Reference no: EM133085321
1. Ensuring employees use and change _____ frequently can greatly improve cyber security.
data
passwords
gloves
the cloud
2. What term refers to software that is designed to damage or disable computer systems?
malware
workflow
data mining
intranet
3. Walter is a writer who has authored works in a variety of different publications. In order to build trust with his readers, Walter always makes sure to include a blurb at the end of his articles that list all of his qualifications and expertise, otherwise known as ______.
creativity
data mining
malware
credentials
4. Website endings like .com, .org, or .net are purchased with the web domain, so they tell you plenty about the website's validity, mostly that it is very reliable and accurate.
True
False
5. IMS can be very helpful with sales and marketing thanks to technology that identifies the most successful sales teams, letting managers know which employees are excelling at their jobs.
True
False
6. Computer networks depend on small packets of data known as _____ to encrypt and protect data.
private keys
public keys
outside keys
internal keys
7. When designing your company's website, it is important to make branding a priority by making sure that the business's _____ is seen throughout the site.
logo
contact info
employees
prices
8. Everywhere you on go on the internet you leave a record, and as a result, a lot of information for those who capture it.
True
False
9. What do hackers use to change public keys and prevent authorized users from accessing their own data?
cryptovirology
infiltration
malware
ransomware
10. Big data has plenty of issues, but ethical issues are not among them.
True
False
11. Who, in recent years, has warped the intent of cryptographic technology to create cryptovirology?
black hat programmers
white hat programmers
red hat programmers
yellow hot programmers
12. Facebook's stock dropped so dramatically on July 26, 2018, that the company set a new record for a single day's loss as the company's value decreased by $119 billion in 24 hours.
True
False
13. The proliferation of social media options and sites where customers rate their experience has created challenges for businesses.
True
False
14. While failure to monitor security can damage a business, using or forwarding inaccurate information is not a threat that can damage businesses.
True
False
15. For businesses, anything that goes viral on their social media accounts is good for business.
True
False