Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 1355 wikipedia , lookup

Computer security wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
1. Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1)
Mainframe and Minicomputer; (2) Client/Server; (3) Enterprise Internet; (4) Personal Computer;
and (5) Electronic Accounting Machine.
a.
b.
c.
d.
5, 1, 2, 3, 4
5, 1, 4, 2, 3
1, 5, 4, 2, 3
1, 5, 2, 3, 4
2. In a multi-tiered network:
a.
b.
c.
d.
the work of the entire network is centralized.
the work of the entire network is balanced over several levels of servers.
processing is split between clients and servers.
processing is handled by multiple, geographically remote clients.
3. Interpretations of Moore’s law assert that:
a.
b.
c.
d.
computing power doubles every 18 months.
transistors decrease in size 50% every two years.
data storage costs decrease by 50% every 18 months.
none of the above.
4. Today’s nanotechnology-produced computer transistors are roughly equivalent in size to:
a.
b.
c.
d.
the width of a fingernail.
a human hair.
a virus.
an atom.
5. Which of the following factors provides an understanding of why computing resources today
are ever more available than in previous decades?
a.
b.
c.
d.
Network economics
Law of mass digital storage and Moore’s law
Declining communications costs, universal standards, and the Internet
All of the above
6. Software that manages the resources of the computer is called:
a.
b.
c.
d.
operating system software.
application software.
data management software.
network software.
7. As referred to in the text, legacy systems are:
a.
b.
c.
d.
traditional mainframe-based business information systems.
electronic spreadsheets used on a PC.
any pre-1990 Wintel systems.
systems found on older ASPs.
8. Connecting geographically remote computers in a single network to create a “virtual
supercomputer” is called:
a.
b.
c.
d.
co-location.
edge computing.
grid computing.
utility computing.
9. This type of computing refers to firms off-loading peak requests for computing power to
remote, large-scale data processing centers.
a.
b.
c.
d.
On-demand
Grid
Edge
Autonomic
10. An example of autonomic computing is:
a.
b.
c.
d.
spyware protection software that runs and updates itself automatically.
software programmed to run on any hardware platform.
cell phones taking on the functions of handheld computers.
programming languages that allow non-programmers to create custom applications.
11. Which type of software is created and updated by a worldwide community of programmers
and available for free?
a.
b.
c.
d.
Software packages
Mashups
Outsourced
Open source
12. Software that connects two disparate applications, allowing them to communicate with each
other and to exchange data, is called:
a.
b.
c.
enterprise software.
integration software.
distributed software.
d.
middleware.
13. Sets of loosely coupled software components that exchange information with each other using
standard Web communication standards and languages are referred to as:
a.
b.
c.
d.
Web services.
EAI software.
SOA.
SOAP.
14. Prewritten, commercially available sets of software programs that eliminate the need for a
firm to write its own software programs for certain functions, are referred to as:
a.
b.
c.
d.
software packages.
mashups.
outsourced.
open source.
15. The practice of contracting custom software development to an outside firm is commonly
referred to as:
a.
b.
c.
d.
outsourcing.
scaling.
service-oriented architecture.
application integration.
16. Which of the following refers to the ability of a computer, product, or system to expand to
serve a larger number of users without breaking down?
a.
b.
c.
d.
Modifiability
Scalability
Expandability
Disintermediation
17. As discussed in the chapter case study, Merrill Lynch’s IT investments to modernize its
technology infrastructure illustrates the use of what software technology trend?
a.
b.
c.
d.
On-demand computing
Outsourcing
Java
Web services
--------------18. Duplicate data in multiple data files is:
a.
b.
c.
d.
data redundancy.
data multiplication.
data independence.
data backups.
19. A DBMS:
a.
b.
c.
d.
makes the physical database available for different logical views.
makes the logical database available for different analytical views.
makes the physical database available for different analytical views.
makes the relational database available for different analytical views.
20. The type of logical database model that treats data as if they were stored in two-dimensional
tables is the:
a.
b.
c.
d.
OODBMS.
pre-digital DBMS.
relational DBMS.
hierarchical DBMS.
21. In a table for customers, the information about a single customer would reside in a single:
a.
b.
c.
d.
field.
row.
column.
table.
22. A characteristic or quality describing an entity is called a(n):
a.
b.
c.
d.
field.
tuple.
key field.
attribute.
23. A field identified in a table as holding the unique identifier of the table’s records is called the:
a.
primary key.
b.
c.
d.
key field.
primary field.
unique ID.
24. Microsoft SQL Server is a(n):
a.
b.
c.
d.
DBMS for small handheld computing devices.
Internet DBMS.
desktop relational DBMS.
DBMS for midrange computers.
25. An automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization, and security is
the:
a.
b.
c.
d.
data dictionary.
data definition diagram.
entity-relationship diagram.
relationship dictionary.
26. The type of database management approach that can handle multimedia is the:
a.
b.
c.
d.
hierarchical DBMS.
relational DBMS.
network DBMS.
object-oriented DBMS.
27. The most prominent data manipulation language today is:
a.
b.
c.
d.
Access.
DB2.
SQL.
Crystal Reports.
28. A schematic of the entire database that describes the relationships in a database is called a(n):
a.
b.
c.
d.
data dictionary.
intersection relationship diagram.
entity-relationship diagram.
data definition diagram.
29. The process of streamlining data to minimize redundancy and awkward many-to-many
relationships is called:
a.
b.
c.
d.
normalization.
data scrubbing.
data cleansing.
data defining.
30. A data warehouse is composed of:
a.
b.
c.
d.
historical data from legacy systems.
current data.
internal and external data sources.
historic and current internal data.
31. Data mining is a tool for allowing users to:
a.
b.
c.
d.
quickly compare transaction data gathered over many years.
find hidden relationships in data.
obtain online answers to ad hoc questions in a rapid amount of time.
summarize massive amounts of data into much smaller, traditional reports.
32. An alternative to using application server software for interfacing between a Web server and
back-end databases is:
a.
b.
c.
d.
CGI.
HTML.
Java.
SQL.
33. What is the first step you should take in managing data for a firm?
a.
b.
c.
d.
Identify the data needed to run the business.
Cleanse the data before importing it to any database.
Normalize the data before importing to a database.
Audit your data quality.
34. The special organizational function whose responsibilities include the technical and
operational aspects of managing data, including physical database design and maintenance, is
called:
a.
b.
c.
d.
data administration.
database administration.
information policy administration.
data auditing.
35. Detecting and correcting data in a database or file that are incorrect, incomplete, improperly
formatted, or redundant is called:
a.
b.
c.
d.
data auditing.
defragmentation.
data scrubbing.
data optimization.
-----------36. A device that acts as a connection point between computers and can filter and forward data to
a specified destination is called a:
a.
b.
c.
d.
hub.
switch.
router.
NIC.
37. The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called:
a.
b.
c.
d.
multiplexing.
packet switching.
packet routing.
ATM.
38. The most important communication standard today for linking disparate computers and
networks is:
a.
b.
c.
d.
Transmission Control Protocol/Internet Protocol (TCP/IP).
International Standards Organization (ISO).
Open Systems Interconnection (OSI).
File Transfer Protocol (FTP).
39. A network that covers a large geographic area is most commonly referred to as a(n):
a.
b.
c.
d.
local area network.
Intranet.
peer-to-peer.
wide area network.
40. A communications medium that uses single copper wire surrounded by thick insulation is:
a.
b.
c.
d.
twisted-pair cable.
a satellite.
optical fiber.
coaxial cable.
41. _____________ work by using radio waves to communicate with radio antennas placed
within adjacent geographic areas.
a.
b.
c.
d.
Cell phones
Microwaves
Satellites
Information appliances
42. BP Amoco uses __________________ for real-time data transfer of oil field exploration data
gathered from searches of the ocean floor.
a.
b.
c.
d.
fiber optics
bluetooth technology
Wi-Fi technology
satellites
43. Bandwidth is:
a.
b.
c.
d.
the number of frequencies that can be broadcast through a medium.
the number of cycles per second that can be sent through a medium.
the difference between the highest and lowest frequencies that can be accommodated on a
single channel.
the total number of bytes that can be sent through a medium per second.
44. The total amount of digital information that can be transmitted through any
telecommunications medium is measured in:
a.
b.
c.
d.
bps.
hertz.
baud.
gigaflops.
45. Digital subscriber lines:
a.
b.
c.
d.
operate over existing telephone lines to carry voice, data, and video.
operate over coaxial lines to deliver Internet access.
are very high-speed data lines typically leased from long-distance telephone companies.
have up to twenty-four 64-Kbps channels.
46. Which protocol is the Internet based on?
a.
b.
c.
d.
TCP/IP
FTP
Packet-switching
Frame relay
47. What service converts IP addresses into more recognizable alphanumeric names?
a.
b.
c.
d.
HTML
DNS
FTP
HTTP
48. In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level,
and third-level domains, respectively?
a.
a.
c.
d.
"http://", myspace, blogging, com
"http://", com, blogging, myspace
".", com, blogging, myspace
".", myspace, blogging, com
49. Web browser software requests Web pages from the Internet using which protocol?
a.
b.
c.
d.
URL
HTTP
DNS
HTML
50. Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a:
a.
b.
c.
d.
uniform resource locator.
domain name.
third-level domain.
root domain.
51. The open-source Web server that controls 70 percent of the market is:
a.
b.
c.
d.
Microsoft IIS.
ASP.net.
Apache HTTP server.
Netscape.
52. The paid sponsored links delivered with search results is a type of marketing referred to as:
a.
b.
c.
d.
shopping bot marketing.
search engine marketing.
targeted marketing.
search results marketing.
53. Instant messaging is a type of:
a.
b.
c.
d.
chat service.
cellular service.
Web service.
wireless service.
54. Which technology uses the Internet Protocol to deliver voice information in digital form
using packet switching?
a.
b.
c.
d.
TCP/IP
VPN
VoIP
None, voice information is digitally delivered using ATM
55. Wireless cellular phone systems are entering this generation of networks:
a.
b.
c.
d.
2G.
2.5G.
3G.
3.5 G.
56. A VPN:
a.
b.
c.
d.
is an encrypted private network configured within the public Internet.
is more expensive than a dedicated network.
provides secure, encrypted communications using Telnet.
is an Internet-based service for delivering voice communications.
57. Bluetooth is the popular name for this IEEE standard:
a.
b.
c.
d.
IEEE 802.15.
IEEE 802.11.
IEEE 802.16.
IEEE 802.20.
58. The Wi-Fi 802.11g standard can transmit up to:
a.
b.
c.
d.
54 Mbps in the unlicensed 5-GHz frequency range and has an effective distance of 10 to 30
meters.
11 Mbps in the unlicensed 2.4-GHz band and has an effective distance of 30 to 50 meters.
54 Mbps in the 2.4-GHz range.
722 Kbps in the 2.4-GHz range.
----------------59. Policies, procedures, and technical measures used to prevent unauthorized access, alteration,
theft, or physical damage to information systems refers to:
a.
b.
c.
d.
security.
controls.
benchmarks.
algorithms.
60. Security challenges posed by the communications between layers in a client/server
environment are:
a.
b.
c.
d.
line taps and denial of service attacks.
tapping, sniffing, and message alteration.
computer viruses, line taps, and loss of machine.
vandalism, theft and fraud, and line taps.
61. An independent computer program that copies itself from one computer to another over a
network is called a:
a.
b.
c.
d.
worm.
Trojan horse.
bug.
pest.
62. In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the
vendor’s site, a small program called Mitglieder was downloaded to the user’s machine. The
program enabled outsiders to infiltrate the user’s machine. What type of malware is this an
example of?
a.
b.
c.
d.
Virus
Worm
Trojan horse
Spyware
63. Redirecting a Web link to a different address is a form of:
a.
b.
c.
d.
snooping.
spoofing.
sniffing.
phishing.
64. A key logger is a type of:
a.
b.
c.
d.
worm.
Trojan horse.
virus.
spyware.
65. How do hackers create a botnet?
a.
b.
c.
d.
Infecting Web shopping bots with malware
Using Web search bots to infect other computers
Causing other people’s computers to become “zombie” PCs following a master computer
Infecting corporate servers with “zombie” Trojan horses that allow undetected access
through a back door
66. Phishing involves:
a.
b.
c.
d.
redirecting users to a fraudulent Web site even when the user has typed in the correct address
in the Web browser.
pretending to be a legitimate business’s representative in order to garner information about a
security system.
setting up fake Web sites to ask users for confidential information.
using e-mails for threats or harassment.
67. How do software vendors correct flaws in their software after it has been distributed?
a.
b.
c.
d.
Issue bug fixes.
Issue patches.
Re-release software.
Issue updated versions.
68. You have been hired as a security consultant for a legal firm. Which of the following
constitutes the greatest threat, in terms of security, to the firm?
a.
b.
c.
Wireless network
Employees
Authentication procedures
d.
Lack of data encryption
69. Analysis of an information system that rates the likelihood of a security incident occurring
and its cost is included in a(n):
a.
b.
c.
d.
security policy.
AUP.
risk assessment.
business impact analysis.
70. Smaller firms can outsource security functions to:
a.
b.
c.
d.
MISs.
CSOs.
MSSPs.
CAs.
71. Biometric authentication:
a.
b.
c.
d.
is inexpensive.
is used widely in Europe for security applications.
can use a person’s face as a unique, measurable trait.
only uses physical traits as a measurement.
72. A firewall allows the organization to:
a.
b.
c.
d.
enforce a security policy on traffic between its network and the Internet.
check the accuracy of all transactions between its network and the Internet.
create an enterprise system on the Internet.
check the content of all incoming and outgoing e-mail messages.
73. _________ use scanning software to look for known problems such as bad passwords, the
removal of important files, security attacks in progress, and system administration errors.
a.
b.
c.
d.
Stateful inspections
Intrusion detection systems
Application proxy filtering technologies
Packet filtering technologies
74. Currently, the protocols used for secure information transfer over the Internet are:
a.
b.
TCP/IP and SSL.
S-HTTP and CA.
c.
d.
HTTP and TCP/IP.
SSL, TLS, and S-HTTP.
75. A digital certificate system:
a.
b.
c.
d.
uses third-party CAs to validate a user’s identity.
uses digital signatures to validate a user’s identity.
uses tokens to validate a user’s identity.
are used primarily by individuals for personal correspondence.