Fundamentals Of Cyber Security 1 Flashcards

1
Q

What is an attack (or threat) vector

A

An attack (or threat) vector is a path or tool that an attacker uses to target a
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The use of Web 2.0 apps in the enterprise is sometimes referred to as?

A

The use of Web 2.0 apps in the enterprise is sometimes referred to as
Enterprise 2.0, although not all Web 2.0 apps are considered to be Enterprise
2.0 applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of accounting software include?

A

Examples of accounting software include Intacct, Microsoft Dynamics AX and GP, NetSuite,
QuickBooks, and Sage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business intelligence (BI) and business analytics software consists of?

A
  • Business intelligence (BI) and business analytics software consists of tools and techniques used to surface large amounts of raw unstructured data from a variety of sources (such as data warehouses and data marts). BI and business analytics software performs a variety of functions, including business performance management, data mining, event processing, and predictive analytics. Examples of BI and analytics software include IBM Cognos, MicroStrategy, Oracle Hyperion, and SAP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Customer relationship management (CRM) software

A

Customer relationship management (CRM) software is used to manage an organization’s
customer (or client) information, including lead validation, past sales, communication and
interaction logs, and service history. Examples of CRM suites include Microsoft Dynamics CRM, Salesforce.com, SugarCRM, and ZOHO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Database management systems (DBMS)

A

Database management systems (DBMS) are used to administer databases, including the
schemas, tables, queries, reports, views, and other objects that comprise a database. Examples of DBMS software include Microsoft SQL Server, MySQL, NoSQL, and Oracle Database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Enterprise resource planning (ERP) systems

A

Enterprise resource planning (ERP) systems provide an integrated view of core business
processes, such as product and cost planning, manufacturing or service delivery, inventory
management, and shipping and payment. Examples of ERP software include NetSuite, Oracle’s JD Edwards EnterpriseOne and PeopleSoft, and SAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supply chain management (SCM) software

A

Supply chain management (SCM) software is used to manage supply chain transactions,
supplier relationships, and various business processes, such as purchase order processing,
inventory management, and warehouse management. SCM software is commonly integrated with ERP systems. Examples of SCM software include Fishbowl Inventory, Freightview, Information Supply Chain Management, and Sage X3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Web content management (WCM) software

A

Web content management (WCM) software is used to manage website content, including
administration, authoring, collaboration, and publishing. Examples of web content management software include Drupal, IBM FileNet, Joomla, and WordPress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Web 2.0 apps and services (many of which also are SaaS apps) include?

A

File sync
Instant messaging
Microblogging
Office Productivity Suites
Remote access software
Remote team meeting software
Social curation
Social networks
Web-based email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consumerization: The process of consumerization occurs as end users increasingly find
personal technology and apps that are more powerful or capable, more convenient, less
expensive, quicker to install, and easier to use than enterprise IT solutions.

A

Consumerization: The process of consumerization occurs as end users increasingly find
personal technology and apps that are more powerful or capable, more convenient, less
expensive, quicker to install, and easier to use than enterprise IT solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bring your own device (BYOD):

A

Bring your own device (BYOD): Closely related to consumerization is BYOD, a policy trend in
which organizations permit end users to use their own personal devices, primarily smartphones and tablets, for work-related purposes. BYOD relieves organizations from the cost of providing equipment to employees but creates a management challenge because of the vast number and type of devices that must be supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bring your own apps (BYOA):

A

Bring your own apps (BYOA): Web 2.0 apps on personal devices are increasingly being used for work-related purposes. As the boundary between work and personal lives becomes less distinct, end users are practically demanding that these same apps be available to them in their workplaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile computing?

A

Mobile computing: The appetite for rapid, on-demand access to apps and data from anywhere, at any time, on any device is growing. There are approximately more than 8 billion mobile subscriptions worldwide, and total mobile monthly data traffic (including audio, file sharing, social networking, software uploads and downloads, video, web browsing, and other sources) is about 40 exabytes!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5G cellular wireless?

A

5G cellular wireless: Each new generation of wireless connectivity has driven many innovations, and the move to the fifth-generation of cellular wireless (5G) is well under way, with mobile network operators announcing 5G pilot trials and commercialization plans as they expand their geographic footprints.

The latest 5G applications are consumer-driven, help governments implement 5G for smart city rollouts, and bring 5G service experience to the public by seamlessly covering major sports events, among others. The promise of intelligent connectivity will drive massive adoption of the internet of things (IoT) and could transform industries.

We’re now describing the Enterprise of Things: networked industrial devices, sensors, networks, and apps that connect businesses. As today’s enterprises undergo digital transformation, they’ll be looking for 5G networks to drive true Industry 4.0 transformation, leveraging automation, artificial intelligence (AI), and IoT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Content delivery networks (CDN):

A

Content delivery networks (CDN): Enterprises are using content delivery networks such as
Akamai, Amazon CloudFront, and Limelight networks to distribute their web products and
services to customers worldwide. The use of CDNs will become even more prominent as 5G
adoption continues to expand.