ISYS exam #3
offer fair transmission speeds for browsing the Web and online shopping, but are too slow for videos.
3G networks differ from 4G networks in that 3G networks __________.
provide more than enough capacity for watching high definition videos on smartphones
4G networks differ from 3G networks in that 4G networks
higher
4G networks have much _________ download and upload speeds when compared to 3G networks.
protocol
A ___________ is a set of rules that programs on two communicating devices follow.
analog signal
A(n) _______________ is a way to communicate in a network that is recognized by a continuous waveform.
specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application; classified as input controls, processing controls, and output controls.
Application controls
_________ is the ability to determine that a person is who he or she claims to be through a variety of means
Authentication
Gaining Access to a safety deposit box using iris scanning is an example of
Biometric Authentication
which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables?
Bluetooth
can only link up to 8 devices within a 10-meter area
Bluetooth differs from WiMax in that Bluetooth __________.
personal area networks (PANs)
Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small __________.
cable television lines that provide high-speed data transmission.
Cable Lines
______ is a serious problem for companies taking part in pay-to-click advertising
Click fraud
the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
Computer forensics
a system for automating fundamental business processes like marketing, sales, and support for interacting with the customer
Customer resource management
Someone hacking into your facebook account to add terrible photos and messages is taking part in _____
Cybervandalism
Which of the following examines files and sorts out low priority online material while assigning higher priority to business critical files?
Deep Packet Inspection
Which is not a security threat posed by mobile computing devices?
Dictating what kind of data an app can access inside its sandbox domain
a group of technologies providing high-capacity transmission over existing copper telephone lines; provide Internet connection by using the same lines as voice telephones, but they operate so that their signals do not interfere with voice telephone service.
Digital subscriber lines (DSL)
converts domain names to IP addresses
Domain Name System (DNS)
which single word below best describes Web 2.0?
Dynamic
these systems deal with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training. While advanced, they are not considered next-generation systems in and of themselves.
Employee relationship management systems
Which of the following is a critical function of senior management in an organization?
Establishing the security policy and managing risk
a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
Firewall
these controls govern the design, security and use of computer programs and the security of data files in general throughout the organizations information technology infrastructure
General controls
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be protected during storage and transmittal?
Gramm-Leach-Bliley Act
_____ requires that your patient records be protected and saved for six years
HIPAA
outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans.
HIPAA
the communication standard used to transfer pages on the Web. It defines how messages are formatted and transmitted
Hypertext transfer protocol (HTTP)
The _________ virus was one of the most famous malwares that was detected in 2000
ILOVEYOU
business processes and software tools for identifying the valid users of a system and controlling their access to system resources.
Identity management
router
If you wanted to have a wireless connectivity in your home or apartment, you would need a ___________ to move packets of data to you different devices.
an underground wireless Wi-Fi network
In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety?
is the four-part numeric address indicating a unique computer location on the Internet
Internet Protocol (IP) address
a commercial organization with a permanent connection to the Internet that sells temporary connections to subscribers.
Internet service provider (ISP)
A ______ is a type of spyware that records keystrokes to steal sensitive information such as SS numbers
Keylogger
network operating systems
Microsoft Windows Server and Linux are examples of
Which of the following is FALSE regarding public-key encryption?
On receiving this message, the recipient uses the public key to decrypt it
a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destinations.
Packet switching
If you receive an email asking for your SS number in return for millions of dollars, this is an example of ____
Phishing
involves setting up fake Web sites or sending email messages that look like those of legitimate businesses to ask users for confidential personal data; is a form of spoofing
Phishing
twister copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission
Physical transmission media
a set of rules and data structures for organizing communication. It plays a vital role in the manner in which data is presented to the user.
Protocol
a more secure form of encryption that uses two keys, one shared (or public) and one totally private. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.
Public key encryption
technology that uses tiny tags with embedded microchips containing data about an item and its location to transmit short-distance radio signals to special readers that then pass the data on to a computer for processing.
Radio frequency identification (RFID)
_____ is an increasing problem where hackers lock parts of your computer and demand money to unlock it
Ransomware
determines the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. It is used to determine the cost/benefit of a control.
Risk assessment
Establishing a risk level of malware threats to an organization is an example of
Risk-Assessment
a communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address.
Router
which of the following TCP/IP application-layer protocols is used for email transmissions?
SMTP
attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company's systems and networks. Large Web applications have hundreds of places for inputting user data, each of which creates an opportunity for an SQL injection attack.
SQL injection attack
_________ Provides rules related to the creation of financial statements to help avoid fraud
Sarbanes-Oxley Act
used in areas where DSL and cable services are unavailable
Satellite Internet connections
a protocol used for encrypting data flowing over the Internet. S-HTTP is limited to individual messages.
Secure Hypertext Transfer Protocol (S-HTTP)
a method for encrypting network traffic that enables client and server computers to manage encryption and decryption activities as they communicate with each other during a secure Web session.
Secure Sockets Layers (SSL)
Tricking employees to reveal their passwords to be a legitimate member of a company is referred to as
Social Engineering
refers to a software that covertly gathers information about a user through an Internet connection without the user's knowledge.
Spyware
manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.
Supply chain execution systems
enable the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans.
Supply chain planning systems
requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.
The Gramm-Leach-Bliley Act
requires that controls are put in place to secure the corporate network, prevent unauthorized access to systems and data, and ensure data integrity and availability in the event of a disaster or other disruption of service. It also imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.
The Sarbanes-Oxley Act
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
the networking infrastructure for a large company
The traditional telephone system, mobile cellular communication, wireless local area networks, videoconferencing systems, a corporate Web site, intranets, and extranets are all components of __________.
provides a universally agreed-upon method for breaking up digital messages into packets, routing them to the proper addresses, and then reassembling them into coherent messages
Transmission Control Protocol/Internet Protocol (TCP/IP)
Seems like a normal program, but does something completely unexpected
Trojan Horse
integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes.
Unified Communications
a secure connection between two points across the Internet to transmit corporate data. It provides a low-cost alternative to a private network.
Virtual Private Network (VPN)
delivers voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks. Although there are up front investments required for an IP phone system, VoIP can reduce communication and network management costs by 20 to 30 percent.
VoIP (Voice over IP)
GSM's strength is its international roaming capability
Which of the following is true of Global System for Mobile Communications (GSM)?
B
Which of the following statements about the business value of security and control is true? a) strong security and control decrease employee productivity and raise operational costs. b) information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability. c) HIPAA, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act, set standards for security privacy and control but they aren't strictly enforced. d) legal actions requiring electronic evidence and computer forensics are not yet in place.
The server sets the rules of communication for the network
Which of the following statements is true of client/server computing?
networks of interconnected wireless devices with built-in processing, storage, and radio frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces.
Wireless sensor networks (WSNs)
T1 and T3
__________ are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels.
Hubs
__________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
a basic network
__________ consists only of computers, a connection medium, network operating system software, and either a hub or a switch.
Wireless sensor networks (WSNs)
__________ is/are valuable in areas such as monitoring environmental changes, monitoring traffic or military activity, protecting property, efficiently operating and managing machinery and vehicles, monitoring supply chain management, or detecting biological, chemical, or radiological material.
Wide Area Networks (WANs)
__________ span broad geographical distances—entire regions, states, continents, or the entire globe.
wide area network
a company needing a network to connect its offices in Montana, Idaho and Utah would require a
defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance.
acceptable use policy (AUP)
Electronic evidence on computer storage media that is not visible to the average user is called
ambient data
network
at its most basic level, a(n) ________ simply consists of two computers that are connected together.
determining the difference between the highest and lowest frequency on a channel
bandwidth is determined by
Taking over computers and directing those systems to overload a network is defined as an ________ attack
denial-of-service
hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network.
denial-of-service (DoS) attack
uses numerous computers to inundate and overwhelm the network from numerous launch points.
distributed denial-of-service (DDoS) attack
100 meters
if you are creating a network using twisted wire (CAT 5) wire, the cable shouldn't exceed
local area network
if you were building a network intended to service two buildings
a scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line.
just-in-time strategy
digital signal
network signals that are represented by on-off pulses indicate a(n)
when actual customer orders or purchases trigger events in the supply chain. Transactions produce and deliver only what customers have ordered and move up the supply chain from retailers to distributors to manufacturers and eventually to suppliers.
pull-based supply chain model
production master schedules are based on forecasts for best guesses of demand for products, and products are "pushed" to customers.
push-based model
statements ranking information risks, identifying acceptable security goals and identifying the mechanisms for achieving these goals.
security policy
Which of the following is FALSE regarding digital certification?
the CA verifies a digital certificate user's identity online
which of the following is FALSE about the Domain name service (DNS)?
the first name in the domain is the organization name
packet switching
the method of slicing digital messages into parcels, transmitting them along different communications paths, and reassembling them at their destination is called
which is the best definition of hertz?
the number of cycles per second that can be sent through a medium
analog signal
the signal from you iPod earphone is a(n)
the address of a specific resource on the Internet
uniform resource locator (URL)
IP helps to recover any packets that are lost or damaged during transmission
which of the following is FALSE about the TCP/IP protocol?