MGMT 3300 Exam 3
An incident response plan is created for the purpose of__________.
Avoiding chaos and missteps
According to Jon Ronson, what could lead to twitters downfall?
Its power to cause destruction of individuals
Sometimes the meta-data of a social media post is more important than the post itself. For example a tweet may have ______ bits of meta-data that a machine learning algorithm can analyze and use to predict behavior.
4-5
What is a blockchain?
A distributed ledger on a peer to peer network
On microblogging sites, a hashtag is used to indicate _______.
A set of posts on a similar topic
Which of the following is not an example of how room-based videoconferencing can be utilized: -Telepsychiatry -Telemedicine -Distance education -All of the above
All of the above
A zero day exploit is:
Any exploit that is unknown to the maker of the software
Why is social media so engaging?
Because most interfaces for social media provide an experience that leads to a dopamine release
The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.
Botnet
The _______ of Mizzou was involved in facilitating the switch from Blackboard to Canvas
CIO
What is a miner?
Computers that validate and process blockchain transactions
Which of the following performs functions similar to the presence awareness feature found in IM software: -A hashtag -A mashup -Context indicator -Augmented reality
Context indicator
According to the article "Kill the password", what is one major trade off that every security framework needs to make?
Convinience
Which of the following functions do wikis perform within an organization: -Creating a substantial base of knowledge -Creating interactive discussions between employees and clients -Creating telepresence between employees working across the globe -Establishing communication between members of a team through instant text messaging
Creating a substantial base of knowledge
What was Scott Gallaway's main response to his student's email?
DID NOT HAVE A RIGHT ANSWER
Which of the following is a drawback of cloud computing: -Data protection laws are not uniform across countries -Resources are difficult to share because information is maintained on a protected server -It delivers computing as a product rather than a service -It provides computation that requires end-user knowledge of the physical location and configuration of the system that delivers services
Data protection laws are not uniform across countries
In 2017, Pakistan became the first nation to sentence someone to ________ for online speech after a member of the Shia minority got in Facebook argument with a government official posting as someone else
Death
Arthur, a salesperson in a leading apparel store, is very courteous and friendly with customers who visit the store. However, while interacting with customers through emails, he tends to be rather blunt and aggressive, which has led to a couple of complaints being lodged against him. Which of the following does the scenario illustrate? -Augmented reality -Disinhibition -Telepresence -Virtual reality
Disinhibition
After leaking all the confidential files that Professor Christianson has amassed about his students, he will board the first flight to _______________ since they have no agreements to extradite with the US.
Ecuador
______ is the process which transforms data using mathematical formulas, so that no-one can read the data, unless they know the keys to unscramble it.
Encryption
What is the step involved in risk management after vulnerabilities of an organization have been examined?
Evaluation of controls that fill in security gaps
What is one difference between an incremental mindset and an exponential market?
Exponential mindset is to make something different while the incremental mindset is to make something better
According to the article "Kill the password", which of these is NOT a way that our online passwords fall: -Failed from in-person peeking -Stolen with a keylogger -Lifted from a password dump -Cracked by brute force
Failed from in-person peeking
Biometric identifiers refer to something the users know, such as user ID, password, PIN, or to answer a security question.
False
Media richness measures how well a communication medium can generate revenues.
False
Slack allows you to manage social media accounts from different platforms simultaneously.
False
The exponential mindset helps to grow input faster than output.
False
TikTock is not a good example of an application that utilizes the network effect.
False
True or False: copyrights are forever
False
True or False: copyrights can only be enforced if the work has the © symbol & states "Copyright 2014 by so and so"
False
Using fake names, nicknames, free email, and public computers ensures that one is perfectly anonymous on the internet.
False
Wiki software requires users to know HTML in order to add or edit web pages.
False
The term _______ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.
Honeypots
Which of these is not a type of threat to information security: -Ransomware -Hunting -Walware -Phising
Hunting
Which of the following is true of asynchronous discussion forums: -They help users to communicate via interactive video chat. -They do not allow users to post anonymously, thus enhancing safety for users -They are never moderated, thus enabling users to post freely -They allow users to post text messages and reply to others at any time
IDKKKKK BUT NOT THE TOP ONEEEEE
Organizations use a(n) __________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.
Incident response plan
_______ also known as "chat", consists of real-time text-based interactions over a network.
Instant messaging
Which of the following is a function of unified communication: -Integrating multiple applications and communication channels into a single interface -Enabling a company to communicate with all its customers at the same time -Collecting and storing data from multiple users and building a database -Maintaining a record of individual changes made on shared documents through version control
Integrating multiple applications and communication channels into a single interface
Which of the following are used to combat spam: -Intrusion prevention systems -Conversational programming systems -Expert systems -Executive information systems
Intrusion prevention systems
Which of the following is a primary function of wikipedia: -It allows users to add and edit interlinked web pages -It allows users to join online groups in order to buy a particular item -It allows users to communicate through instant messaging and electronic mail -It allows users to interact synchronously and make decisions together
It allows users to add and edit interlinked web pages
What is the purpose of the "presence awareness" feature on instant messaging software?
It allows users to display their current status to their contacts, colleagues, or buddy list
Which of the following is a drawback from wikipedia: -It has an open structure which allows scope for inaccuracy and bias -It has a complicated navigation system that makes it difficult for users to operate -It cannot be accessed without an ID and a password -It features an overload of ads which takes focus away from credible content
It has an open structure which allows scope for inaccuracy and bias
According to Jon Ronson, what happened to twitter over the course of its existence?
It has turned into a place where "the hunt is on for shameful secrets"
Which of the following is true of phishing? -It involves the use of several thousand computers to launch malicious attacks that can cripple websites. -It is useful in monitoring web traffic into and out of an unsecured computer network -It is the process of stealing personal data from a victim by convincing him to disclose information -It uses small pieces of code inserted into a browser that track an internet user's activity and transmit the data to third parties
It is the process of stealing personal data from a victim by convincing him to disclose information
Which of the following is true of a vCard: -It must be scanned and saved in a contact management system before use -It requires the use of optical character recognition software for accessing business card details -It is used to exchange business card information electronically -It relies on the XML family of standards to represent metadata
It is used to exchange business card information electronically
Which of the following is a feature of a public key encryption: -It uses a single point key to encrypt and decrypt data -It uses a pair of keys, one to encrypt the data and the other to decrypt data -It uses multiple number of keys accessible to all members of an organization -It uses a duplication process to replicate keys
It uses a pair of keys, one to encrypt the data and the other to decrypt the data
Which of the following is potentially a negative impact of surveillance in online communications: -Increased levels of confidentiality -Lowered productivity of employees -Increased pressure on corporate email systems -Compromised company security
Lowered productive of employees
Which of these is NOT a way to make passwords more secure: -Making it something easy to guess -Avoid real words -Mix different character types -Do not include personal info
Making it something easy to guess
Botnets function with the use of ________
Malware
What applies to communication methods: -Method matches audience -Method matches madness -Form follows fleet -Form follows audience
Method matches audience
The term _____ refers to a set of formats that rely on the XML family of standards to represent metadata in HTML code.
Microformat
According to the article "Kill the password", what is the main reason that overseas syndicates are looking to steal passwords?
Money
Which of the following is true of group dynamics in virtual teams: -One important aspect of disinhibition is the avoidance of self-disclosure -The online world creates a sense of hierarchy and inequality in status -Disinhibition refers to a situation where people express themselves less bluntly while online. -Norms regarding the sharing of workload are difficult to enforce online
Norms regarding the sharing of workload are difficult to enforce online
The goal of machine learning is to develop a _________ engine for a particular use case.
Prediction
Which of the following pairs performs similar functions in the online world: -vCards and HTML -Virtual reality and Hashtags -Microblogging and hCards -Presence awareness and Context indicators
Presence awareness and Context indicators
Which of these is NOT a key to virality according to Scott Galloway: -Recency -Authenticity -Humor -Controversy
Recency
Which one of these is not an aspect of privacy: -Right to destroy personal information -Right to anonymity -Right to be left alone -Right against intrusion
Right to destroy personal information
A(n) _________ lists out and rates the vulnerability of an organization.
Risk matrix
A _______ is an area on a server in which team members can post documents, maintain membership lists, feature news and announcements, and collaborate on edits and updates.
Shared workspace
Which of the following mail protocols is commonly used to handle outgoing mail from users: -Post office protocol -Simple mail transfer protocol -Quick mail queuing protocol -Internet message access protocol
Simple mail transfer protocol
_________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
Social engineering
Which of these is NOT a synchronous method of communication (pick the best one): -Instant messaging -Telepresence -Web conferencing -Social networks
Social networks
Which of these is NOT a step in an incident response plan: -Identify the threat -Determine the cause -Recover the systems -Spread the damage
Spread the damage
Which of the following provisions does the Gramm-Leach-Bliley Act make: -Limiting the disclosure of personally identifiable information that is maintained by state departments of motor vehicles -Stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies -Prohibiting businesses from sending misleading or deceptive commercial emails but denying recipients any legal recourse on their own -Establishing provisions to protect the privacy and security of individually identifiable health information
Stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies
Which of the following stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually: -The Gramm-Leach-Bliley Act -The Privacy Act of 1974 -The CAN-SPAM Act -The State Security Breach Notification Laws
The Gramm-Leach-Bliley Act
Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies: -The CAN-SPAM Act -The Privacy Act of 1974 -The State Security Breach Notification Laws -The Gramm-Leach-Bliley Act
The Privacy Act of 1974
Which of the following is a software tool that allows synchronous collaboration and allows online meetings via the internet: -Microblogging -Emailing -Web conferencing -Instant messaging
Web conferencing
Which of the following is an example of a browser-based software tool that allows web conferences and webinars? -Excel -Tumblr -WebEx -Worldweb
WebEx
What is the function of microformats like the hCard?
The electronic exchange of business card info
Which of the following is true of public key encryption: -The private key is used for encryption and is known only to the sender, while the public key is freely distributed among everyone and is used for decryption -The public key encryption scheme uses a single key to encrypt data that can later be decrypted by using the encrypted data as the key -The encryption formulas used for creating the keys are simple in nature and identical at both ends -The encryption key is widely shared with everyone, while the decryption key is known only to the recipient
The encryption key is widely shared with everyone, while the deception key is known only to the recipient
Which of the following administrative control actions help enforce approved authorizations for access to systems in an organization: -The organization requires appropriate approvals for requests to establish accounts -The organization defines the security policy that determines what events require human review -The organization defines the information to be encrypted or stored offline in a secured location -The organization separates duties of individuals as necessary to prevent malevolent activity without collusion
The organization defines the information to be encrypted or stored offline in a secured location
Which of the following is true of microformats: -They can store all types of data, except metadata -They cannot be emailed or exchanged over Bluetooth -They can be exchanged over wired networks, but not wireless -The rely on XML standards to represent metadata in HTML
They rely on XML standards to represent metadata in HTML
Which of the following principles is consistent with the natural laws and rights ethical framework: -First, do no harm -Thou shall not kill -The greatest good for the greatest number -The needs of the many outweigh the needs of the few
Thou shall not kill
A blockchain ledger is immutable (entries can't be changed once entered).
True
A cognitive obstacle to strong passwords is the limited capacity of human memory.
True
All machine learning is AI but not all AI is machine learning.
True
Asynchronous communication methods are generally cheaper than synchronous communication methods.
True
Dopamine is the chemical in your brain that is triggered when using social media.
True
GitHub is a website, recently acquired by Microsoft, that allows its users to share strings of code.
True
Smart contacts can be build on blockchain.
True
Some teams have incorrect expectations, which can lead them to abandon the exponential path too soon.
True
The downside of using surveillance techniques at work is that it pits management against staff.
True
The online world tends to flatten out hierarchies and equalize status.
True
The virtual world is a 3D environment in which users can immerse themselves interacting with virtual objects and one another using avatars.
True
To determine if a Hash is correct, the computers on a blockchain network will vote until 51% of them agree on the correct answer
True
True or False: Tattoos can be copyrighted by the artist
True
Adversarial AI is a field devoted to:
Understanding where AI can fail or be fooled
Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches: -Evaluating controls and filling in security gaps -Recovering existing assets from damage -Predicting future risks and devising strategies to prevent them -Understanding which information assets need protection
Understanding which information assets need protection
Jennifer, a client services manager in an advertising agency, is on vacation. Her smartphone lets her clients and subordinates know that she is available for hands-free cell-phone conversations at certain times of a day, and at other times communicates that she is available for IM or videoconferencing, depending on her activities at the vacation spot. Which of the following technologies is Jennifer's system using? -Enterprise resource planning -Customer relationship management -Integrated marketing communications -Unified communications
Unified communications
_________ integrates multiple applications and interactive channels into a single interface, accessible from many different devices
Unified communications
A ______ provides quick access to context indicators, email, secure instant messaging, voice and video calling, conference calling, corporate RSS feed, and more.
Universal dashboard
During the 2016 turmoil in Turkey President Erdogan:
Used social media to jail his opposition
Microsoft's Sharepoint includes features for ________, which ensures that older copies of documents are maintained and no changes are lost.
Version control
_______ describes what people experience when some of their sensory input is not from the real world, but from a computer-generated one.
Virtual reality
A graphical, often 3D environment in which users can immerse themselves interacting with virtual objects and one another using avatars is known as a _________.
Virtual world
Which of the following is a technology that facilitates end-user contributions and allows collaborative editing by allowing users to add and edit interlinked web pages
Wiki
________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information.
Wikipedia
Which of the following applications is not utilized to form virtual teams: -Sococo -Zello -Slack -Skype
Zello
Which of the following is a file format used to exchange contact management data electronically: -.ics -icalendar -.exe -hCard
hCard
The .ics extension indicates that a plain text file contains _______ code.
iCalender
