Part 1 Flashcards

1
Q

True or False:

Business intelligence (Bl) software
consists of tools and techniques used to surface
large amounts of raw unstructured data to perform
a variety of tasks, including data mining, event processing,
and predictive analytics.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False:

The process in which end users find
personal technology and apps that are more powerful
or capable, more convenient, less expensive, quicker
to install, and easier to use than enterprise IT solutions
is known as consumerization.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which action is associated with Web 1.0?

A. checking CNN’s website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple’s Siri a question

A

A. checking CNN’s website for news

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which action is associated with Web 3.0?

A. Checking CNN’s website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple’s Siri a question

A

D. asking Apple’s Siri a question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Gmail is associated with which cloud computing
model?

A.Saas
B.PaaS
C. laaS
D.DaaS

A

A.Saas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two port numbers are associated with HTTP?
(Choose two.)

A. 80
B.389
C.8080
D.25

A

A. 80
C. 8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which port number is associated with HTTPS?

A. 21
B.23
C.443
D.53

A

C.443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which port is used for encrypted communication?

A. 22
B.80
C.389
D.25

A

A. 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol distinguishes between applications
using port numbers?

A.TCP
B. ICMP
C. ESP
D. UDP

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do attackers prevent port scans from being noticed by monitoring software?

A. scan ports so quickly it is finished before it can be be detected and stopped
B. scan ports so slowly it looks like random attempts stopped
to connect, rather than a concerted attack
C. scan ports from an internal device
D. scan ports through WiFi instead of Ethernet

A

A. scan ports so quickly it is finished before it can
detected and stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which potentially risky attributes is the most serious?

A. pervasive
B. malware
C. excessive bandwidth
D. tunnels

A

B. malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which application can be used as a tunnel for other
applications?

A. Telnet
B. SMTP
C.HTTPS
D. SSH

A

D. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two devices or systems require the configuration of non-standard ports to be able to use an application on a non-standard port? {Choose two.)

A. firewall
B. client
C. server
D. operating system
E. certificate

A

B. client
C. server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you are responsible for the application’s security but not the operating system’s security, which cloud computing service model are you using?

A. your own data center
B. laaS
C.PaaS
D.SaaS

A

C. PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which kind of security always is the responsibility of
the cloud customer?

A. physical
B. network
C. application
D. data

A

D. data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where is your data typically stored in a Saas application?

A. in your data center, in a database under your control Saas provider
B. in your data center, in a database controlled by the
C. in the cloud, in a database you control
D. in the cloud, in a database controlled by the Saas
provider

A

D. in the cloud, in a database controlled by the Saas provider

17
Q

Who is responsible for the security settings in an
enterprise Saas application?

A. Saas provider
B. IT administrator of the customer organization
C. user, typically an employee of the customer organization
D. both IT administrators and users

A

D. both IT administrators and users

18
Q

When is it impossible to secure Saas data?

A. when a user uses an unmanaged device to access an unsanctioned Saas instance.
B. when a user uses a managed device to access an unsanctioned Saas instance.
C. when a user uses an unmanaged device to access a sanctioned Saas instance
D. when a user uses a managed device to access a sanctioned Saas instance

A

A. when a user uses an unmananaged device to access an unsanctioned Saas incstance

19
Q

True or False?
An organization can be compliant with
all applicable security and privacy regulations for its
industry yet still not be secure.

20
Q

Which three data fields are considered personally
identifiable information (PII)? Choose three.)

A. unique identification number (such as driver’s license number)
B. honorific (Mr., Mrs., Dr., etc.)
C. telephone number
D. blood pressure (when not connected to other fields)
E. fingerprints

A

A. unique identification number (such as driver’s license number)
C. telephone number
E. fingerprints