IT Fundamentals Final Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/215

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

216 Terms

1
New cards

Confidentiality

ensuring data is secure (cannot be
accessed by individuals who do not have adequate
rights)

2
New cards

integrity

ensuring data is correct

3
New cards

Availability

ensuring data is accessible when needed

4
New cards

communication

can the information be communicated
between individuals without others being able to
intercept/access it

5
New cards

hardware

is the information secure, for instance if stored on
a laptop, can anyone access that laptop? Is it encrypted on
the laptop?

6
New cards

software

must ensure that access to the information is done
only once the person has been authenticated as someone
who is allowed to access it

7
New cards

data checking mechanisms

polices on how the data will be used to ensure it is being used as collected

8
New cards

accuracy of collected data

double check the data for accuracy, data modification must be tracked - so that mistakes can be rolled back to previous versions

9
New cards

Y2K

in 1960s-1970s, to reduce memory usage years were stored as 2 digits instead of 4

ex. if born in 1973 and it is 1999 (99-73>=18, no problem)

ex. if born in 1973 and it is 2013 (13-73<18, causes negative age)

10
New cards

Authenticity

ensuring that the parties
communicating are who they say they are –
that is, that the data/information is authentic

11
New cards

Non-repudiation

if a party pays for an item or
service, the other party is legally bound to fulfill
the transaction (perform the action, send the
item)

12
New cards

risk management

identify goals of the organization
• identify information assets of the organization
• enumerate vulnerabilities of those assets
• identify threats that exploit those vulnerabilities
• find solutions
• prioritize the solutions based on the original goals

13
New cards

identifying goals

derived from organization’s mission statement

14
New cards

physical assets

computers, computer networks, people

15
New cards

intellectual property

ideas, products, business strategies

16
New cards

information

data gathered and processed

17
New cards

identify vulnerabilities

computer hardware is vulnerable to fire, water
damage, network based attacks

people are vulnerable to bribes or social engineering

18
New cards

threats

person is exploitable to social engineering attacks, and hired from the organization with a higher salary

server might be threatened by denial of service attack

computer is threatened with an unauthorized access

19
New cards

policies

user access to data is limited based on role within organization, implemented
through account roles
passwords must be strong passwords
employees will be trained against social engineering attacks

20
New cards

actions

install intrusion detection software
install fireproof foam in the building

keep data secure off-site

21
New cards

social engineering

human is weakest link, trick humans by pretending to be someone you are not and asking for secure information

22
New cards

phishing

fake emails and websites, “mocked up” websites that look like real ones but are just facades to secure information through a webcam

23
New cards

insider attacks

bribe a person with access rights to obtain and provide to you secure information

24
New cards

protocol attacks

taking advantage of weaknesses in TCP/IP

25
New cards

software exploits

exploiting flaws in code

26
New cards

intrusions

breaking into accounts, perhaps by guessing people’s passwords

27
New cards

malware

viruses, Trojan horses, worms, spyware

28
New cards

denial of service attacks

Preventing a server from doing its job by flooding it with fake
requests

Flood a server with requests so that it cannot handle all of the requests

29
New cards

solutions

educating / training personnel

strong passwords

polices on IT usage

proper firewall protection

intrusion-detection software

review of log files
encryption & redundancy

digital signatures

30
New cards

programmer

someone who hacks code

31
New cards

white hat hackers

those who do it to promote security, claim they are doing it for good

32
New cards

black hat hackers

those who do it with malicious intent

33
New cards

backups

backup of the file system or at least the important files and maybe done incrementally

34
New cards

RAID

redundant array of inexpensive disks

35
New cards

RAID 0

no redundancy, just distribution of files

36
New cards

RAID 1

Known as mirror, half the drives are a backup

37
New cards

RAID 2

redundancy through Hamming codes, known as stripes data at the bit (rather than block) level

38
New cards

RAID 3

redundancy through parity bits, known as byte-level striping with a dedicated parity disk

39
New cards

Cryptography

placing a message into a coded form

40
New cards

Symmetric (public) key encryption

one key used for both encrypting and decrypting

41
New cards

Asymmetric (private) key encryption

one key used for encrypting (public key), and another for decrypting (private key)

42
New cards

Data encryption standard (DES)

56-bit key size, no longer considered secure

43
New cards

Advanced encryption standard (AES)

uses 128-bit to 256-bit key sizes

44
New cards

database

Organized collection of data that is stored in a central location or in
multiple locations, structured set of data

organized collection of data

45
New cards

Data hierarchy

structure and organization of data involving fields, records, and files

46
New cards

Database management system (DBMS)

Software for creating, storing, maintaining, and accessing database files, combination of software and data made up of a physical database, database engine, and database schema

47
New cards

physical database

collection of files that contain the data

48
New cards

database engine

software that supports access to and modification of the database contents

49
New cards

database schema

specification of the logical structure of the data stored in the database

50
New cards

database query

request to retrieve data from a database

51
New cards

Hierarchical

Implements the "parent-child" relationship

52
New cards

network DBMS

supports many-to-many relations

53
New cards

relational DBMS

defines relationships in form of tables, also known as relations

data items and the relationships among them are organized into tables

54
New cards

Object Oriented Relation DBMS

supports storage of new data types

55
New cards

Distributed Database

consists of two or more files located in different sites

56
New cards

data warehouse

central repository for data, specifically designed for fast query and analysis

constitutes sum total of data collected by or about the organization, processed data (information), processes, business practices, etc

electronic storage of a large amount of data of information by a business or organization

57
New cards

NoSQL database

nonrelational database, allows unstructured and semi-unstructured data to be stored and manipulated

58
New cards

graph database

stores data in terms of entities and relationships between entities

59
New cards

OLTP Database (Online Transaction Processing DB)

speedy, analytic database designed for large numbers of transactions performed by multiple users

category of Data Processing that is focused on transaction-oriented task

60
New cards

OLAP (Online Analytical Processing)

often used to provide Data Analytics from OLTP database to provide
forecasting, budgeting, planning.

for Analytical Processing

61
New cards

schema

defined tables and ‘types’ for the data

62
New cards

relationship

defines how items interact with each other

63
New cards

table

collection of records

64
New cards

records

collection of related fields that make up a single database entry

65
New cards

fields (attributes)

single value in a database record

66
New cards

key

One or more fields of a database record that uniquely identifies it
among all other records in the table

67
New cards

relation

table where data is stored in rows

each row is a record

each column is a field or attribute of the records

collection of records

68
New cards

projections

returns the entire relation(s) but only select fields

obtain specific fields of all records

69
New cards

restrictions

return all fields of select records of the relation(s) based on some criteria

obtain specific records that match some criteria or criterion

70
New cards

join

combine multiple relations together

combine records and fields of multiple relations

71
New cards

inner join

combine relations but only records that appear in all relations

72
New cards

full join

return all records of all relations

73
New cards

left join

return all records of the first relation and all unique records of the other relation(s)

74
New cards

right join

return all records of the last relation and all unique records of the other relation(s)

75
New cards

primary key

field of a relation that is used to uniquely identify each record

76
New cards

Structured Query Language (SQL)

comprehensive relational database language for data manipulation and queries

77
New cards

non-relational database

database that does not use the tabular schema of rows and columns found in most traditional database systems, use a storage model

78
New cards

information

processed data

interpreted data

results of processing data

79
New cards

raw data

accumulated but unorganized findings

inputs

perceptions

80
New cards

intellectual property

human created artifacts

plans and designs

formulas and recipes

books

computer programs

strategies

81
New cards

data

inputs

82
New cards

knowledge

application of information or the synthesis multiple sources of information

83
New cards

wisdom

places knowledge within a social context

84
New cards

relational database

database is made up of relations

85
New cards

query

ask questions of the relation(s)

86
New cards

insert

add a record to a relation

87
New cards

update/modify

update a value of one or more records in a relation

88
New cards

delete

remove records from a relation

89
New cards

set operations

intersection, union, difference

90
New cards

ETL Process

extract data

transform data

load data

91
New cards

extract data

data comes from a large variety of sources

92
New cards

transform data

data from different sources may not “sync up” so data must be transformed to cohere

93
New cards

load data

data gets loaded into a storage facility

94
New cards

slicing

create a meaningful subset by collapsing multidimensional data to one dimension

95
New cards

dicing

create a meaningful subset by without collapsing dimensions

96
New cards

drilling up/down

shifting the view of the data to provide less detail (up) or more detail (down)

97
New cards

rolling up

summarizing data by collapsing collections of data to individual meaningful units

98
New cards

pivoting

changing the perspective of the data

99
New cards

data mining

process of analyzing a large batch of information to discern trends and patterns

100
New cards

nearest neighbors

distance between records x and y