You are on page 1of 6

Week 2 Assessment verified answers

Account Number (Customer number) - correct answer a unique number linked to an organization to
track customer information and spending history

Existing account - correct answer an account that already is in sps / can be inactive

Inactive account - correct answer an account coded by credit that has not had any activity within a given
period of time

duplicate account - correct answer an account that has been created more than once in sps

dead account - correct answer a sales contact center account that has been scored and no information
can be found about the account. Most often an account that has non potential, duplicate, bankrupt or
no longer in business

actively working - correct answer an account that is proactively managed by the assigned AR

House account - correct answer an account that does not have an assigned AR

Skating - correct answer securing customers or a sale without confirming that no one else is actively
working the account

Book of Business - correct answer an AR's entire group of customers

Last receipt date - correct answer the date from the last time CDW received the product from the
distributor

ETA - correct answer the estimated time of arrival of the product

Scheduled - correct answer product that purchasing has on order from the distributor
allocoated - correct answer product reserved for customer orders and is pending credit release of the
order

backorder (B/O) - correct answer the total number of units that customers have on order that have not
yet been allocated

pickable - correct answer the number of units actually on the shelf that can be picked for a customer and
shipped

available - correct answer the number of units CDW has available to sell

in picking - correct answer stock that is in the process of shipping

Adware - correct answer plays or downloads unauthorized advertising and can also be spyware

Advanced persistent Threat - correct answer a network attack in which an unauthorized person gains
access to a network and stays there undetected for a long period of time

the intention is to steal data rather than cause a damage to the network or organization

antivirus - correct answer software designed to detect and block a virus (often called malware) that is a
threat to a computer, device or network

behavior analytics - correct answer helps identify anomalies occurring in organizations by gathering large
amounts of data associated with data creation, movement and sharing

Bring your own device - correct answer policy of permitting network users to use their personal mobile
devices and computers to their workplace, and access enterprise data and applications

data breach - correct answer The intentional or unintentional release of secure information to an
untrusted environment.
Data Loss Prevention (DLP) - correct answer a malicious network attach that overwhelms websites or
servers with data requests, rendering those systems inoperable

encryption software - correct answer uses an encryption scheme that encodes computer data leaving
the network so that is cannot be recovered without the correct key. It's a fundamental part of modern
computer communications and file protection

endpoint - correct answer an internet capable hardware device that connects to a network

firewall - correct answer hardware or software that protects a network from unauthorized access

hacker - correct answer a person whoo seeks and exploits weaknesses in a computer system or
computer network

intrusion detection - correct answer protects the network from threats by monitoring the activities and
movements of users within the internal network and providing report; typically a software driven
product

keystroke logging - correct answer the use of secretly installed software to record keystrokes, steal
personal data, and intercept account or other sensitive information

machine learning - correct answer AI that provides computers the ability to learn without being
programmed; sifts through data, looks for patterns and adjust actions accordingly

malware - correct answer a category of malicious code that is spread through email, websites and instant
messages; malware seeks to exploit existing vulnerabilities on systems to make their entry quiet and
easy; examples of malware include: spyware, adware, keystroke logging, viruses and SPAM

Next generation firewall - correct answer provide a single point of visibility into multiple areas of security
functionality as well as the ability to control network traffic in a manner that protects enterprises against
attacks
multiple security technologies are integrated in a single platform by combining the features of traditional
firewalls, intrusion prevention systems, content filtering and application control on a single piece of
hardware. Those components then are able to communicate with each other

pharming - correct answer users are enticed to a website through 'bait' in the form of a phony email or
link, once the user takes the 'bait' farming works to redirect victims to a fake website even if the user has
typed the correct web address

often applied to the websites of banks or e-commerce sites

security - correct answer hardware and software used to keep data safe from hackers, viruses and
network vulnerabilities

SPAM - correct answer electronic junk mail; SPAM clogs mailboxes, and overloads servers

spoofing/phishing - correct answer the practice of sending emails appearing to be from reputable
sources with the goal of influencing or gaining personal or corporate informmatioon

spyware - correct answer software secretly installed on a computer to monitor user activity or take over
a computer. It can collect personal information, redirect browsers, and change computer settings

statistical analysis - correct answer using groups of existing documents to analyze their characteristics
from a statistical point of view, and thine use these statistics to identify other documents that have
similar characteristics

threat intelligence - correct answer in-depth information about specific threats to help an organization
protect itself from the types of attacks that could do the most damage

threat prevention - correct answer multi-layered security protection plan that prevents malicious attacks
from entering a customer's environment and corrupting systems and data

Virtual private network - correct answer authorized users to securely connect to an organization's private
internal network over the internet and prevents unauthorized or non-employees access
virus - correct answer a program designed to spread from computer to computer on its own, potentially
damaging the system software by corrupting or erasing data, using available memory or altering data

designed to replicate and is spread by infecting other files

802.11 (Wifi) - correct answer provide the wireless counterpart to Ethernet

autosensing - correct answer a feature of 10/100/1000 switches, and NICs; involves probing the
capability of a network to select compatible network speeds between nodes

bandwidth - correct answer amount oof data a connection can pass between two points

core switch - correct answer backbone device, a switch that is central to a network's successful
operation; used to connect crucial pieces of equipment that, for critical business performance reasons
cannot experience any downtime

edge/access switch - correct answer connect to client devices, such as desktops and notebooks; less
crucial than core switches

ethernet - correct answer the standard network technology that connects computers to each other and
to the internet via cables

fiber optic cable - correct answer a networking cable that consists of a center glass core surrounded by
several layers of protective material; the outer insulating jacket prevents interference

more expensive than copper

offers more sandwich and cover longer distances

multimode and single mode


firewall - correct answer hardware or software that protects a network from unauthorized access

internet of things - correct answer adding network connectivity and intelligence to just about every
device; connecting them to the network allows them to connect to the internet or a customer network

internet protocol version 6 - correct answer the most recent version of the IP, the communications
protocol that provides an identification and location systems for computers on networks and routes
traffic across the inter

developed to deal with long anticipated problem of IPv4 address exhaustion

latency - correct answer a delay in data between points caused by not having enough bandwidth

LAN - correct answer a network of devices that reside in one place, or locally

- correct answer

You might also like