A data _____ is usually a smaller version of a data warehouse used by a single department or function.
mart
In the context of privacy issues, unsolicited e-mail sent for advertising is called _____.
spam
A patient is paranoid about providing confidential information to a new healthcare provider. What laws can they use to help support if any information is accidentally released?
HIPAA
What are the 3 pieces of the CIA triangle?
Confidentiality
Integrity
Availability
_____ monitors and records the keys pressed on a keyboard, which can be software or hardware devices.
Keystroke loggers
___ holds the least amount of data?
Data Mart
_____ involves designing, manufacturing, using, and disposing of computers and servers to minimize environmental impact.
Green computing
Not all citizens can access similar technologies in a rural community. Why is this?
The digital divide exists in rural areas due to a lack of infrastructure to support high-speed Internet.
Similar to phishing, _____ is directing Internet users to fraudulent Web sites to steal their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
pharming
According to research published by Cybersecurity Ventures in 2020, cybercrime will cost the world economy _____ annually by 2025.
$10.5 trillion
Data Lake
_____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.
Cookies
It's your birthday! You received an email from your company's HR director for a $100 Amazon gift card. What would be the appropriate action in response to this email?
Do not click on anything but forward it to your IT team and HR director with your suspicions of a phishing attack.
In computer and network security, _____ refers to the accuracy of information resources within an organization.
Name 3 intentional computer threats.
Viruses
Worms
Trojans
Logic Bombs
Backdoors
Blended threats
Rootkits
DoS attacks
Social engineering
Cryptojacking
What is a benefit of a data mart over warehouses or lakes?
Access data faster
Response time is improved
Less expensive
__________ are the top three countries for generating spam.
U.S., China, Russia
You are the hiring manager for a new senior developer. You finished interviewing the candidate, and they have excellent technical skills. When asked how they would react in an ethical scenario, they did not reply as you had hoped. How should you move forward with this candidate?
Disqualify them as a candidate or note the concern for the hiring team.
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
denial-of-service attack
A security vendor needs to develop a security system for a personal site that compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify a user's identity. Which biometric security measure should be implemented to accomplish this task?
Hand Geometry
A data _____ is a collection of data from various sources used to support decision-making applications and generate business intelligence.
warehouse
Which federal law is intended to protect data collected from children?
COPPA
Name a key component of the General Data Protection Regulation
User consent must be given for the processing of personal information.
Collected data must be anonymized to protect privacy.
Safe data transfer across borders.
A security analyst wants to ensure data confidentiality, accuracy, and integrity using a level 2 security system. This involves protecting _____.
A system administrator must add some remote users to the network. The system administrator chooses a VPN that allows_____ protocol for encryption.
Layer Two Tunneling