Final's flashcards for ITEC4313.01 Emerging Information Tech

  1. True or False:
    Data Fabric allows easy access and sharing across distributed data environments.
    A) True
    B) False
    A) True
  2. Multiple Choice.
    The Economist classified____ as the world's most valuable resource replacing oil.



    D) Data
  3. True or False:
    One of the trends currently, is that database administrators are having to be less involved in the application development.
    A) True
    B) False
    B) False
  4. In a recent survey amongst UK employers, which of the following areas of knowledge did they look for the most?



    B) Data science (machine learning, AI)
  5. True or False:
    Data silos are huge sources of inefficiency in any department or organization.
    A) True
    B) False
    A) True
  6. The characteristics of Big Data are volume, velocity, and variety. Velocity refers to:



    A) the pace at which data sources generate
  7. True or False:
    For Database Administrators that manage on-premises databases, the top priority is maintenance while optimizing performance is the most time-consuming task.

    A) True
    B) False
    B) False
  8. Which of the following contributed to the evolution of NoSQL?





    E) All the above
  9. In relational databases, data is stored in




    B) Tables
  10. As a benefit of cloud computing, what function are DBA's able to focus their efforts on?





    D) Database Performance
  11. Short Answer:
    What is Blockchain?
    Blockchain or block chain is a continuously growing list of records, called blocks, which are linked and secured using cryptography.
  12. Relational DB's are known for doing which of the following things particularly well?




    C) Handling small amounts of data
  13. Data governance includes the ___ and ____ involved in managing data assets. (Please select the best two answers.)

    a. Organization
    b. Processes
    c. Framework
    d. Department
    Processes and Framework
  14. Employees from different departments within a company are keeping data from each other instead of working together, which can result in competition or animosity. Which of these data silo factors does this situation most represent?




    C) Cultural
  15. There are four characteristics of Big Data, which of the following below has all four characteristics?




    A) Volume, Velocity, Variety, Veracity
  16. Companies are investing more and more into data management and storage than ever before. Why is this?




    D) The world's most valuable resource is Data
  17. Which is not a characteristic that defines Big Data:




    B) Verticality
  18. If a company has a lot of data to store that is complex making it difficult to store, what kind of data is this?




    C) Big Data
  19. What are some true advantages of using big data? (Select two)

    a. Reducing cost
    b. Ease of maintenance
    c. Improved customer support
    d. Security risk
    e. Mass storage facilities
    Reducing cost and Improved customer support
  20. Why would a company choose to not adopt blockchain?




    C) Their employees would not have the skills necessary to navigate blockchain.
  21. What are not the challenges with big data?




    A) the massive amounts of power to store data
  22. Relational databases don't do some things well, which led to the evolution of the noSQL database. Which of the following is not a reason for the evolution of the noSQL database?




    B) Relational databases are designed more for rapid growth rather than steady data retention.
  23. True or False:
    Widespread adoption of blockchain is not a challenge when implementing the technology?
    A) True
    B) False
    B) False
  24. True or False:
    Once conceptualized, a blockchain rarely, if ever, grows, and separates themselves from using cryptography.
    A) True
    B) False
    B) False
  25. Big Data is:




    D) both A and B
  26. One of the overarching situations that arise from data silos is that multiple teams store complementary but separate data. This can lead to ...




    D) Critical errors, workflow gaps, and increased risk to business
  27. Fill in Blank.
    ____________ technology creates a connected asset that introduces a new attack vector that needs protecting.
    Smart Technology
  28. Short answer:
    What bill required the national institute of standards and technology and office of management and budget to increase the security of internet of things devices?
    Internet of Things Cybersecurity Improvement Act
  29. True or False:
    Generally personal computers and smartphones are also considered IoT devices.

    A) True
    B) False
    B) False
  30. Which of the following are the major components of loT?




    A) Thing or Device, Gateway, Cloud, Analytics, User Interface.
  31. Which of the following industry is the biggest adopter of Industry 4.0?




    B) Automotive
  32. Select the best definition for loT platform.




    A) An on-premises software suite or a cloud service that monitors and controls various types of endpoints, often via applications business units deploy on the platform.
  33. How can IoT improve industrial manufacturing? (Select all that apply):

    a. IoT enables manufacturers to scale up different equipment capable of distant observing and servicing
    b. It helps to detect and avoid the issues that may cause delays.
    c. loT completely automates the manufacturing process, eliminating the need for manual labor.
    d. It enables the managers to better allocate the resources, improve worker skilfulness and make the working environment safe.
    a,b, and d
  34. List the industry by loT adoption from greatest (1) to least (5).

    Industry IoT adoption
    Transportation  
    Business/Manufacturing  
    Retail  
    Security  
    Health Care  
    • 1 == Business/Manufacturing
    • 2 == Health Care
    • 3 == Retail
    • 4 == Security
    • 5 == Transportation
  35. Which is a gateway for IoT devices?




    D) Connects loT devices, sensors, and equipment systems to the cloud
  36. Why do major industries, such as factories, businesses, and healthcare facilities, rely on loT devices?





    D) All the above
  37. What are some of the security issues that loT products face? Select all that apply.

    a. Physical Security
    b. Phishing
    c. Backdoors
    d. Secure Coding
    e. Quid Pro Quo Attacks
    Physical Security and Backdoors and Secure Coding
  38. Short answer:
    What is Industry 4.0?
    A manufacturing transformation that represents the fourth industrial revolution. Industry 4.0 is the adoption of computers and automation enhanced with smart and autonomous systems fuelled by data and machine learning.
  39. What is the easiest way a consumer can make sure their loT is properly secure?




    B) Update firmware
  40. What percentage of people lack confidence in loT device security?




    B) 90%
  41. Which of the following is not a major component of loT?




    B) Traffic
  42. Which of the following are challenges of loT?




    D) All the above
  43. What are the main issues loT deals with?

    a. Funding
    b. Security
    c. Rural Areas
    d. Enough Staffing
    Security and Rural Areas
  44. What is an efficient way of using lot in practice?

    a. Using your smart watch to track your heart rate while exercising
    b. The toaster goes off when the timer is out
    c. Google smart devices act as a smart assistant to help you complete small task using your voice.
    d. Your car door locks on its own after a certain time period
    e. A small microchip to detect the location of your loved items and find them using your phone
    a and e
  45. What are some major challenges loT is facing?

    a. Lack of use Cases
    b. loT products are vulnerable to attack
    c. Rural areas lack reliable connection
    d. Users who don't update their firmware
    b, c and d
  46. When applying IOT, what is the major main challenge businesses are facing?





    C) Developers who are rushing loT products that are not Properly secured
  47. Why was the Cybersecurity Improvement Act of 2019 received with critical feedback?




    A) It applied only to government devices.
  48. Which of these is NOT an IoT adoption trend seen in 2022?




    C) The complexity of IoT projects is becoming easier and easier
  49. What are some security problems that loT products have?

    a. Start-up
    b. Backdoors
    c. Encryption
    d. SAS Correct
    Backdoors and Encryption
  50. Which of the following is not an example of major challenges IOT is facing?




    C) A lack of current interest in IOT devices
  51. Short Answer:
    List three benefits of Smart Cities.
    Better Traffic, Congestion-free roads, less pollution, high level of security (or similar answers at discretion of grader).
  52. True or False:
    By combining virtual and real landscapes, extended reality has many valuable use cases, some being: Training and Development, Marketing and Sales, and Expensive hardware.

    A) True
    B) False
    A) True
  53. True or False:
    3D printing was once considered a subtractive process due to the extraction of data from the file, so that printing could occur.

    A) True
    B) False
    B) False
  54. Which is a challenge facing AR/VR devices?




    A) Physical space constraints
  55. Multiple Choice:
    Which one of the answers below is NOT true about what Virtual Reality (VR) can help do for businesses?




    C) Enables a slower more defined prototyping process
  56. What are some of the benefits of 5D printing? Select all that apply.

    a. It has a cost-effective manufacturing process.
    b. A physical prototype can be tested.
    c. Curved layers prevent creating weak points.
    d. Objects are 3 to 5 times stronger.
    e. Printers can create anything within their build volume.
    Curved layers prevent creating weak points. and Objects are 3 to 5 times stronger.
  57. Which of the following accurately describes a difference between AR and VR technology and trends?




    A) AR technology is more accessible in terms of cost to the average consumer because it can be experienced through smart phones and other devices the user already possesses, hereas VR requires the purchase of new equipment
  58. You are working for the local community college as an IT consultant. The head of the nursing program has asked your opinion on the viability of utilizing virtual reality in the nursing curriculum. What are some of the difficulties facing VR that they should be informed of before making their decision? (Select all that apply)

    a. Virtual reality has a learning curve.
    b. Virtual reality has spatial constraints.
    c. Virtual reality is not well utilized as a training tool.
    d. Virtual reality requires ongoing IT support.
    • It all of them:
    • Virtual reality has a learning curve.
    • Virtual reality has spatial constraints.
    • Virtual reality is not well utilized as a training tool.
    • Virtual reality requires ongoing IT support.
  59. Amazon has recently updated their website, so the customer is able to see in real time how a piece of furniture would fit in their home. This type of technology is known as:




    B) AR
  60. Select the best answer: What are the main advantages of 3D printing?




    C) Speed, Flexibility, and Cost.
  61. Which of the following is False about the uses of 3D Printing in the medical field?





    C) Allows doctors to print nervous tissue to help paralysis and stroke victims
  62. Which XR allows users to see the real world with additional digital information and virtual objects layered on top?




    D) AR
  63. What is additive manufacturing?




    C) The process of creating an object by adding material in layers until the object is created
  64. True or False:
    In the medical field, 3D printing can be utilized to produce pharmaceutical drugs.

    A) True
    B) False
    A) True
  65. Computer Numeric Controlled (CNC) machinery uses what type of manufacturing?




    B) Subtractive Manufacturing
  66. Multiple Choice, Multiple Answer:
    What are the challenges of XR? (Select 2)

    a. Display
    b. Security
    c. Motion Tracking
    d. Start-up
    Display and Motion Tracking
  67. True or False:
    As of 2021, creating production parts is the largest use case of 3D printing in manufacturing

    A) True
    B) False
    A) True
  68. You are shopping through an app to buy new furniture. Within the app, there is a feature that allows you to use your phone camera to capture your living room, and let's you digitally place your chosen furniture into the room to see what it would look like in-person before you buy. This is an example of...




    B) Augmented reality
  69. Which of the following is one of the most common use of VR/AR among early adopters in business?




    A) Employee training
  70. The company Howden saw potential in showing their customers where improvements could be made. With a mantra of "Revolving around You", Howden prides themselves on their customer service. How does Howden provide excellent customer service and improvement demonstration to their customers?




    A) Mixed Reality
  71. A real estate company who wants to give their customers a more realistic experience where they can do a walkthrough of their house and see it built before it is physically built should use which kind of technology?




    C) Virtual reality
  72. Pokémon Go is an immersive mobile game that can us your mobile device to track your location, and display live onscreen Pokémon, using your camera as an overlay to the current in camera sight picture. Which type of immersive technology has Pokémon Go implemented to allow players to see Pokémon's on their phone using live footage as an overlay?



    C) AR (augmented reality)
  73. Which one of these product development methods is not used when turning a design idea into a physical object?




    B) Scrum process
  74. Which is a current challenge for regulation with 3D-Bioprinter technology?



    C) Quality assurance and quality control.
  75. There are several challenges with XR, some of which include:




    A) A and C
  76. True or False:
    We are able to print both prosthetic limbs and dental devices using 3D printing in medical fields.

    A) True
    B) False
    A) True
  77. Short Answer:
    Why are cyber-attacks initiated?
    Many reasons why attacks could happen, but the most common are for data or intellectual property that will lead to money.
  78. True or False:
    For effective cybersecurity, an organization needs to coordinate its efforts only on specific aspects of its information systems?

    A) True
    B) False
    B) False
  79. What are the three main components of an SDP? (Select all that apply)

    a. Client
    b. controller
    c. channel
    d. protocol
    e. set of gateways
    f. reader
    Client, controller, set of gateways
  80. ____ is a security technology that breaks the data center into logical elements and manages them with high-level IT security policies. Which of these terms fits the blank space?




    A) Micro segmentation
  81. Which of the following is a type of social engineering attack that appears to come from a trusted source and can trick users into granting system access to cybercriminals?




    C) Phishing
  82. True or False:
    Regardless of skill, anyone can make use of Raas (Ransomware-as-a-Service) kits in order to commit cybercrime to extort as much money as possible from their victims.

    A) True
    B) False
    A) True
  83. Sam works in the legal department at GloboChem. He receives an email that says it's from the American Bar Association and has an attachment he needs to sign and return to update his standing. When he opens the attachment, he starts to get error messages on his desktop. What was he most likely the victim of?




    C) Spear Fishing
  84. Multiple Answer:
    Which of the following is TRUE about microsegmentation? Choose all that apply.

    a. A service can access other virtual networks without using a virtual router through the use of microsegmentation.
    b. Microsegmentation causes a decrease in efficiency.
    c. Microsegmentation deals with isolating a data center into logical elements and managing them with high level security policies.
    d. Microsegmentation is weaker security compared to subnetting.
    e. The movement towards virtualization and the usefulness of virtual routers is what makes microsegmentation practical in the first place.
    C and E.

    • Microsegmentation deals with isolating a data center into logical elements and managing them with high level security policies.
    • and 
    • The movement towards virtualization and the usefulness of virtual routers is what makes microsegmentation practical in the first place.
  85. What is a Denial-of-Service attack?




    C) An attack that overflows a machine with surplus applications to keep it from fulfilling legitimate requests.
  86. How a spear-phishing attack is different than a phishing attack?




    C) A spear-phishing attack is a targeted phishing attack.
  87. Which is NOT a part of the National Institute of Standards and Technology (NIST) issued guidelines?




    D) Preserve
  88. Which of the following is NOT an advantage of Remote Browser?




    C) Remote browsers can create a virtual platform for users to collaborate on
  89. Which of the following are one of the 3 responsibilities of cybersecurity?





    D) All of the above
  90. Match the term with the corresponding definition.
    Term Definition
    Drive-By Download Attack  
    SQL Injection Attack  
    Cross-Site Scripting  

    A. An attack that allows users to run malicious statements in a
    database server. This allows attackers to bypass security measures and modify
    the database.

    B. An attack where a hacker embeds a malicious script into an
    insecure website, these websites can then install scripts on your system or
    redirect to a website controlled by the hacker

    C. An attack where a malicious script is embedded to a trusted
    website (usually as a side script).



    • Drive-By Download Attack = B
    • SQL Injection Attack = A
    • Cross-Site Scripting = C
  91. _____ has become a modern epidemic, hitting government, hospitals, schools and private enterprises and any other targets deemed vulnerable to extortion and capable of paying.




    B) Ransomware
  92. According to Forrester, what tools can identify software vulnerabilities and exposes licenses used from open sources.





    B) Software Composition Analysis
  93. Which of the following components are not part of a Software-defined perimeter (SDP) architecture?




    C) An Automated error collection system
  94. True or False:
    Some types of cyber threats are identity theft, phishing, and spam.

    A) True
    B) False
    A) True
  95. An IT administrator wants to limit the resources that can be accessed by an individual to only what they absolutely need, while making the rest invisible. Which of the following is the best implementation for this purpose?




    D) Software-Defined Perimeters
  96. A company has implemented access control to their systems, security awareness training to employees, and various data security technology. Under which NIST cyber security framework do these methods fall under?




    B) Protect
  97. According to Gartner, which of the following is not a top security and risk management trend for 2022?




    A) Attack Surface Reduction
  98. What type of cyber threat matches the description: A hacker has gained access to a user email address or phone number and uses this information to send out specific messages from an official account claiming to be a peer or co-worker (situation may vary). The hacker then proceeds to ask for specific data regarding the company and or its secure data to steal the information to either sell or use for a malicious attack.





    C) Identity theft
  99. Jessica is an intern for a major organization and is on her first week. She checks her email and realizes that her boss needs help logging in to the organization's servers. The email asks to send her login information, so that her boss can at least turn in some documents. She is hesitant to send her information, but then realizes that the sender's email matches to her boss's email. She then sends her login information. What cyberattack did she just fall for?





    E) Spear Phishing
  100. An employee in a company got an email stating that his company password needed to be updated. When he clicked on the link it took him to a suspicious site. The next day he realized his computer was infected with a virus. What kind of attack is this?




    B) Phishing attack
  101. Which cyber threat is the most common?




    C) Phishing
  102. Which of the following is a reason why healthcare industry has a higher security breach metric?



    D) Regulation requires reporting breaches
  103. True or False:
    Companies consistently report that human error is the primary factor in security breaches and data loss.

    A) True
    B) False
    A) True
Author
dior
ID
358365
Card Set
Final's flashcards for ITEC4313.01 Emerging Information Tech
Description
Updated