Ch.7-Ch-9
Caroline's personal laptop was attacked by malware. When she got it fixed from the service center, the computer technician advised her to install software that would detect and prevent malware from attacking her system. Which of the following software did the technician advised her to install?
Antivirus software
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
Jamie uses a form of encryption technique that requires him to have two keys. He shares one key with the senders of the message, so that they can use it to encrypt the message. He uses his private key to decrypt the received message. Which of the following encryption methods is being exemplified in this scenario?
Public key encryption
Which of the following best describes public key encryption?
Public key encryption is a more secure form of encryption that uses two keys, one shared and one totally private. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.
Which of the following is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver?
Encryption
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Bliley Act
Which of the following best describes a firewall?
It is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
Unfortunately, nearly half the enterprise applications deliver less than __________ percent of the expected benefits.
50
Which of the following notations could represent a current IP address?
A: 207.46.250.119
The average ERP project takes ___________ months to complete.
A: 21
Customer relationship management applications that use customer data to improve business performance are best described as ________.
A: Analytical customer relationship management applications
Information systems controls are both manual and automated and consist of general and application controls. Which of the following best describes application controls?
A: Application controls include both automated and manual procedures that ensure that only authorized data are completely and accurately processed.
Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain?
A: Bullwhip effect
Which of the following is NOT considered a next-generation enterprise application?
A: Employee relationship management systems
Just-in-time strategies are difficult to implement because of __________.
A: Inefficiencies
Which statement about public key encryption is FALSE?
A: On receiving the message, the recipient uses the public key to decrypt it.
The upstream portion of an organization's supply chain includes the company's __________.
A: Suppliers
_________________________ systems help a firm to analyze, model, and optimize its supply chain.
A: Supply chain Planning
_________________________ systems track the flow and status of products through the distribution process.
A: Supply chain execution
Which of the following best describes supply chain execution systems?
A: Supply chain execution systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.
Which of the following best describes supply chain planning systems?
A: Supply chain planning systems enable the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans.
Blueberry Inc. is a candy making company in Texas. The company's IT department implemented new SAP ERP enterprise software within the company. Which of the following will best support the company in reaping maximum benefits from the new enterprise software?
A: The company changing the way it works to conform to the business processes defined by the software
Which of the following is NOT addressed by a business continuity plan?
A: The technical issues involved in keeping systems up and running
Which of the following is NOT a characteristic of enterprise applications that cause challenges in implementation?
A: They support best practices for each business process and function
A company's suppliers and the suppliers' suppliers are considered the _____________ portion of the supply chain.
A: Upstream
__________ is/are networks of interconnected wireless devices with built-in processing, storage, and radio frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces.
A: Wireless sensor networks (WSNs)
Electronic evidence on computer storage media that is not visible to the average user is called ________.
A: ambient data
Tools enabling a business to link customer conversations, data, and relationships from social networking sites to CRM processes are called __________.
A: social CRM
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
A: social engineering
The upstream portion of an organization's supply chain includes the company's __________.
A: suppliers
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a ..........
A: wide area network
One finding from Alcoa's enterprise system found a positive correlation between ______________ and quality.
Training
An individual posing as an online gamer accesses information stored in an unsuspecting user's computer by placing a program in his hard disk that appears to be legitimate. The system functions normally with the program performing underlying functions. The malware used by the individual is referred to as a(n) __________.
Trojan horse
A(n) _______________ is a program that seems like a normal program, but does something completely unexpected.
Trojan horse
__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes.
Unified communications
__________ deliver(s) voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks.
Voice over IP (VolP)
Which of the following is an opportunity for threats to gain access to assets?
Vulnerability
__________ is/are valuable in areas such as monitoring environmental changes, monitoring traffic or military activity, protecting property, efficiently operating and managing machinery and vehicles, monitoring supply chain management, or detecting biological, chemical, or radiological material.
Wireless sensor networks (WSNs)
Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack.
denial of service attack
If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed .... Meters .
100
__________ consists only of computers, a connection medium, network operating system software, and either a hub or a switch.
A basic network
Daniel wants to establish a broadband connection between his computer and the local ISP. He decides to set up a connection that can operate over his existing telephone lines to carry voice, data, and video at transmission rates ranging from 385 Kbps to 40 Mbps. Which of the following will best help Daniel establish such a connection?
A digital subscriber line (DSL)
Which of the following best describes a security policy?
A security policy consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
What is the difference between a switch and a hub?
A switch has more intelligence than a hub and can filter and forward data to a destination on the network.
Which of the following best describes operational CRM?
A: A system for automating fundamental business processes like marketing, sales, and support for interacting with the customer
Matrix Inc. is a software company in California. The company recently set up an enterprise system to support its business activities. Which of the following would typically be a consequence of the company setting up an enterprise system?
A: An increase in customer satisfaction
Enterprise software includes a database and thousands of predefined ________________.
A: Business Processes
In enterprise applications, tools for flexible reporting, ad hoc analysis, interactive dashboards, what-if scenario analysis, and data visualization are a part of __________.
A: Business intelligence tools
Which term refers to the measurement of the number of customers who stop using or purchasing products or services from a company?
A: Churn rate
Delivering products to retail stores is considered the _____________ portion of the supply chain.
A: Downstream
Improving the tracking of employee training could involve adopting enterprise software focused on which of the following?
A: Employee relationship management
__________ deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.
A: Employee relationship management
Which of the following statements about the time and cost of implementing enterprise applications is true?
A: Enterprise applications involve complex pieces of software that are very expensive to purchase and implement.
Which of the following statements about the implementation of enterprise applications is true?
A: Enterprise applications require not only deep seated technological changes but also fundamental changes to the way the business operates.
ERP stands for :
A: Enterprise resource planning
An ............ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database.
A: Enterprise system
Which of the following is a critical security function of senior management in an organization?
A: Establishing the security policy and managing risk
Business processes supported by enterprise systems related to travel expense reporting are associated with ________ processes.
A: Human resource
Which statement about the TCP/IP protocol is FALSE?
A: IP helps recover any packets that are lost or damaged during transmission
Although it can be risky, a __________________ strategy is based on knowing exactly when components would arrive within the supply chain.
A: Just in time
Business processes supported by enterprise systems related to quality control are associated with ________ processes.
A: Manufacturing and Production
Which of the following scenarios illustrates a drive-by download?
A: Milly copies a file from the Internet to her PC, and, in the process, her PC gets infected by malware.
Which of the following is NOT a security threat posed by the use of the iPhone, iPad, and other mobile computing devices in the workplace?
A: Mobile devices may indicate what kind of data an app can access inside its sandbox domain.
With regard to the primary components of a comprehensive CRM, a system for automating fundamental business processes like marketing, sales, and support for interacting with the customer is called __________.
A: Operational CRM
Enterprise applications require organizations to make many changes. Which of the following is NOT one of the needed changes?
A: Organizations must adapt to minor technological changes
BlueBerry Inc. is a candy manufacturing company in New York City. The company sells its products to its customers through distributors and retailers. Which of the following comprehensive CRM packages will best assist the company in enhancing its collaboration with the distributors and retailers?
A: Partner relationship management
A supply chain driven by actual customer orders or purchases follows which model?
A: Pull based model
Which of the following is true of the effects of the customer relationship management systems on organizations?
A: Reduced direct marketing costs
Which of the following is an important capability for service-category business processes that are found in most major CRM software products?
A: Returns management
Business processes supported by enterprise systems related to credit checking are associated with ________ processes.
A: Sales and Marketing
What are the three general business functions that CRM software serves?
A: Sales, customer service, and marketing
Which of the following best describes social CRM?
A: Social CRM are tools enabling a business to link customer conversations, data, and relationships from social networking sites to CRM processes.
In an effort to ___________ critical business processes, Coca-Cola implemented an SAP enterprise system.
A: Standardize
Which of the following statements about supply chain management systems is true?
A: Supply chain management (SCM) systems automate the flow of information among members of the supply chain so they can use it to make better decisions about when and how much to purchase, produce, or ship.
Which statement about digital certificates is FALSE?
A: The CA verifies a digital certificate user's identity online.
__________ is a phenomenon in which information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain.
A: The bullwhip effect
Education being represented by .edu and business represented by .com are examples of ________.
A: Top level domains
Which of the following is a method of interaction with the customer, such as telephone, email, customer service desk, conventional mail, Facebook, Twitter, Web site, wireless device, or retail store?
A: Touch point
Which type of enterprise software would allow you to analyze customer lifetime value (CLTV)?
A: analytical CRM
Which of the following examines data files and sorts out low-priority online material while assigning higher priority to business-critical files?
A: deep packet inspections
Which of the following is NOT one of the ways in which next-generation enterprise application vendors are delivering more value?
A: making their software easier to customize
4G networks differ from 3G networks in that 4G networks __________.
A: provide more than enough capacity for watching high definition videos on smartphones
In a(n) __________ supply chain model, actual customer orders or purchases trigger events in the supply chain. Transactions produce and deliver only what customers have ordered and move up the supply chain from retailers to distributors to manufacturers and eventually to suppliers.
A: pull-based
Establishing a risk level of malware threats to an organization is an example of _______________.
A: risk assessment
__________ defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance.
An acceptable use policy (AUP)
Symphoniz, Inc., a software company, has installed a new device at the company's entrance. This device replaces the smart cards that provided access to the company's premises. This device requires every employee to place their palm on a scanner-like device. Once an individual's palm is scanned, the fingerprints are compared with the ones stored in the database. If they match, the individual would be granted access. If not, the individual would be required to report to the security office to complete entry formalities. Which of the following processes is being illustrated in this scenario?
Biometric authentication
Which term refers to the wireless networking standard that is popular for creating small personal-area networks?
Bluetooth
__________ focuses on how the company can restore business operations after a disaster strikes.
Business continuity planning
The Internet is based on which three key technologies?
Client/server computing, packet switching, and standard communication protocols
Which of the following scenarios illustrates denial of service (DOS), a type of security loss?
Computer worms infiltrating a network with so much artificial traffic that legitimate traffic cannot get through.
Network signals that are represented by on-off pulses indicate which type of signal?
Digital
Which of the following is a feature of Web 2.0?
Dynamic content
Which of the following is true of Global System for Mobile Communications (GSM)?
GSM's strength is its international roaming capability.
Information systems controls are both manual and automated and consist of general and application controls. Which of the following best describes general controls?
General controls govern the design, security, and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.
_______________ requires that your patient records be protected and saved for six years.
HIPAA
Which of the following best describes HIPAA?
HIPAA outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans.
Which of the following statements about information systems security vulnerability is true?
Hackers can unleash denial-of-service (DoS) attacks or penetrate corporate networks, causing serious system disruptions.
__________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
Hubs
What is the name of the organization responsible for assigning public IP addresses?
ICANN
The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000.
ILOVEYOU
Which of the following statements about RFID is FALSE?
In inventory control and supply chain management, RFID systems capture and manage less detailed information about items in warehouses or in production than barcoding systems.
Which of the following statements about the business value of security and control is true?
Information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability.
If you were building a network intended to service two buildings that were next to each other, you would construct a ________.
Local area network
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
An individual wanting to enable his desktop PC at home to access the Internet must do which of the following?
Obtain a subscription with an Internet Service Provider (ISP)
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________.
Packet switching
Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.
Physical transmission media
Which technology has recently been applied to inventory control, supply chain management, and the Internet of Things?
RFID systems
__________ provide(s) a powerful technology for tracking the movement of goods using tiny tags with embedded data about an item and its location.
Radio frequency identification (RFID) systems
Which of the following best describes radio frequency identification (RFID) systems?
Radio frequency identification (RFID) systems are technology that uses tiny tags with embedded microchips containing data about an item and its location to transmit short-distance radio signals to special readers that then pass the data on to a computer for processing.
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
Which of the following best describes risk assessment?
Risk assessment determines the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. It is used to determine the cost/benefit of a control.
A particular malware threat looks for weaknesses in poorly coded Web application software that get exposed when the Web application fails to filter the data entered by a user on a Web page. This results in malicious program code entering into the company's systems and networks. Which of the following best refers to this malware threat?
SQL injection attack
Which law provides rules related to the creation of financial statements to help avoid fraud?
Sarbanes-Oxley Act
__________ refers to software that covertly gathers information about a user through an Internet connection without the user's knowledge.
Spyware
A company needing reliable digital communication service levels at speeds of 1.5 Mbps would probably need to lease a dedicated ________ line.
T1
__________ are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels.
T1 and T3 lines
Which of the following best describes the Gramm-Leach-Bliley Act?
The Gramm-Leach-Bliley Act requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides application services
__________ imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.
The Sarbanes-Oxley Act
Bandwidth is determined by calculating which of the following?
The difference between the highest and lowest frequency on a channel
Which statement about the Domain Name Service (DNS) is FALSE?
The first name in the domain name is the organization name
Which of the following best defines hertz?
The number of cycles per second that can be sent through a medium
Which of the following statements is true of client/server computing?
The server sets the rules of communication for the network.
The four-part numeric address indicating a unique computer location on the Internet is called __________.
an Internet Protocol (IP) address.
The signal from your iPod earphone is a(n) ________ signal.
analog signal
A(n) ________ signal is a way to communicate in a network and is represented by a continuous waveform
analog signal
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication.
biometric
Bluetooth differs from WiMax in that Bluetooth __________.
can only link up to eight devices within a 10-meter area
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
click fraud
The Domain Name System (DNS) __________.
converts domain names to IP addresses
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
cybervandalism
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
keylogger
At its most basic level, a(n) _________ simply consists of two or more computers that are connected together.
network
Microsoft Windows Server and Linux are examples of ________.
network operating systems
3G networks differ from 4G networks in that 3G networks __________.
offer fair transmission speeds for browsing the Web and online shopping, but are too slow for videos
Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small __________.
personal area networks (PANs)
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing
A ________ is a set of rules that programs on two communicating devices follow.
protocol
If you wanted to have connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices.
switch
The traditional telephone system, mobile cellular communication, wireless local area networks, videoconferencing systems, a corporate Web site, intranets, and extranets are all components of __________.
the networking infrastructure for a large company
The Internet is the most universal and powerful __________.
wide area network
A __________ is a unique type of malware that replicates itself from one computer to another.
worm