Finals MNGT

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. All customers purchased products that cost $100, that were marked up 100 percent. What is the actual amount of revenue earned per customer, taking into account materials and promotional costs?

-$6.00

What if any difference is there between a Trojan horse and a regular computer virus?

A Trojan horse does not self-replicate.

An organization learns from a social media site that less than 10 percent of users who visit their page engage with the video that is pinned to the top. This is an example of what type of information?

Customer interaction

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Power BI

Using the correct syntax allows the user to extract data from multiple fields found in data tables. In order to extract information from multiple tables, the ______ command is used to indicate multiple fields in conjunction with FROM and WHERE to narrow the search and get specific results.

SELECT

Which is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link.

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

spyware's basic function is to

capture the user's account data, passwords, keystrokes, and more.

A social media information system (SMIS) should be designed to gather and analyze social media data because

company can use platforms' data about its activities and audience to improve its social media strategies and business decisions.

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

According to the National Institute of Standards Technology (NIST), the PR function of the framework involves public relations in the form of communications between organizations and their stakeholders, specifically after a cybersecurity event.

false

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users.

account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?

man in the middle

Setting social media metrics is the second step in creating a social media information system (SMIS) because

metrics are needed to quantify the organization's progress toward achieving its social media goals.

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

orginization understanding how to manage cyber

Social Media Information System (SMIS) is composed for 3 parts

people, data and procedures, and hardware and software.

Software used by social media information systems websites include

programs that analyze data

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

protect

Which NIST Cybersecurity Framework function involves correcting an organization's cybersecurity plans due to a cybersecurity event?

recover (RC) function

Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?

recover (RC) function

In order to be considered open data, databases must provide access rights so that they can be

redistributed

phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

Suppose you are a company whose target market is identified as homeowners who live in suburban regions of the American Midwest. From the list below, choose the product you are most likely selling

snow blowers

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market

socail media

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's

syntax

A benign Internet robot that gathers data is called a(n)

web crawler

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.

worm


Kaugnay na mga set ng pag-aaral

Economics: Chapter 4- Consumer and Producer Surplus

View Set

Unit 2: Demand, Supply & Equilibrium

View Set

Chp. 11 Innate and Adaptive Immunity

View Set

MENTAL HEALTH: CHAPTER 20: EATING DISORDERS:

View Set

Ch. 36 Management of Patients with Musculoskeletal Disorders

View Set

Purchasing and Buyer Behavior: Exam 2: Ch 8

View Set

Business Law Ch. 11 - Consideration and Promissory Estoppel

View Set