CIS 105 Final Exam with Questions
Solved 100% Correct| Verified Solutions
Which level report(s) use internal and external data? - Answer Executive and managers
Which level report(s) use internal data? - Answer Supervisors and Laborers
Reports with only internal data are used for what type of decisions? - Answer Tactical
Supervisory reports are considered what? - Answer highly detailed
What is a common axiom for Information Technology professionals? - Answer Know
the business
Applying IT to an existing process like printing and distributing is called what? - Answer
value added
Name two types of IT professionals - Answer Service & IT Consultants
Which IT job is considered "board-level?" - Answer CIO
What job used to be called "IT Director?" - Answer CIO
Which IT job is the highest paid? - Answer CIO
,Who is in charge of software application development teams? - Answer
Head Application Developer
Whose tagline is, "We are Anonymous. We are Legion. We do not forgive. We do not
forget. Expect us." - Answer Anonymous
What is extremely easy to breach? - Answer An unsecured computer
What is the key aspect of an Intranet? - Answer privacy
What kind of hardware does a firewall use? - Answer proxy server
What keeps unauthorized Internet users out of private intranets? - Answer Firewalls
Standard security practices dictate a what? - Answer "Default-deny" Firewall Rules
Where does the term "virus" come from? - Answer Biology
What includes programs specifically intended to penetrate or damage a computer
system? - Answer Malware
What malware doesn't need to attach itself to an existing program to spread? - Answer
Worm
What malware's name originates from Greek mythology? - Answer Trojan Horse
What malware is installed covertly on a computer to take control of the system
without the user's knowledge? - Answer Spyware
, What is the abuse of an email system called? - Answer Spamming
What does the acronym "DoS" stand for? - Answer Denial of Service
What is a program that records every keystroke made on a computer? - Answer
Keylogging
What is the most uncomplicated Internet fraud? - Answer Purchase Scam
Which Internet fraud involves using social engineering techniques? - Answer Phishing
What can be defined as the ability to keep personal information out of public view?
- Answer Privacy
What means that one's personal identity is not known? - Answer Anonymous
What is the name of Google's advertising network? - Answer AdSense
How does a website know so much about you when you return to it? - Answer Tracking
Cookie
What is a list of cached websites on a user's computer called? - Answer History Files
What is it called when someone glances at your computer to glean information?
- Answer Shoulder Surfing
Solved 100% Correct| Verified Solutions
Which level report(s) use internal and external data? - Answer Executive and managers
Which level report(s) use internal data? - Answer Supervisors and Laborers
Reports with only internal data are used for what type of decisions? - Answer Tactical
Supervisory reports are considered what? - Answer highly detailed
What is a common axiom for Information Technology professionals? - Answer Know
the business
Applying IT to an existing process like printing and distributing is called what? - Answer
value added
Name two types of IT professionals - Answer Service & IT Consultants
Which IT job is considered "board-level?" - Answer CIO
What job used to be called "IT Director?" - Answer CIO
Which IT job is the highest paid? - Answer CIO
,Who is in charge of software application development teams? - Answer
Head Application Developer
Whose tagline is, "We are Anonymous. We are Legion. We do not forgive. We do not
forget. Expect us." - Answer Anonymous
What is extremely easy to breach? - Answer An unsecured computer
What is the key aspect of an Intranet? - Answer privacy
What kind of hardware does a firewall use? - Answer proxy server
What keeps unauthorized Internet users out of private intranets? - Answer Firewalls
Standard security practices dictate a what? - Answer "Default-deny" Firewall Rules
Where does the term "virus" come from? - Answer Biology
What includes programs specifically intended to penetrate or damage a computer
system? - Answer Malware
What malware doesn't need to attach itself to an existing program to spread? - Answer
Worm
What malware's name originates from Greek mythology? - Answer Trojan Horse
What malware is installed covertly on a computer to take control of the system
without the user's knowledge? - Answer Spyware
, What is the abuse of an email system called? - Answer Spamming
What does the acronym "DoS" stand for? - Answer Denial of Service
What is a program that records every keystroke made on a computer? - Answer
Keylogging
What is the most uncomplicated Internet fraud? - Answer Purchase Scam
Which Internet fraud involves using social engineering techniques? - Answer Phishing
What can be defined as the ability to keep personal information out of public view?
- Answer Privacy
What means that one's personal identity is not known? - Answer Anonymous
What is the name of Google's advertising network? - Answer AdSense
How does a website know so much about you when you return to it? - Answer Tracking
Cookie
What is a list of cached websites on a user's computer called? - Answer History Files
What is it called when someone glances at your computer to glean information?
- Answer Shoulder Surfing