to work with
What ar etwo types of network processing
Client/server computing and Peer-to-peer Processing (P2P)
what is social engineering
an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
what is an example of internal source
Corporate databases, company documents
what is an advantage of a coaxial cable
higher bandwidth than twisted-pair or less susceptible to electromagnetic interference
what is one way to access the internet
Connecting via an Online Service or Connecting via Other Means or Addresses on the Internet
what is one remote attacks requiring user action
Virus or Worm or Phishing Attack or Spear Phishing Attack
what is an example of personal sources
Personal thoughts, opinions, experiences
what is an advantage of fiber-optic cable
very high bandwidth or relatively inexpensive or difficult to tap
what are the three characteristics of big data
Volume, Velocity, and Variety
what is one remote attack needing no user action
Denial of Service Attack or Distributed Denial of Service Attack
what is an example of a external source
Commercial databases, government reports, and corporate Web sites.
what are the three basic functions of the TCP
Manages the movement of data packets between computers by establishing a connection between the computers, Sequences the transfer of packets, and Acknowledges the packets that have been transmitted
what is knowledge management
A process that helps manipulate important knowledge that comprises part of the organization’s memory, usually in an unstructured format.
what is one Attack by a Programmer Developing a System
Trojan Horse or Back Door or Logic Bomb
what is one thing that Big data consists of
Traditional enterprise data or Machine-generated/sensor data or Social Data or Images captured by billions of devices located around the world
what are the four layers of the TCP/IP reference model
Application Layer, Transport Layer, Internet Layer, and Network Interface Layer
what are the four types of alien software
Adware, Spyware, Spamware, and cookies