ITM 100 EXAM REVIEW QUESTIONS
WITH REVISED AND UPDATED
ANSWERS
denial of service attack - Answer-a cyber attack in which an attacker sends a flood of
data packets to the target computer, with the aim of overloading its resources
Botnets - Answer-a set of computers that are penetrated by malicious software known
as malware that allows an external agent to control their actions
Social Engineering - Answer-hackers use their social skills to trick people into revealing
access credentials or other valuable information
general controls - Answer-controls designed to make sure an organization's information
system and control environment is stable and well managed
application controls - Answer-Controls that apply to the processing of specific computer
applications and are part of the computer programs used in the accounting system.
CAPTCHA - Answer-prevents software bots
reCAPTCHA - Answer-prevents digital books from bots
WEP (Wired Equivalent Privacy) - Answer-A key encryption technique for wireless
networks that uses keys both to authenticate network clients and to encrypt data in
transit.
WPA2 (Wi-Fi Protected Access 2) - Answer-A secure encryption protocol.
risk assessment - Answer-the process of measuring risk
security policy - Answer-Ranks information risks, identifies acceptable security goals,
and identifies mechanisms for achieving these goals
disaster recovery plan - Answer-A detailed process for recovering information or an IT
system in the event of a catastrophic disaster such as a fire or flood
Business Continuity Planning - Answer-outlines procedures for keeping an organization
operational in the event of a natural disaster or network attack
information systems audit - Answer-examines the firm's overall security environment as
well as controls governing individual information systems
, security audit - Answer-An assessment of an organization's security vulnerabilities
performed by an accredited network security firm.
Hardware Platform Trends - Answer-mobile digital platform, virtualization, green
computing, quantum computing, BYOD
BYOD - Answer-Bring Your Own Device
Virtualized Computing - Answer-Creates multiple "virtual" machines on a single
computing device
Cloud Computing - Answer-the practice of using a network of remote servers hosted on
the Internet to store, manage, and process data, rather than a local server or a personal
computer.
green computing - Answer-involves reducing the environmental waste generated when
using a computer
Quantum computing - Answer-uses the principles of quantum physics to represent data
and perform operations on these data
open source software - Answer-Software such as Linux that includes its uncompiled
source code which can be modified and distributed by programmers
Java - Answer-a programming language used to create interactivity on web pages
Python - Answer-used to build cloud computing app
HTML - Answer-The file format for documents viewed using a browser.
Service-oriented architecture (SOA) - Answer-set of self-contained services that
communicate with each other to create a working software application
Web Services - Answer-Software components that exchange information with one
another using universal Web communication standards and languages
XML (Extensible Markup Language) - Answer-programming language that uses author-
defined tags to identify each data entry so that the data can be easily imported into
other applications
3 external sources for software - Answer-(1) Software packages and enterprise software
(2) Software outsourcing
(3) Cloud-based software services
WITH REVISED AND UPDATED
ANSWERS
denial of service attack - Answer-a cyber attack in which an attacker sends a flood of
data packets to the target computer, with the aim of overloading its resources
Botnets - Answer-a set of computers that are penetrated by malicious software known
as malware that allows an external agent to control their actions
Social Engineering - Answer-hackers use their social skills to trick people into revealing
access credentials or other valuable information
general controls - Answer-controls designed to make sure an organization's information
system and control environment is stable and well managed
application controls - Answer-Controls that apply to the processing of specific computer
applications and are part of the computer programs used in the accounting system.
CAPTCHA - Answer-prevents software bots
reCAPTCHA - Answer-prevents digital books from bots
WEP (Wired Equivalent Privacy) - Answer-A key encryption technique for wireless
networks that uses keys both to authenticate network clients and to encrypt data in
transit.
WPA2 (Wi-Fi Protected Access 2) - Answer-A secure encryption protocol.
risk assessment - Answer-the process of measuring risk
security policy - Answer-Ranks information risks, identifies acceptable security goals,
and identifies mechanisms for achieving these goals
disaster recovery plan - Answer-A detailed process for recovering information or an IT
system in the event of a catastrophic disaster such as a fire or flood
Business Continuity Planning - Answer-outlines procedures for keeping an organization
operational in the event of a natural disaster or network attack
information systems audit - Answer-examines the firm's overall security environment as
well as controls governing individual information systems
, security audit - Answer-An assessment of an organization's security vulnerabilities
performed by an accredited network security firm.
Hardware Platform Trends - Answer-mobile digital platform, virtualization, green
computing, quantum computing, BYOD
BYOD - Answer-Bring Your Own Device
Virtualized Computing - Answer-Creates multiple "virtual" machines on a single
computing device
Cloud Computing - Answer-the practice of using a network of remote servers hosted on
the Internet to store, manage, and process data, rather than a local server or a personal
computer.
green computing - Answer-involves reducing the environmental waste generated when
using a computer
Quantum computing - Answer-uses the principles of quantum physics to represent data
and perform operations on these data
open source software - Answer-Software such as Linux that includes its uncompiled
source code which can be modified and distributed by programmers
Java - Answer-a programming language used to create interactivity on web pages
Python - Answer-used to build cloud computing app
HTML - Answer-The file format for documents viewed using a browser.
Service-oriented architecture (SOA) - Answer-set of self-contained services that
communicate with each other to create a working software application
Web Services - Answer-Software components that exchange information with one
another using universal Web communication standards and languages
XML (Extensible Markup Language) - Answer-programming language that uses author-
defined tags to identify each data entry so that the data can be easily imported into
other applications
3 external sources for software - Answer-(1) Software packages and enterprise software
(2) Software outsourcing
(3) Cloud-based software services