Concepts assignment 2
Amazon, Kamatera, Salesforce, and Google are all examples of
Cloud Service Providers
How does VPN software ensure that people accessing a network are authorized to do so?
VPN software authenticates users.
Why would a vendor agreement be a disadvantage of cloud computing?
Vendor agreements make it difficult to switch services.
An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?
Wide Area Network (WAN)
Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?
a "backbone" of connected hardware and a suite of Internet protocol software
A Trojan horse succeeds through
deceptive access
The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.
effective interest rate
Time Value of Money (TVM) is one of the most basic fundamentals in __________.
finance
Excel functions can be found under which tab?
formulas
The main advantage of the IPv6 format for IP addresses is that
it can accommodate many more addresses than the IPv4 format.
An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if
it contains a link to a free offer that seems too good to be true.
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency
E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.
ubiquity
The total amount a series of payments is worth now is called the __________.
PV (Present Value)
Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?
attempting to exploit flaws from the outside, simulating attacks that a hacker would try
What is a key advanced technology behind CRM analytics?
online analytical processing
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to
view, edit, and add shared information in real time, from anywhere.
Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?
viruses
Share of customer, which focuses on getting as much business as possible from fewer customers, is also known as share of
wallet
It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?
web planning
On an e-commerce presence map, what is presence?
websites, email, social media sites, and offline media
What is one of the greatest risks of an organization storing customer data?
Data breaches
Which CRM-compatible sales prospecting tool utilizes the profiles and connections on a social media platform to generate prospects?
LinkedIn Sales Navigator
Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.
Location-based services (LBS)
Why are probable loss calculations important?
Organizations have limited funds to use toward system protections.
The __________ calculates the payment for a loan based on constant payments and a constant interest rate.
PMT
__________ is widely used in finance in the stock valuation, bond pricing, and financial modeling.
PV (Present Value)
Which threat to cybersecurity can only come from outside an organization?
Ransomware
Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?
Standardized Data Collection Processes
What is a cybersecurity threat?
an event or condition that can lead to IT asset loss and the negative consequences of such loss
An __________ is a contract between an individual and a company in which you make a lump sum payment or series of payments and, in return, receive regular disbursements beginning either immediately or more commonly at some point in the future.
annuity
If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its
software
To calculate an organization's customer equity (CE) value we first determine
the future lifetime revenue the organization's customers will generate.
The concept of "share of customer" focuses on getting
the most business from the fewest customers.
Future Value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money into an account or __________ money in a financial instrument that pays interest.
to invest
What is the main purpose of content delivery networks (CDNs)?
to minimize the distance between website users and website servers
What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?
to protect
M-commerce is a subset of
traditional e-commerce
Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?
type of presence
The abbreviation for Future Value is (___).
FV
Which is the best definition of a cybersecurity exploit?
It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.
Social engineering is used to target people whom
are not cautious about giving out confidential or sensitive information.
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
PMT is the Excel function for __________.
payment
An interest rate (or rate) is usually stated as a __________.
percentage
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?
respond function
Payment can be made in the form of funds, assets, or __________.
services
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.
Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?
DDOS attacks
What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?
Different engagement is needed to turn each type of lead into a customer.
What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?
B2G transactions involve prenegotiated contracts.
How is quantitative data about a customer most accurately characterized?
as a record of how a customer interacts with a business
Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?
bitcoin cash
How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?
by revealing whether their marketing efforts are effective or require changes
A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?
cloud services security
Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?
cloud-based forums, messaging, and meeting apps
A computer network must be connected to the Internet to support
communicating via email with people on other networks.
It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the last phase in a well-designed strategy?
mobile platform planning and implementation
A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?
Trello
In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with
disaster recovery