Combo with "IS 300 ch.6 Network" and 1 other
In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. b) Establishing the Internet connection between two computers. c) Moving packets over the network. d) Sequencing the transfer of packets across the network. e) Error checking
a) Disassembling and reassembling of packets during transmission.
Portals are an example of which network application? a) Discovery b) Collaboration c) Communications d) Web services e) None of these
a) Discovery
A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.
Answer: True
A local area network connects two or more communicating devices in a limited geographical area.
Answer: True
A major problem of the discovery applications of networks is the huge amount of information available.
Answer: True
A negative value for a student's grade point average is an example of a data integrity problem.
Answer: True
An Internet service provider is a company that offers Internet connections for a fee.
Answer: True
An attribute is any characteristic or quality that describes a particular entity.
Answer: True
An entity is a person, place, thing, or event about which information is maintained.
Answer: True
An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
Answer: True
Answer: True Voice recognition is an example of "something a user does" authentication.
Answer: True
Cable media use wires or cables to transmit data and information.
Answer: True
Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.
Answer: True
Commercial portals are intended for broad audiences and offer fairly routine content.
Answer: True
Currently, ATM networks operate only on fiber-optic cable.
Answer: True
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage.
Answer: True
Data marts are designed for the end-user needs in a strategic business unit or department.
Answer: True
Electronic mail is the largest-volume application running over the Internet.
Answer: True
Extranets offer limited accessibility to the intranets of participating companies.
Answer: True
Human errors cause more than half of the security-related problems in many organizations.
Answer: True
IT security is the responsibility of everyone in the organization.
Answer: True
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.
Answer: True
Increasing amounts of external data need to be considered in making organizational decisions.
Answer: True
Internet kiosks are computer terminals located in public places like libraries and airports.
Answer: True
Intranets support discovery, communication, and collaboration inside an organization.
Answer: True
Metasearch engines search several engines at once and integrate the findings of the various search engines.
Answer: True
Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
Answer: True
Online analytical processing (OLAP) involves the analysis of accumulated data by end users.
Answer: True
Organizations use authentication to establish privileges to systems operations.
Answer: True
Organizations utilize layers of controls because they face so many diverse threats to information security.
Answer: True
Public-key encryption uses two different keys, one public and one private.
Answer: True
Software can be copyrighted.
Answer: True
Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.
Answer: True
The Internet is a global network of computer networks.
Answer: True
The U.S. public telephone system was designed as an analog network to carry voice signals.
Answer: True
The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture.
Answer: True
The area located between two firewalls within an organization is called the demilitarized zone.
Answer: True
The best way to capture the data in an organized format is to use a database.
Answer: True
The computing skills necessary to be a hacker are decreasing.
Answer: True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
Answer: True
The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.
Answer: True
The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.
Answer: True
The rightmost part of an Internet name is the top-level specification, or the zone.
Answer: True
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Answer: True
Uniform resource locators (URLs) point to the address of a specific resource or site on the Web.
Answer: True
Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet.
Answer: True
You would be an instance of your university's STUDENT class.
Answer: True
Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery b) Communications c) Collaboration d) Web services e) None of these
a) Discovery
Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people b) Possible loss of fringe benefits c) Lower pay (in some cases) d) No workplace visibility e) Slower promotions
a) Fewer opportunities for housebound people
The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure.
a) They are organized by subject.
A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card
b) A standard set of rules and procedures for the control of communications in a network
_____ signals convey information in wave form, whereas _____ signals convey information in binary form. a) Analog, packet b) Analog, digital c) Digital, packet d) Digital, analog e) Packet, analog
b) Analog, digital
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
b) Asynchronous transfer mode
In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File.
b) Bit.
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems b) Client/server c) Peer-to-peer d) Centralized e) Mainframe-centric
b) Client/server
The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today.
b) Computer attack programs, called scripts, are available for download from the Internet.
24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports
b) Corporate databases
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence
b) Data inconsistency
Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence
b) Data integrity.
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web
b) Extranet
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database
b) Field
Refer to Opening Case - Cybercriminals Use Social Networks for Targeted Attacks: Cybercriminals use Facebook for all of the following reasons except: a) It is easy to get into the Facebook code itself. b) People trust messages from their Facebook friends. c) Social networks aren't closely regulated in corporate network defense systems. d) Many social network users aren't technology savvy and wouldn't realize their computer is under the control of outsiders. e) There is a black market for Facebook usernames and passwords
a) It is easy to get into the Facebook code itself.
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge
a) Knowledge, information
A(n) _____ connects two or more devices in a limited geographical area. a) Local area network b) Wide-area network c) Personal area network d) Enterprise network e) Value added network
a) Local area network
The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients
a) Modems
_____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields
a) Primary keys
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols b) Client/server architectures c) WANs d) Application software packages e) Developmental architectures
a) Protocols
Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated.
a) Providing information on each record.
A _____ sends messages through several connected LANs or to a wide-area network. a) Router b) Network interface card c) Bridge d) Gateway e) File server
a) Router
Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can't handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated.
a) The data is not reliable.
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. a) Access b) Physical c) Data security d) Administrative e) Input
a) Access
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. a) Alien software b) Virus c) Worm d) Back door e) Logic bomb
a) Alien software
A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database
a) Byte
_____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
a) Data isolation
The part of a network that handles the major traffic is the ________. a) Front end b) Network interface c) Multiplexer d) Backbone e) Front end processor
d) Backbone
Place the following members of the data hierarchy in their correct order: a) Bit - byte - field - record - database - file b) Bit - field - byte - record - file - database c) Byte - bit - record - field - database d) Bit - byte - field - record - file - database e) Bit - record - field - byte - file -- database
d) Bit - byte - field - record - file - database
_____ portals coordinate content within relatively narrow organizational and partners' communities. a) Publishing b) Personal c) Affinity d) Corporate e) Commercial
d) Corporate
_____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart
d) Data governance
_____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
d) Data redundancy
A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database
d) File
Which of the following statements concerning firewalls is not true? a) Firewalls prevent unauthorized Internet users from accessing private networks. b) Firewalls examine every message that enters or leaves an organization's network. c) Firewalls filter network traffic according to categories of activities that are likely to cause problems. d) Firewalls filter messages the same way as anti-malware systems do. e) Firewalls are sometimes located inside an organization's private network.
d) Firewalls filter messages the same way as anti-malware systems do.
A _____ connects dissimilar networks. a) Router b) Network interface card c) Bridge d) Gateway e) File server
d) Gateway
Which of the following is not a communications channel? a) Fiber-optic cable b) Satellite transmission c) Twisted-pair wire d) Integrated circuits e) Cellular radio
d) Integrated circuits
) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web
d) Intranet
_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management
d) Master data management
Consider this domain name, www.business.gsu.edu. The "business" is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster
d) Name of the specific computer
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. a) Zero-day b) Denial-of-service c) Distributed denial-of-service d) Phishing e) Brute force dictionary
d) Phishing
Refer to IT's About Business 4.4 - Information Security at City National Bank and Trust: Using the M86 Security software allowed City National Bank and Trust to do all of the following except: a) Apply policy-based standards for e-mail. b) Comply with Sarbanes-Oxley. c) Categorize Web sites and block questionable ones. d) Provide all employees with secure access to external e-mail. e) Prevent employees from downloading potentially dangerous files.
d) Provide all employees with secure access to external e-mail.
Which of the following is not a characteristic of twisted-pair wire? a) Inexpensive b) Easy to work with c) Subject to interference from other electrical sources d) Secure transmissions e) None of these
d) Secure transmissions
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. a) Tailgating b) Hacking c) Spoofing d) Social engineering e) Spamming
d) Social engineering
A VPN is a network within the organization.
Answer: False
A password refers to "something the user is."
Answer: False
An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
Answer: False
An organization's data warehouse generally maintains its operational data.
Answer: False
Cyberterrorism is usually carried out by nations.
Answer: False
Data rot refers to the quality of the data itself.
Answer: False
Digital signals are continuous waves that transmit information by altering the characteristics of the waves.
Answer: False
Digital signals have two parameters: frequency and amplitude.
Answer: False
Dumpster diving is always illegal because it involves trespassing on private property.
Answer: False
E-learning is conducted only in virtual classrooms, where all coursework is completed online.
Answer: False
Employees who telecommute have generally found that the experience enhances their careers.
Answer: False
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.
Answer: False
Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.
Answer: False
Having one backup of your business data is sufficient for security purposes.
Answer: False
In a data warehouse, existing data are constantly purged as new data come in.
Answer: False
Industrywide portals are intended for broad audiences and offer fairly routine content.
Answer: False
It is easy to manage all the data coming into an organization.
Answer: False
It is important for applications and data to be dependent on each other.
Answer: False
Master data are generated and captured by operational systems.
Answer: False
Risk analysis involves determining whether security programs are working.
Answer: False
Supervisory control and data acquisition (SCADA) systems require human data input.
Answer: False
Systems that use digital subscriber lines (DSL) do not require modems.
Answer: False
Tacit knowledge is the more objective, rational, and technical types of knowledge.
Answer: False
The network interface card typically houses the LAN's network operating system.
Answer: False
The quality of automatic translation of Web pages is usually just as good as human translation.
Answer: False
The relational database model is based on the concept of three-dimensional tables.
Answer: False
The secondary key is a field that identifies a record with complete uniqueness.
Answer: False
The security of each computer on the Internet is independent of the security of all other computers on the Internet.
Answer: False
Twisted-pair wire is the least-used form of communications wiring.
Answer: False
Uniform resource locators (URLs) are software applications through which users access the Web.
Answer: False
When data are normalized, attributes in the table depend on the primary key and any secondary keys.
Answer: False
Wide-area networks have a large capacity, and they typically use a single communications channel.
Answer: False
With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call.
Answer: False
Zero-day attacks use deceptive e-mails to acquire sensitive personal information.
Answer: False
A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security.
Answer: True
All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. b) They have large capacity. c) They cover large geographical areas. d) They combine multiple communications channels. e) The Internet is an example of a wide-area network.
a) They are provided by individual companies.
Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate
a) They cost less
Consider this domain name, www.business.gsu.edu. The "edu" is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster
a) Top-level domain
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases
a) Transaction data, master data
_____ are segments of computer code that attach to existing computer programs and perform malicious acts. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs
a) Viruses
With _____, phone calls are treated as just another kind of data. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat
a) Voice over IP
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file.
a) attribute.
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship
a) instance
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers
a) keyloggers, screen scrapers
Unintentional threats to information systems include all of the following except: a) malicious software b) tailgating c) power outage d) lack of user experience e) tornados
a) malicious software
Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous
a) objective
Biometrics are an example of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows
a) something the user is.
Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines.
a) to process transactions faster.
An information system's _____ is the possibility that the system will be harmed by a threat. a) vulnerability b) risk c) control d) danger e) compromise
a) vulnerability
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. a) whitelisting, blacklisting b) whitelisting, encryption c) encryption, whitelisting d) encryption, blacklisting e) blacklisting, whitelisting
a) whitelisting, blacklisting
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining
b) Knowledge management
Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster
b) Name of the organization
A _____ allows a device to physically connect to a local area network's communications medium. a) File server b) Network interface card c) Network operating system d) Communications channel e) Gateway
b) Network interface card
_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis
b) Normalization
With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat
b) Plain old telephone service
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. a) Risk management b) Risk analysis c) Risk mitigation d) Risk acceptance e) Risk transference
b) Risk analysis
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys
b) Secondary keys
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? a) Spyware b) Spamware c) Adware d) Viruses e) Worms
b) Spamware
Which of the following enables users to send data across sometimes unreliable networks? a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network
b) TCP/IP
The newest type of videoconferencing technology is ________. a) Teleconferencing b) Telepresence c) Work group analysis software d) Workflow software e) Groupware
b) Telepresence
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? a) The message could be an industrial espionage attack. b) The message could be a phishing attack. c) The message could be a denial of service attack. d) The message could be a back door attack. e) The message could be a Trojan horse attack.
b) The message could be a phishing attack.
Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization's databases. e) Data across their organizations are generally consistent.
b) They are responding to federal regulations
The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient.
b) They make best practices available to employees.
You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? a) The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines. c) You can back up sensitive data to a thumb drive so you can take them home to work with. d) The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. e) The document permits you to lend your laptop to your brother for the weekend.
b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.
Access controls involve _____ before _____. a) biometrics, signature recognition b) authentication, authorization c) iris scanning, voice recognition d) strong passwords, biometrics e) authorization, authentication
b) authentication, authorization
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural
b) explicit
The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing.
b) extracting, transforming, and loading.
Employees in which functional areas of the organization pose particularly grave threats to information security? a) human resources, finance b) human resources, management information systems c) finance, marketing d) operations management, management information systems e) finance, management information systems
b) human resources, management information systems
A _____ is a document that grants the holder exclusive rights on an invention for 20 years. a) copyright b) patent c) trade secret d) knowledge base e) private property notice
b) patent
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key. a) public, public b) public, private c) private, private d) private, public e) none of these
b) public, private
In a relational database, every row represents a(n) _____. a) file b) record c) attribute d) primary key e) secondary key
b) record
Which of the following is not an example of a weak password? a) IloveIT b) 08141990 c) 9AmGt/* d) Rainer e) InformationSecurity
c) 9AmGt/*
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? a) A cold site has no equipment. b) A warm site has no user workstations. c) A hot site needs to be located close to the organization's offices. d) A hot site duplicates all of the organization's resources. e) A warm site does not include actual applications.
c) A hot site needs to be located close to the organization's offices.
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following? a) Copyrighted material b) Patented material c) A trade secret d) A knowledge base e) Public property
c) A trade secret
_____ portals support communities such as hobby groups or political parties. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial
c) Affinity
The cost of a stolen laptop includes all of the following except: a) Loss of intellectual property b) Loss of data c) Backup costs d) Loss of productivity e) Replacement cost
c) Backup costs
Which of the following is not a component of a local area network? a) File server b) Client computers c) Bridge d) Network interface cards e) All of these
c) Bridge
Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery b) Communications c) Collaboration d) Web services e) None of these
c) Collaboration
_____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks b) Digital subscriber lines c) Communications channels d) Integrated circuits e) Communications processors
c) Communications channels
_____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
c) Data consistency
Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both "decisions about hardware" and "decisions about software." e) All of these have an equal impact.
c) Decisions about data.
The cable medium with the highest bandwidth is: a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable
c) Fiber-optic cable
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web
c) Internet
Which of the following statements is false? a) Credit card companies usually block stolen credit cards rather than prosecute. b) People tend to shortcut security procedures because the procedures are inconvenient. c) It is easy to assess the value of a hypothetical attack. d) The online commerce industry isn't willing to install safeguards on credit card transactions. e) The cost of preventing computer crimes can be very high.
c) It is easy to assess the value of a hypothetical attack
Refer to IT's About Business 4.2 - Virus Attack Hits the University of Exeter. Which of the following statements about the virus attack is true? a) The attack was confined to the Exeter campus. b) Telephone service was not disrupted. c) It took three days to clean infected computers and bring the network back into operation. d) Only the PCs owned by the University had to be scanned. e) The attack did not affect the professors' ability to run their classes.
c) It took three days to clean infected computers and bring the network back into operation.
Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch b) Electromagnetic switch c) Laser d) Multiplexer e) Optical modem
c) Laser
Internet service providers connect to one another through _____. a) Internet connection points b) Common carrier connection points c) Network access points d) Network connection points e) An extranet
c) Network access points
Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. b) Packets are routed through different paths. c) Packets require dedicated circuits. d) Packets use TCP/IP to carry their data. e) Packets contain destination addressing. Answer: c
c) Packets require dedicated circuits
Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization.
c) Rapid technological changes ensure that controls are effective for years.
A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database
c) Record
Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
c) Synchronous optical network
In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing
c) Telepresence
Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address
c) URL address
The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users
c) are not updated.
) Rank the following in terms of dollar value of the crime, from highest to lowest. a) robbery - white collar crime - cybercrime b) white collar crime - extortion - robbery c) cybercrime - white collar crime - robbery d) cybercrime - robbery - white collar crime e) white collar crime - burglary - robbery
c) cybercrime - white collar crime - robbery
) In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was: a) weak passwords. b) unattended computers. c) employee negligence. d) contract labor, such as consultants. e) poor antivirus software
c) employee negligence.
A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database
c) interface between applications and a database
When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record
c) primary key
In _____, the organization takes concrete actions against risks. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference
c) risk mitigation
A _____ is intellectual work that is known only to a company and is not based on public information. a) copyright b) patent c) trade secret d) knowledge base e) private property
c) trade secret
Dumpster diving is: a) always illegal because it is considered trespassing. b) never illegal because it is not considered trespassing. c) typically committed for the purpose of identity theft. d) always illegal because individuals own the material in the dumpster. e) always legal because the dumpster is not owned by private citizens
c) typically committed for the purpose of identity theft.
Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical
c) unstructured
Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
d) T-carrier system
Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site should be an almost exact replica of the IT configuration at headquarters. e) The site will not have up-to-date data.
d) The site should be an almost exact replica of the IT configuration at headquarters.
Skype is an example of _______. a) Teleconference b) Telepresence c) Plain old telephone service d) Voice over IP e) Videoconference
d) Voice over IP
In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files
d) columns
The most overlooked people in information security are: a) consultants and temporary hires. b) secretaries and consultants. c) contract laborers and executive assistants. d) janitors and guards. e) executives and executive secretaries.
d) janitors and guards.
Which of the following factors is not increasing the threats to information security? a) smaller computing devices b) downstream liability c) the Internet d) limited storage capacity on portable devices e) due diligence
d) limited storage capacity on portable devices
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many
d) many-to-many
A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language
d) structured query language
A _____ is any danger to which an information resource may be exposed. a) vulnerability b) risk c) control d) threat e) compromise
d) threat
In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute
d) uniquely identify a record
) Which of the following is not a consequence of poor information security practices? a) Stolen information b) Stolen identities c) Financial loss d) Loss of service e) All of the above are consequences of poor information security practices.
e) All of the above are consequences of poor information security practices
Which of the following is not a strategy for mitigating the risk of threats against information? a) Continue operating with no controls and absorb any damages that occur b) Transfer the risk by purchasing insurance. c) Implement controls that minimize the impact of the threat d) Install controls that block the risk. e) All of the above are strategies for mitigating risk.
e) All of the above are strategies for mitigating risk.
Cybercriminals can obtain the information they need in order to assume another person's identity by: a) Infiltrating an organization that stores large amounts of personal information. b) Phishing. c) Hacking into a corporate database. d) Stealing mail. e) All of the above are strategies to obtain information to assume another person's identity.
e) All of the above are strategies to obtain information to assume another person's identity.
Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both "They enable faster program development." and "They make it easier to modify data and information." e) All of these
e) All of these
Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs b) To free up time for busy managers c) To improve profitability d) To offer customers self-service opportunities e) All of these
e) All of these
Networks enable which of the following applications? a) Discovery b) Communications c) Collaboration d) Web services e) All of these
e) All of these
The benefits of e-learning include which of the following? a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of these
e) All of these
The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these
e) All of these
Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these
e) All of these
Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time.
e) All of these are reasons why managing data is difficult over time.
Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All these
e) All these
_____ refers to the range of frequencies available in any communications channel. a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth
e) Bandwidth
Refer to IT's About Business 5.2 - Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All of these e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
_____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial
e) Commercial
_____ are Internet access points that are located in public places, such as libraries and airports. a) Clients b) Servers c) Internet access computers d) Network computer e) Internet kiosks
e) Internet kiosks
Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies.
e) It is not yet a major consideration for most companies
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs
e) Logic bombs
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs
e) Logic bombs
In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week
e) Product, store, and week
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching b) Collaboration c) Packet switching d) Torrents e) Swarming
e) Swarming
Refer to Opening Case - The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. b) Under current models, the investment required to meet future demand exceeds projected revenue growth. c) Net neutrality might hinder U.S. competitiveness. d) Network providers could censor certain content by slowing down or blocking access. e) Telecommunications and cable companies are in favor of net neutrality.
e) Telecommunications and cable companies are in favor of net neutrality.
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? a) The name of the company b) Your last name c) Your birthdate d) Your initials (capitalized) and the number of the floor you are on e) The name of the company spelled backward
e) The name of the company spelled backward
Refer to IT's About Business 4.3 - The Stuxnet Worm: Which of the following statements is true? a) The worm targeted large data warehouses. b) The worm was fairly simplistic. c) The worm spread from Iran to other countries. d) The worm probably only took a month to build. e) The worm specifically targeted nuclear facilities
e) The worm specifically targeted nuclear facilities
Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember
e) They tend to be short so they are easy to remember
Applications offered by the Internet2 include which of the following? a) remote diagnosis b) digital libraries c) distance education d) virtual laboratories e) all of these
e) all of these
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. a) phishing b) zero-day c) worm d) back door e) distributed denial-of-service
e) distributed denial-of-service
In _____, the organization purchases insurance as a means to compensate for any loss. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference
e) risk transference
Voice and signature recognition are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does
e) something the user does
Passwords and passphrases are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does.
e) something the user does.
An organization's e-mail policy has the least impact on which of the following software attacks? a) virus b) worm c) phishing e) zero-day e) spear phishing
e) zero-day