ACTUAL Exam Questions and CORRECT
Answers
rootkit - CORRECT ANSWER - software that allows a hacker to remotely take control of
a computer while avoiding detection
phishing - CORRECT ANSWER - an attempt to steal sensitive data by masquerading as a
trustworthy institution, typically by e-mail, social media, or instant messaging, and requesting
that the user provide a password, a credit card number, or other personal info
botnet - CORRECT ANSWER - describes a collection of computers that have been
compromised and can be controlled in concert by a third party; also known as zombie networks
keylogging - CORRECT ANSWER - covertly tracking the keys typed on a keyboard
spoofing - CORRECT ANSWER - act of changing the appearance of an email or web
page to look like the real one
cybersquatting - CORRECT ANSWER - The act of registering a domain name that is the
same as, or confusingly similar to, the trademark of another and then offering to sell that domain
name back to the trademark owner
Phreaking - CORRECT ANSWER - act of hacking into a company's telecommunication
systems
computer hardware - CORRECT ANSWER - the physical components of information
technology, includes storage devices, input/output devices, networking equipment, etc.
,software - CORRECT ANSWER - a computer program or a collection of programs; a
precise set of instructions that tells hardware what to do
operating system - CORRECT ANSWER - the software that controls the computer
hardware and establishes standards for developing and executing applications
applications - CORRECT ANSWER - Includes desktop applications, enterprise software,
utilities, and other programs that perform specific tasks for users and organizations
user interface (UI) - CORRECT ANSWER - the mechanism through which users interact
with a computing device
firmware - CORRECT ANSWER - software stored on nonvolatile memory chips (as
opposed to being stored on devices such as hard drives or removable discs); many products allow
for this to be upgraded online or by connecting to another device
embedded systems - CORRECT ANSWER - special-purpose software designed and
included inside physical products
desktop software - CORRECT ANSWER - applications installed on a personal computer;
typically supporting tasks performed by a single user; ie. browser, office suite, etc
enterprise software - CORRECT ANSWER - applications that address the needs of
multiple simultaneous users in an organization or work group
software package - CORRECT ANSWER - a software product offered commercially by a
third party
enterprise resource planning (ERP) - CORRECT ANSWER - a software package that
integrates the many functions (accounting, finance, inventory management, human resources,
etc.) of a business
, customer relationship management (CRM) - CORRECT ANSWER - systems used to
support customer-related sales and marketing activities
supply chain management (SCM) - CORRECT ANSWER - systems that can help a firm
manage aspects of its value chain
business intelligence systems (BI) - CORRECT ANSWER - systems that use data created
by other systems to provide reporting and analysis for organizational decision making
database management system (DBMS) - CORRECT ANSWER - software for creating,
maintaining, and manipulating data
distributed computing - CORRECT ANSWER - systems in different locations
communicate and collaborate to complete a task
server (hardware context) - CORRECT ANSWER - computer that has been configured to
support requests from other computers
server (software context) - CORRECT ANSWER - program that fulfills requests
client - CORRECT ANSWER - A software program that makes requests of a server
program
application server - CORRECT ANSWER - software that houses and serves business logic
for use (and reuse) by multiple applications
web services - CORRECT ANSWER - small pieces of code that are accessed via the
application server, which permit interoperable machine-to-machine interaction over a network