ISYS exam #3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

offer fair transmission speeds for browsing the Web and online shopping, but are too slow for videos.

3G networks differ from 4G networks in that 3G networks __________.

provide more than enough capacity for watching high definition videos on smartphones

4G networks differ from 3G networks in that 4G networks

higher

4G networks have much _________ download and upload speeds when compared to 3G networks.

protocol

A ___________ is a set of rules that programs on two communicating devices follow.

analog signal

A(n) _______________ is a way to communicate in a network that is recognized by a continuous waveform.

specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application; classified as input controls, processing controls, and output controls.

Application controls

_________ is the ability to determine that a person is who he or she claims to be through a variety of means

Authentication

Gaining Access to a safety deposit box using iris scanning is an example of

Biometric Authentication

which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables?

Bluetooth

can only link up to 8 devices within a 10-meter area

Bluetooth differs from WiMax in that Bluetooth __________.

personal area networks (PANs)

Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small __________.

cable television lines that provide high-speed data transmission.

Cable Lines

______ is a serious problem for companies taking part in pay-to-click advertising

Click fraud

the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

Computer forensics

a system for automating fundamental business processes like marketing, sales, and support for interacting with the customer

Customer resource management

Someone hacking into your facebook account to add terrible photos and messages is taking part in _____

Cybervandalism

Which of the following examines files and sorts out low priority online material while assigning higher priority to business critical files?

Deep Packet Inspection

Which is not a security threat posed by mobile computing devices?

Dictating what kind of data an app can access inside its sandbox domain

a group of technologies providing high-capacity transmission over existing copper telephone lines; provide Internet connection by using the same lines as voice telephones, but they operate so that their signals do not interfere with voice telephone service.

Digital subscriber lines (DSL)

converts domain names to IP addresses

Domain Name System (DNS)

which single word below best describes Web 2.0?

Dynamic

these systems deal with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training. While advanced, they are not considered next-generation systems in and of themselves.

Employee relationship management systems

Which of the following is a critical function of senior management in an organization?

Establishing the security policy and managing risk

a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

Firewall

these controls govern the design, security and use of computer programs and the security of data files in general throughout the organizations information technology infrastructure

General controls

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be protected during storage and transmittal?

Gramm-Leach-Bliley Act

_____ requires that your patient records be protected and saved for six years

HIPAA

outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans.

HIPAA

the communication standard used to transfer pages on the Web. It defines how messages are formatted and transmitted

Hypertext transfer protocol (HTTP)

The _________ virus was one of the most famous malwares that was detected in 2000

ILOVEYOU

business processes and software tools for identifying the valid users of a system and controlling their access to system resources.

Identity management

router

If you wanted to have a wireless connectivity in your home or apartment, you would need a ___________ to move packets of data to you different devices.

an underground wireless Wi-Fi network

In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety?

is the four-part numeric address indicating a unique computer location on the Internet

Internet Protocol (IP) address

a commercial organization with a permanent connection to the Internet that sells temporary connections to subscribers.

Internet service provider (ISP)

A ______ is a type of spyware that records keystrokes to steal sensitive information such as SS numbers

Keylogger

network operating systems

Microsoft Windows Server and Linux are examples of

Which of the following is FALSE regarding public-key encryption?

On receiving this message, the recipient uses the public key to decrypt it

a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destinations.

Packet switching

If you receive an email asking for your SS number in return for millions of dollars, this is an example of ____

Phishing

involves setting up fake Web sites or sending email messages that look like those of legitimate businesses to ask users for confidential personal data; is a form of spoofing

Phishing

twister copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission

Physical transmission media

a set of rules and data structures for organizing communication. It plays a vital role in the manner in which data is presented to the user.

Protocol

a more secure form of encryption that uses two keys, one shared (or public) and one totally private. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

Public key encryption

technology that uses tiny tags with embedded microchips containing data about an item and its location to transmit short-distance radio signals to special readers that then pass the data on to a computer for processing.

Radio frequency identification (RFID)

_____ is an increasing problem where hackers lock parts of your computer and demand money to unlock it

Ransomware

determines the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. It is used to determine the cost/benefit of a control.

Risk assessment

Establishing a risk level of malware threats to an organization is an example of

Risk-Assessment

a communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address.

Router

which of the following TCP/IP application-layer protocols is used for email transmissions?

SMTP

attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company's systems and networks. Large Web applications have hundreds of places for inputting user data, each of which creates an opportunity for an SQL injection attack.

SQL injection attack

_________ Provides rules related to the creation of financial statements to help avoid fraud

Sarbanes-Oxley Act

used in areas where DSL and cable services are unavailable

Satellite Internet connections

a protocol used for encrypting data flowing over the Internet. S-HTTP is limited to individual messages.

Secure Hypertext Transfer Protocol (S-HTTP)

a method for encrypting network traffic that enables client and server computers to manage encryption and decryption activities as they communicate with each other during a secure Web session.

Secure Sockets Layers (SSL)

Tricking employees to reveal their passwords to be a legitimate member of a company is referred to as

Social Engineering

refers to a software that covertly gathers information about a user through an Internet connection without the user's knowledge.

Spyware

manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.

Supply chain execution systems

enable the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans.

Supply chain planning systems

requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.

The Gramm-Leach-Bliley Act

requires that controls are put in place to secure the corporate network, prevent unauthorized access to systems and data, and ensure data integrity and availability in the event of a disaster or other disruption of service. It also imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.

The Sarbanes-Oxley Act

Which of the following is NOT addressed by a business continuity plan?

The technical issues involved in keeping systems up and running

the networking infrastructure for a large company

The traditional telephone system, mobile cellular communication, wireless local area networks, videoconferencing systems, a corporate Web site, intranets, and extranets are all components of __________.

provides a universally agreed-upon method for breaking up digital messages into packets, routing them to the proper addresses, and then reassembling them into coherent messages

Transmission Control Protocol/Internet Protocol (TCP/IP)

Seems like a normal program, but does something completely unexpected

Trojan Horse

integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes.

Unified Communications

a secure connection between two points across the Internet to transmit corporate data. It provides a low-cost alternative to a private network.

Virtual Private Network (VPN)

delivers voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks. Although there are up front investments required for an IP phone system, VoIP can reduce communication and network management costs by 20 to 30 percent.

VoIP (Voice over IP)

GSM's strength is its international roaming capability

Which of the following is true of Global System for Mobile Communications (GSM)?

B

Which of the following statements about the business value of security and control is true? a) strong security and control decrease employee productivity and raise operational costs. b) information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability. c) HIPAA, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act, set standards for security privacy and control but they aren't strictly enforced. d) legal actions requiring electronic evidence and computer forensics are not yet in place.

The server sets the rules of communication for the network

Which of the following statements is true of client/server computing?

networks of interconnected wireless devices with built-in processing, storage, and radio frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces.

Wireless sensor networks (WSNs)

T1 and T3

__________ are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels.

Hubs

__________ are very simple devices that connect network components, sending a packet of data to all other connected devices.

a basic network

__________ consists only of computers, a connection medium, network operating system software, and either a hub or a switch.

Wireless sensor networks (WSNs)

__________ is/are valuable in areas such as monitoring environmental changes, monitoring traffic or military activity, protecting property, efficiently operating and managing machinery and vehicles, monitoring supply chain management, or detecting biological, chemical, or radiological material.

Wide Area Networks (WANs)

__________ span broad geographical distances—entire regions, states, continents, or the entire globe.

wide area network

a company needing a network to connect its offices in Montana, Idaho and Utah would require a

defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance.

acceptable use policy (AUP)

Electronic evidence on computer storage media that is not visible to the average user is called

ambient data

network

at its most basic level, a(n) ________ simply consists of two computers that are connected together.

determining the difference between the highest and lowest frequency on a channel

bandwidth is determined by

Taking over computers and directing those systems to overload a network is defined as an ________ attack

denial-of-service

hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network.

denial-of-service (DoS) attack

uses numerous computers to inundate and overwhelm the network from numerous launch points.

distributed denial-of-service (DDoS) attack

100 meters

if you are creating a network using twisted wire (CAT 5) wire, the cable shouldn't exceed

local area network

if you were building a network intended to service two buildings

a scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line.

just-in-time strategy

digital signal

network signals that are represented by on-off pulses indicate a(n)

when actual customer orders or purchases trigger events in the supply chain. Transactions produce and deliver only what customers have ordered and move up the supply chain from retailers to distributors to manufacturers and eventually to suppliers.

pull-based supply chain model

production master schedules are based on forecasts for best guesses of demand for products, and products are "pushed" to customers.

push-based model

statements ranking information risks, identifying acceptable security goals and identifying the mechanisms for achieving these goals.

security policy

Which of the following is FALSE regarding digital certification?

the CA verifies a digital certificate user's identity online

which of the following is FALSE about the Domain name service (DNS)?

the first name in the domain is the organization name

packet switching

the method of slicing digital messages into parcels, transmitting them along different communications paths, and reassembling them at their destination is called

which is the best definition of hertz?

the number of cycles per second that can be sent through a medium

analog signal

the signal from you iPod earphone is a(n)

the address of a specific resource on the Internet

uniform resource locator (URL)

IP helps to recover any packets that are lost or damaged during transmission

which of the following is FALSE about the TCP/IP protocol?


Kaugnay na mga set ng pag-aaral

EXAM FX Life Policy Provisions, Riders and Options

View Set

Chapter 68: Childhood Immunization

View Set