ITM100 REVIEW TEST QUESTION
WITH COMPETE SOLUTIONS
Scareware - Answer-Fake warnings to trick users
Backdoor Program - Answer-Hidden entry point
DoS Attack - Answer-Flooding a system with traffic
DDoS Attack - Answer-Coordinated DoS from many sources
Polymorphic Virus - Answer-Virus that changes code
Hoax - Answer-False warning
Packet Tampering - Answer-Altering packets during transmission
Sniffer - Answer-Intercepts network traffic
Spoofing - Answer-Pretending to be someone else
Splog - Answer-Fake blog
Insider Threat - Answer-Employee misuse
Social Engineering - Answer-Manipulating people into revealing info
Dumpster Diving - Answer-Looking through trash
Pretexting - Answer-Pretending to be someone else
Authentication - Answer-Verifying identity
Authorization - Answer-Granting permissions
Something You Know - Answer-Password authentication
Something You Have - Answer-Token/smart card authentication
Something You Are - Answer-Biometric authentication
Two-Factor Authentication - Answer-Two types of credentials
, Privilege Escalation - Answer-Gaining unauthorized access level
Content Filtering - Answer-Blocking harmful content
Encryption - Answer-Scrambling data
Public Key Encryption - Answer-Encryption using public/private keys
Certificate Authority - Answer-Issues digital certificates
Digital Certificate - Answer-Proves identity
Firewall - Answer-Blocks unauthorized access
Intrusion Detection Software - Answer-Monitors for attacks
MIS Infrastructure - Answer-Plans for using and managing MIS assets
Information MIS Infrastructure - Answer-Supports operations
Agile MIS Infrastructure - Answer-Supports change and adaptation
Sustainable MIS Infrastructure - Answer-Environmentally friendly MIS
Backup - Answer-Copy of system information
Recovery - Answer-Restore after failure
Disaster Recovery Plan - Answer-Steps to restore IT after disaster
Hot Site - Answer-Fully equipped backup location
Cold Site - Answer-Empty backup facility
Warm Site - Answer-Facility with equipment needing setup
Business Continuity Plan - Answer-Ensures operations continue post-disruption
Moore's Law - Answer-Computing power doubles every ~18 months
Green MIS - Answer-Environmentally responsible tech practices
Virtualization - Answer-Multiple virtual machines on one device
Cloud Computing - Answer-Computing resources delivered online
WITH COMPETE SOLUTIONS
Scareware - Answer-Fake warnings to trick users
Backdoor Program - Answer-Hidden entry point
DoS Attack - Answer-Flooding a system with traffic
DDoS Attack - Answer-Coordinated DoS from many sources
Polymorphic Virus - Answer-Virus that changes code
Hoax - Answer-False warning
Packet Tampering - Answer-Altering packets during transmission
Sniffer - Answer-Intercepts network traffic
Spoofing - Answer-Pretending to be someone else
Splog - Answer-Fake blog
Insider Threat - Answer-Employee misuse
Social Engineering - Answer-Manipulating people into revealing info
Dumpster Diving - Answer-Looking through trash
Pretexting - Answer-Pretending to be someone else
Authentication - Answer-Verifying identity
Authorization - Answer-Granting permissions
Something You Know - Answer-Password authentication
Something You Have - Answer-Token/smart card authentication
Something You Are - Answer-Biometric authentication
Two-Factor Authentication - Answer-Two types of credentials
, Privilege Escalation - Answer-Gaining unauthorized access level
Content Filtering - Answer-Blocking harmful content
Encryption - Answer-Scrambling data
Public Key Encryption - Answer-Encryption using public/private keys
Certificate Authority - Answer-Issues digital certificates
Digital Certificate - Answer-Proves identity
Firewall - Answer-Blocks unauthorized access
Intrusion Detection Software - Answer-Monitors for attacks
MIS Infrastructure - Answer-Plans for using and managing MIS assets
Information MIS Infrastructure - Answer-Supports operations
Agile MIS Infrastructure - Answer-Supports change and adaptation
Sustainable MIS Infrastructure - Answer-Environmentally friendly MIS
Backup - Answer-Copy of system information
Recovery - Answer-Restore after failure
Disaster Recovery Plan - Answer-Steps to restore IT after disaster
Hot Site - Answer-Fully equipped backup location
Cold Site - Answer-Empty backup facility
Warm Site - Answer-Facility with equipment needing setup
Business Continuity Plan - Answer-Ensures operations continue post-disruption
Moore's Law - Answer-Computing power doubles every ~18 months
Green MIS - Answer-Environmentally responsible tech practices
Virtualization - Answer-Multiple virtual machines on one device
Cloud Computing - Answer-Computing resources delivered online