Comprehensive Information Security and Data Management Flashcards

Flashcard Icon

Flashcard

Learn Mode Icon

Learn Mode

Match Icon

Match

Coming Soon!
Library Icon

Library

View Library
Match Icon

Create

Create More Decks
Flashcard Icon Flashcards
Flashcard Icon Flashcards
Library Icon Library
Match Icon Match (Coming Soon)

Computer Science - Computer Security and Reliability

View Results
Full Screen Icon

user_kambeorv Created by 9 mon ago

Cards in this deck(50)
Which of the following represents the classic example of unintentional information reuse?
Blur Image
What is the primary difference between a worm and a virus?
Blur Image
Which of the following is an example of a way to maintain information security that a company should include in their information security policies?
Blur Image
What refers to the extent to which the decision-making processes, algorithms, and data used by artificial intelligence systems are open, accessible, and understandable to stakeholders and users?
Blur Image
What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union?
Blur Image
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the _____ policy.
Blur Image
Which of the following is a cost of downtime in addition to lost revenue?
Blur Image
What includes threats, negative remarks, or defamatory comments transmitted to harass, intimidate, threaten, or humiliate others?
Blur Image
What program, when installed on a computer, records every keystroke and mouse click?
Blur Image
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
Blur Image
Which of the following terms represents how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability?
Blur Image
What means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web?
Blur Image
In what category would you put a cloud computing benefit that allows a customer to store fewer applications on a client computer, freeing up the memory and allowing for increases in performance?
Blur Image
What refers to the safe disposal of MIS assets at the end of their life cycle?
Blur Image
Each year, businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures?
Blur Image
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?
Blur Image
What contains all of the details of an incident?
Blur Image
Which of the following is an example of an emergency notification system?
Blur Image
What is the primary reason a company has a failover system?
Blur Image
Which of the following is a benefit of a solid MIS infrastructure?
Blur Image
What type of keys do you need to use to create a relational database model?
Blur Image
Which of the following is a reason for low-quality data?
Blur Image
Why were data warehouses created?
Blur Image
Which of the following is not a data cleansing activity?
Blur Image
Which of the following occurs during data cleansing?
Blur Image
Which of the following would not be considered for the complete characteristic of high-quality data?
Blur Image
Some of the serious business consequences that occur due to using low-quality data to make decisions are all of the following, except:
Blur Image
Which of the following are examples of external databases in the data warehouse model?
Blur Image
What is the primary problem with redundant data?
Blur Image
Which of the following questions is an example of how managers can use business intelligence (BI) to answer tough business questions?
Blur Image
What is also called web scraping?
Blur Image
Which policy contains general principles regarding information privacy?
Blur Image
Which of the following clauses is typically contained in an acceptable use policy?
Blur Image
What area of information security focuses on preventing identity theft, phishing, and pharming scams?
Blur Image
What must you do with antivirus software to make it protect effectively?
Blur Image
What factors influence social in relation to data and information?
Blur Image
What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
Blur Image
What can encryption technology perform?
Blur Image
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
Blur Image
What is a form of malicious software that infects your computer and asks for money?
Blur Image
What is extraction, transformation, and loading?
Blur Image
Which of the following is an example of data found in an external database in the data warehouse model?
Blur Image
Which of the following is true in regard to the elimination of redundant data?
Blur Image
What is the significance of following in relation to keys and from?
Blur Image
How does policy in relation to with and different?
Blur Image
What is the primary purpose of a data warehouse?
Blur Image
Why were data warehouses created?
Blur Image
What is the ultimate outcome of a data warehouse?
Blur Image
What do data warehouses support?
Blur Image
One of the primary goals of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. What does the elimination of data redundancy do for a database?
Blur Image

Ask Our AI Tutor

Get Instant Help with Your Questions

Need help understanding a concept or solving a problem? Type your question below, and our AI tutor will provide a personalized answer in real-time!

How it works

  • Ask any academic question, and our AI tutor will respond instantly with explanations, solutions, or examples.
Flashcard Icon
  • Browse questions and discover topic-based flashcards
  • Practice with engaging flashcards designed for each subject
  • Strengthen memory with concise, effective learning tools