Data Marts, Warehouses, Lakes
Chapter 4
Chapter 4 Cont...
Chapter 5
Chapter 5 Cont...
100

 A data _____ is usually a smaller version of a data warehouse used by a single department or function.

mart

100

 In the context of privacy issues, unsolicited e-mail sent for advertising is called _____.

spam

100

 A patient is paranoid about providing confidential information to a new healthcare provider. What laws can they use to help support if any information is accidentally released?

HIPAA

100

What are the 3 pieces of the CIA triangle?

Confidentiality

Integrity

Availability

100

 _____ monitors and records the keys pressed on a keyboard, which can be software or hardware devices.

Keystroke loggers

200

___ holds the least amount of data?

Data Mart

200

 _____ involves designing, manufacturing, using, and disposing of computers and servers to minimize environmental impact.

Green computing

200

Not all citizens can access similar technologies in a rural community. Why is this?

The digital divide exists in rural areas due to a lack of infrastructure to support high-speed Internet.

200

 Similar to phishing, _____ is directing Internet users to fraudulent Web sites to steal their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

pharming

200

 According to research published by Cybersecurity Ventures in 2020, cybercrime will cost the world economy _____ annually by 2025.

$10.5 trillion

300
Which can hold the most data? Warehouse, Mart or Lake?

Data Lake

300

 _____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.

Cookies

300

 It's your birthday! You received an email from your company's HR director for a $100 Amazon gift card. What would be the appropriate action in response to this email?

Do not click on anything but forward it to your IT team and HR director with your suspicions of a phishing attack.

300

 In computer and network security, _____ refers to the accuracy of information resources within an organization.

integrity
300

Name 3 intentional computer threats.

Viruses

Worms

Trojans

Logic Bombs

Backdoors

Blended threats

Rootkits

DoS attacks

Social engineering

Cryptojacking

400

What is a benefit of a data mart over warehouses or lakes?

Access data faster

Response time is improved

Less expensive

400

 __________ are the top three countries for generating spam.

U.S., China, Russia

400

You are the hiring manager for a new senior developer. You finished interviewing the candidate, and they have excellent technical skills. When asked how they would react in an ethical scenario, they did not reply as you had hoped. How should you move forward with this candidate?

Disqualify them as a candidate or note the concern for the hiring team.

400

 In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

denial-of-service attack

400

A security vendor needs to develop a security system for a personal site that compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify a user's identity. Which biometric security measure should be implemented to accomplish this task?

Hand Geometry

500

A data _____ is a collection of data from various sources used to support decision-making applications and generate business intelligence.

warehouse

500

 Which federal law is intended to protect data collected from children?

COPPA

500

Name a key component of the General Data Protection Regulation

User consent must be given for the processing of personal information.

Collected data must be anonymized to protect privacy.

Safe data transfer across borders.

500

 A security analyst wants to ensure data confidentiality, accuracy, and integrity using a level 2 security system. This involves protecting _____.

back-end systems
500

 A system administrator must add some remote users to the network. The system administrator chooses a VPN that allows_____ protocol for encryption.

Layer Two Tunneling