Chapter 4
chapter 5
chapter 6
All chapters
100

What are Common human errors

Carelessness with One’s Office or Carelessness Using Unmanaged Devices or Carelessness with Discarded Equipment or Careless Monitoring of Environmental Hazards

100

What is one type of source of data

internal source or personal source or external source

100

what is an advantage of a twisted-pair wire

inexpensive or widely available or easy to work with

100

What ar etwo types of network processing

Client/server computing and Peer-to-peer Processing (P2P)

200

what is social engineering

an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

200

what is an example of internal source

Corporate databases, company documents

200

what is an advantage of a coaxial cable

higher bandwidth than twisted-pair or less susceptible to electromagnetic interference

200

what is one way to access the internet

Connecting via an Online Service or Connecting via Other Means or Addresses on the Internet

300

what is one remote attacks requiring user action 

Virus or Worm or Phishing Attack or Spear Phishing Attack

300

what is an example of personal sources

Personal thoughts, opinions, experiences

300

what is an advantage of fiber-optic cable

very high bandwidth or relatively inexpensive or difficult to tap

300

what are the three characteristics of big data

Volume, Velocity, and Variety

400

what is one remote attack needing no user action

Denial of Service Attack or Distributed Denial of Service Attack

400

what is an example of a external source

Commercial databases, government reports, and corporate Web sites.

400

what are the three basic functions of the TCP

Manages the movement of data packets between computers by establishing a connection between the computers, Sequences the transfer of packets, and Acknowledges the packets that have been transmitted

400

what is knowledge management

A process that helps manipulate important knowledge that comprises part of the organization’s memory, usually in an unstructured format.

500

what is one Attack by a Programmer Developing a System

Trojan Horse or Back Door or Logic Bomb

500

what is one thing that Big data consists of 

Traditional enterprise data or Machine-generated/sensor data or Social Data or Images captured by billions of devices located around the world

500

what are the four layers of the TCP/IP reference model

Application Layer, Transport Layer, Internet Layer, and Network Interface Layer

500

what are the four types of alien software

Adware, Spyware, Spamware, and cookies

M
e
n
u