Professional Documents
Culture Documents
Week 2 Assessment Verified Answers
Week 2 Assessment Verified Answers
Account Number (Customer number) - correct answer a unique number linked to an organization to
track customer information and spending history
Existing account - correct answer an account that already is in sps / can be inactive
Inactive account - correct answer an account coded by credit that has not had any activity within a given
period of time
duplicate account - correct answer an account that has been created more than once in sps
dead account - correct answer a sales contact center account that has been scored and no information
can be found about the account. Most often an account that has non potential, duplicate, bankrupt or
no longer in business
actively working - correct answer an account that is proactively managed by the assigned AR
House account - correct answer an account that does not have an assigned AR
Skating - correct answer securing customers or a sale without confirming that no one else is actively
working the account
Last receipt date - correct answer the date from the last time CDW received the product from the
distributor
Scheduled - correct answer product that purchasing has on order from the distributor
allocoated - correct answer product reserved for customer orders and is pending credit release of the
order
backorder (B/O) - correct answer the total number of units that customers have on order that have not
yet been allocated
pickable - correct answer the number of units actually on the shelf that can be picked for a customer and
shipped
available - correct answer the number of units CDW has available to sell
Adware - correct answer plays or downloads unauthorized advertising and can also be spyware
Advanced persistent Threat - correct answer a network attack in which an unauthorized person gains
access to a network and stays there undetected for a long period of time
the intention is to steal data rather than cause a damage to the network or organization
antivirus - correct answer software designed to detect and block a virus (often called malware) that is a
threat to a computer, device or network
behavior analytics - correct answer helps identify anomalies occurring in organizations by gathering large
amounts of data associated with data creation, movement and sharing
Bring your own device - correct answer policy of permitting network users to use their personal mobile
devices and computers to their workplace, and access enterprise data and applications
data breach - correct answer The intentional or unintentional release of secure information to an
untrusted environment.
Data Loss Prevention (DLP) - correct answer a malicious network attach that overwhelms websites or
servers with data requests, rendering those systems inoperable
encryption software - correct answer uses an encryption scheme that encodes computer data leaving
the network so that is cannot be recovered without the correct key. It's a fundamental part of modern
computer communications and file protection
endpoint - correct answer an internet capable hardware device that connects to a network
firewall - correct answer hardware or software that protects a network from unauthorized access
hacker - correct answer a person whoo seeks and exploits weaknesses in a computer system or
computer network
intrusion detection - correct answer protects the network from threats by monitoring the activities and
movements of users within the internal network and providing report; typically a software driven
product
keystroke logging - correct answer the use of secretly installed software to record keystrokes, steal
personal data, and intercept account or other sensitive information
machine learning - correct answer AI that provides computers the ability to learn without being
programmed; sifts through data, looks for patterns and adjust actions accordingly
malware - correct answer a category of malicious code that is spread through email, websites and instant
messages; malware seeks to exploit existing vulnerabilities on systems to make their entry quiet and
easy; examples of malware include: spyware, adware, keystroke logging, viruses and SPAM
Next generation firewall - correct answer provide a single point of visibility into multiple areas of security
functionality as well as the ability to control network traffic in a manner that protects enterprises against
attacks
multiple security technologies are integrated in a single platform by combining the features of traditional
firewalls, intrusion prevention systems, content filtering and application control on a single piece of
hardware. Those components then are able to communicate with each other
pharming - correct answer users are enticed to a website through 'bait' in the form of a phony email or
link, once the user takes the 'bait' farming works to redirect victims to a fake website even if the user has
typed the correct web address
security - correct answer hardware and software used to keep data safe from hackers, viruses and
network vulnerabilities
SPAM - correct answer electronic junk mail; SPAM clogs mailboxes, and overloads servers
spoofing/phishing - correct answer the practice of sending emails appearing to be from reputable
sources with the goal of influencing or gaining personal or corporate informmatioon
spyware - correct answer software secretly installed on a computer to monitor user activity or take over
a computer. It can collect personal information, redirect browsers, and change computer settings
statistical analysis - correct answer using groups of existing documents to analyze their characteristics
from a statistical point of view, and thine use these statistics to identify other documents that have
similar characteristics
threat intelligence - correct answer in-depth information about specific threats to help an organization
protect itself from the types of attacks that could do the most damage
threat prevention - correct answer multi-layered security protection plan that prevents malicious attacks
from entering a customer's environment and corrupting systems and data
Virtual private network - correct answer authorized users to securely connect to an organization's private
internal network over the internet and prevents unauthorized or non-employees access
virus - correct answer a program designed to spread from computer to computer on its own, potentially
damaging the system software by corrupting or erasing data, using available memory or altering data
autosensing - correct answer a feature of 10/100/1000 switches, and NICs; involves probing the
capability of a network to select compatible network speeds between nodes
bandwidth - correct answer amount oof data a connection can pass between two points
core switch - correct answer backbone device, a switch that is central to a network's successful
operation; used to connect crucial pieces of equipment that, for critical business performance reasons
cannot experience any downtime
edge/access switch - correct answer connect to client devices, such as desktops and notebooks; less
crucial than core switches
ethernet - correct answer the standard network technology that connects computers to each other and
to the internet via cables
fiber optic cable - correct answer a networking cable that consists of a center glass core surrounded by
several layers of protective material; the outer insulating jacket prevents interference
internet of things - correct answer adding network connectivity and intelligence to just about every
device; connecting them to the network allows them to connect to the internet or a customer network
internet protocol version 6 - correct answer the most recent version of the IP, the communications
protocol that provides an identification and location systems for computers on networks and routes
traffic across the inter
latency - correct answer a delay in data between points caused by not having enough bandwidth
LAN - correct answer a network of devices that reside in one place, or locally
- correct answer