True or False:
Data Fabric allows easy access and sharing across distributed data environments.
A) True
B) False
A) True
Multiple Choice.
The Economist classified____ as the world's most valuable resource replacing oil.
D) Data
True or False:
One of the trends currently, is that database administrators are having to be less involved in the application development.
A) True
B) False
B) False
In a recent survey amongst UK employers, which of the following areas of knowledge did they look for the most?
B) Data science (machine learning, AI)
True or False:
Data silos are huge sources of inefficiency in any department or organization.
A) True
B) False
A) True
The characteristics of Big Data are volume, velocity, and variety. Velocity refers to:
A) the pace at which data sources generate
True or False:
For Database Administrators that manage on-premises databases, the top priority is maintenance while optimizing performance is the most time-consuming task.
A) True
B) False
B) False
Which of the following contributed to the evolution of NoSQL?
E) All the above
In relational databases, data is stored in
B) Tables
As a benefit of cloud computing, what function are DBA's able to focus their efforts on?
D) Database Performance
Short Answer:
What is Blockchain?
Blockchain or block chain is a continuously growing list of records, called blocks, which are linked and secured using cryptography.
Relational DB's are known for doing which of the following things particularly well?
C) Handling small amounts of data
Data governance includes the ___ and ____ involved in managing data assets. (Please select the best two answers.)
a. Organization
b. Processes
c. Framework
d. Department
Processes and Framework
Employees from different departments within a company are keeping data from each other instead of working together, which can result in competition or animosity. Which of these data silo factors does this situation most represent?
C) Cultural
There are four characteristics of Big Data, which of the following below has all four characteristics?
A) Volume, Velocity, Variety, Veracity
Companies are investing more and more into data management and storage than ever before. Why is this?
D) The world's most valuable resource is Data
Which is not a characteristic that defines Big Data:
B) Verticality
If a company has a lot of data to store that is complex making it difficult to store, what kind of data is this?
C) Big Data
What are some true advantages of using big data? (Select two)
a. Reducing cost
b. Ease of maintenance
c. Improved customer support
d. Security risk
e. Mass storage facilities
Reducing cost and Improved customer support
Why would a company choose to not adopt blockchain?
C) Their employees would not have the skills necessary to navigate blockchain.
What are not the challenges with big data?
A) the massive amounts of power to store data
Relational databases don't do some things well, which led to the evolution of the noSQL database. Which of the following is not a reason for the evolution of the noSQL database?
B) Relational databases are designed more for rapid growth rather than steady data retention.
True or False:
Widespread adoption of blockchain is not a challenge when implementing the technology?
A) True
B) False
B) False
True or False:
Once conceptualized, a blockchain rarely, if ever, grows, and separates themselves from using cryptography.
A) True
B) False
B) False
Big Data is:
D) both A and B
One of the overarching situations that arise from data silos is that multiple teams store complementary but separate data. This can lead to ...
D) Critical errors, workflow gaps, and increased risk to business
Fill in Blank.
____________ technology creates a connected asset that introduces a new attack vector that needs protecting.
Smart Technology
Short answer:
What bill required the national institute of standards and technology and office of management and budget to increase the security of internet of things devices?
Internet of Things Cybersecurity Improvement Act
True or False:
Generally personal computers and smartphones are also considered IoT devices.
A) True
B) False
B) False
Which of the following are the major components of loT?
A) Thing or Device, Gateway, Cloud, Analytics, User Interface.
Which of the following industry is the biggest adopter of Industry 4.0?
B) Automotive
Select the best definition for loT platform.
A) An on-premises software suite or a cloud service that monitors and controls various types of endpoints, often via applications business units deploy on the platform.
How can IoT improve industrial manufacturing? (Select all that apply):
a. IoT enables manufacturers to scale up different equipment capable of distant observing and servicing
b. It helps to detect and avoid the issues that may cause delays.
c. loT completely automates the manufacturing process, eliminating the need for manual labor.
d. It enables the managers to better allocate the resources, improve worker skilfulness and make the working environment safe.
a,b, and d
List the industry by loT adoption from greatest (1) to least (5).
Industry
IoT adoption
Transportation
Business/Manufacturing
Retail
Security
Health Care
1 == Business/Manufacturing
2 == Health Care
3 == Retail
4 == Security
5 == Transportation
Which is a gateway for IoT devices?
D) Connects loT devices, sensors, and equipment systems to the cloud
Why do major industries, such as factories, businesses, and healthcare facilities, rely on loT devices?
D) All the above
What are some of the security issues that loT products face? Select all that apply.
a. Physical Security
b. Phishing
c. Backdoors
d. Secure Coding
e. Quid Pro Quo Attacks
Physical Security and Backdoors and Secure Coding
Short answer:
What is Industry 4.0?
A manufacturing transformation that represents the fourth industrial revolution. Industry 4.0 is the adoption of computers and automation enhanced with smart and autonomous systems fuelled by data and machine learning.
What is the easiest way a consumer can make sure their loT is properly secure?
B) Update firmware
What percentage of people lack confidence in loT device security?
B) 90%
Which of the following is not a major component of loT?
B) Traffic
Which of the following are challenges of loT?
D) All the above
What are the main issues loT deals with?
a. Funding
b. Security
c. Rural Areas
d. Enough Staffing
Security and Rural Areas
What is an efficient way of using lot in practice?
a. Using your smart watch to track your heart rate while exercising
b. The toaster goes off when the timer is out
c. Google smart devices act as a smart assistant to help you complete small task using your voice.
d. Your car door locks on its own after a certain time period
e. A small microchip to detect the location of your loved items and find them using your phone
a and e
What are some major challenges loT is facing?
a. Lack of use Cases
b. loT products are vulnerable to attack
c. Rural areas lack reliable connection
d. Users who don't update their firmware
b, c and d
When applying IOT, what is the major main challenge businesses are facing?
C) Developers who are rushing loT products that are not Properly secured
Why was the Cybersecurity Improvement Act of 2019 received with critical feedback?
A) It applied only to government devices.
Which of these is NOT an IoT adoption trend seen in 2022?
C) The complexity of IoT projects is becoming easier and easier
What are some security problems that loT products have?
a. Start-up
b. Backdoors
c. Encryption
d. SAS Correct
Backdoors and Encryption
Which of the following is not an example of major challenges IOT is facing?
C) A lack of current interest in IOT devices
Short Answer:
List three benefits of Smart Cities.
Better Traffic, Congestion-free roads, less pollution, high level of security (or similar answers at discretion of grader).
True or False:
By combining virtual and real landscapes, extended reality has many valuable use cases, some being: Training and Development, Marketing and Sales, and Expensive hardware.
A) True
B) False
A) True
True or False:
3D printing was once considered a subtractive process due to the extraction of data from the file, so that printing could occur.
A) True
B) False
B) False
Which is a challenge facing AR/VR devices?
A) Physical space constraints
Multiple Choice:
Which one of the answers below is NOT true about what Virtual Reality (VR) can help do for businesses?
C) Enables a slower more defined prototyping process
What are some of the benefits of 5D printing? Select all that apply.
a. It has a cost-effective manufacturing process.
b. A physical prototype can be tested.
c. Curved layers prevent creating weak points.
d. Objects are 3 to 5 times stronger.
e. Printers can create anything within their build volume.
Curved layers prevent creating weak points. and Objects are 3 to 5 times stronger.
Which of the following accurately describes a difference between AR and VR technology and trends?
A) AR technology is more accessible in terms of cost to the average consumer because it can be experienced through smart phones and other devices the user already possesses, hereas VR requires the purchase of new equipment
You are working for the local community college as an IT consultant. The head of the nursing program has asked your opinion on the viability of utilizing virtual reality in the nursing curriculum. What are some of the difficulties facing VR that they should be informed of before making their decision? (Select all that apply)
a. Virtual reality has a learning curve.
b. Virtual reality has spatial constraints.
c. Virtual reality is not well utilized as a training tool.
d. Virtual reality requires ongoing IT support.
It all of them:
Virtual reality has a learning curve.
Virtual reality has spatial constraints.
Virtual reality is not well utilized as a training tool.
Virtual reality requires ongoing IT support.
Amazon has recently updated their website, so the customer is able to see in real time how a piece of furniture would fit in their home. This type of technology is known as:
B) AR
Select the best answer: What are the main advantages of 3D printing?
C) Speed, Flexibility, and Cost.
Which of the following is False about the uses of 3D Printing in the medical field?
C) Allows doctors to print nervous tissue to help paralysis and stroke victims
Which XR allows users to see the real world with additional digital information and virtual objects layered on top?
D) AR
What is additive manufacturing?
C) The process of creating an object by adding material in layers until the object is created
True or False:
In the medical field, 3D printing can be utilized to produce pharmaceutical drugs.
A) True
B) False
A) True
Computer Numeric Controlled (CNC) machinery uses what type of manufacturing?
B) Subtractive Manufacturing
Multiple Choice, Multiple Answer:
What are the challenges of XR? (Select 2)
a. Display
b. Security
c. Motion Tracking
d. Start-up
Display and Motion Tracking
True or False:
As of 2021, creating production parts is the largest use case of 3D printing in manufacturing
A) True
B) False
A) True
You are shopping through an app to buy new furniture. Within the app, there is a feature that allows you to use your phone camera to capture your living room, and let's you digitally place your chosen furniture into the room to see what it would look like in-person before you buy. This is an example of...
B) Augmented reality
Which of the following is one of the most common use of VR/AR among early adopters in business?
A) Employee training
The company Howden saw potential in showing their customers where improvements could be made. With a mantra of "Revolving around You", Howden prides themselves on their customer service. How does Howden provide excellent customer service and improvement demonstration to their customers?
A) Mixed Reality
A real estate company who wants to give their customers a more realistic experience where they can do a walkthrough of their house and see it built before it is physically built should use which kind of technology?
C) Virtual reality
Pokémon Go is an immersive mobile game that can us your mobile device to track your location, and display live onscreen Pokémon, using your camera as an overlay to the current in camera sight picture. Which type of immersive technology has Pokémon Go implemented to allow players to see Pokémon's on their phone using live footage as an overlay?
C) AR (augmented reality)
Which one of these product development methods is not used when turning a design idea into a physical object?
B) Scrum process
Which is a current challenge for regulation with 3D-Bioprinter technology?
C) Quality assurance and quality control.
There are several challenges with XR, some of which include:
A) A and C
True or False:
We are able to print both prosthetic limbs and dental devices using 3D printing in medical fields.
A) True
B) False
A) True
Short Answer:
Why are cyber-attacks initiated?
Many reasons why attacks could happen, but the most common are for data or intellectual property that will lead to money.
True or False:
For effective cybersecurity, an organization needs to coordinate its efforts only on specific aspects of its information systems?
A) True
B) False
B) False
What are the three main components of an SDP? (Select all that apply)
a. Client
b. controller
c. channel
d. protocol
e. set of gateways
f. reader
Client, controller, set of gateways
____ is a security technology that breaks the data center into logical elements and manages them with high-level IT security policies. Which of these terms fits the blank space?
A) Micro segmentation
Which of the following is a type of social engineering attack that appears to come from a trusted source and can trick users into granting system access to cybercriminals?
C) Phishing
True or False:
Regardless of skill, anyone can make use of Raas (Ransomware-as-a-Service) kits in order to commit cybercrime to extort as much money as possible from their victims.
A) True
B) False
A) True
Sam works in the legal department at GloboChem. He receives an email that says it's from the American Bar Association and has an attachment he needs to sign and return to update his standing. When he opens the attachment, he starts to get error messages on his desktop. What was he most likely the victim of?
C) Spear Fishing
Multiple Answer:
Which of the following is TRUE about microsegmentation? Choose all that apply.
a. A service can access other virtual networks without using a virtual router through the use of microsegmentation.
b. Microsegmentation causes a decrease in efficiency.
c. Microsegmentation deals with isolating a data center into logical elements and managing them with high level security policies.
d. Microsegmentation is weaker security compared to subnetting.
e. The movement towards virtualization and the usefulness of virtual routers is what makes microsegmentation practical in the first place.
C and E.
Microsegmentation deals with isolating a data center into logical elements and managing them with high level security policies.
and
The movement towards virtualization and the usefulness of virtual routers is what makes microsegmentation practical in the first place.
What is a Denial-of-Service attack?
C) An attack that overflows a machine with surplus applications to keep it from fulfilling legitimate requests.
How a spear-phishing attack is different than a phishing attack?
C) A spear-phishing attack is a targeted phishing attack.
Which is NOT a part of the National Institute of Standards and Technology (NIST) issued guidelines?
D) Preserve
Which of the following is NOT an advantage of Remote Browser?
C) Remote browsers can create a virtual platform for users to collaborate on
Which of the following are one of the 3 responsibilities of cybersecurity?
D) All of the above
Match the term with the corresponding definition.
Term
Definition
Drive-By Download Attack
SQL Injection Attack
Cross-Site Scripting
A. An attack that allows users to run malicious statements in a
database server. This allows attackers to bypass security measures and modify
the database.
B. An attack where a hacker embeds a malicious script into an
insecure website, these websites can then install scripts on your system or
redirect to a website controlled by the hacker
C. An attack where a malicious script is embedded to a trusted
website (usually as a side script).
Drive-By Download Attack = B
SQL Injection Attack = A
Cross-Site Scripting = C
_____ has become a modern epidemic, hitting government, hospitals, schools and private enterprises and any other targets deemed vulnerable to extortion and capable of paying.
B) Ransomware
According to Forrester, what tools can identify software vulnerabilities and exposes licenses used from open sources.
B) Software Composition Analysis
Which of the following components are not part of a Software-defined perimeter (SDP) architecture?
C) An Automated error collection system
True or False:
Some types of cyber threats are identity theft, phishing, and spam.
A) True
B) False
A) True
An IT administrator wants to limit the resources that can be accessed by an individual to only what they absolutely need, while making the rest invisible. Which of the following is the best implementation for this purpose?
D) Software-Defined Perimeters
A company has implemented access control to their systems, security awareness training to employees, and various data security technology. Under which NIST cyber security framework do these methods fall under?
B) Protect
According to Gartner, which of the following is not a top security and risk management trend for 2022?
A) Attack Surface Reduction
What type of cyber threat matches the description: A hacker has gained access to a user email address or phone number and uses this information to send out specific messages from an official account claiming to be a peer or co-worker (situation may vary). The hacker then proceeds to ask for specific data regarding the company and or its secure data to steal the information to either sell or use for a malicious attack.
C) Identity theft
Jessica is an intern for a major organization and is on her first week. She checks her email and realizes that her boss needs help logging in to the organization's servers. The email asks to send her login information, so that her boss can at least turn in some documents. She is hesitant to send her information, but then realizes that the sender's email matches to her boss's email. She then sends her login information. What cyberattack did she just fall for?
E) Spear Phishing
An employee in a company got an email stating that his company password needed to be updated. When he clicked on the link it took him to a suspicious site. The next day he realized his computer was infected with a virus. What kind of attack is this?
B) Phishing attack
Which cyber threat is the most common?
C) Phishing
Which of the following is a reason why healthcare industry has a higher security breach metric?
D) Regulation requires reporting breaches
True or False:
Companies consistently report that human error is the primary factor in security breaches and data loss.
A) True
B) False
A) True
Author
dior
ID
358365
Card Set
Final's flashcards for ITEC4313.01 Emerging Information Tech