MBA 6207 Midterm

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The Supreme Court has ruled that the right to anonymous expression is protected by _____.

1st amendment (free speech)

How long did Barbara Martin Coppola serve as the Chief Digital Officer at Ikea Retail?

4 yrs

Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____.

4th amendment

Netflix counts amongst its competitors not just those who make movies and TV shows, but those who provide leisure opportunities to people including books, magazines, and podcasts. Such a group of competitors is referred to as ____________.

Arena

What was an action needed to change Ikea stores to also perform as fulfilment centers?

Change floorplan of the stores.

What did digital transformation in Ikea not include?

Changing the company's culture.

A professional _____ states the principles and core values that an organization wishes to develop in its leaders and members and therefore defines desired behavior in these individuals.

Code of Ethics

Imagine you are conducting a security self-assessment. Which of the following might indicate one of your account passwords is too weak?

Contains LESS than 12 characters

Which of the following is not a part of Cyberthreat Narrative tool?

Core business processes operated by process automation.

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?

Cost leadership

Your ex-colleague was apprehended and charged with a crime based on the Fraud and Related Activity in Connection with Access Devices Statute. He was caught using unauthorized or stolen _________

Credit Cards

What can you obtain for free once a year from three key agencies in order to find out what is stored about you in existing databases?

Credit report

Ikea's approach to designing systems where it is a priority to put people first in all data-driven processes is called the __________.

Customer Data Promise

Digital platforms efficiently enable __________, which is the process of customers becoming aware of a specific need to get something done, working through how to get the need met, such as by using a product or service, and moving to the conclusion of a service or end of a product's life.

Customer consumption chain

Which of the following activities does the USA Patriot Act define?

Cyberterrorism

______________ is a process mentioned in the case for ongoing learning approach to strategy that is low cost and quickly tests assumptions about what works, obtains new information, and minimizes risks.

Discovery-driven planning

Which of the following is an example of disruption of the traditional power generation industry by digital transformation?

Dynamically distribute power generated from dispersed small-scale producers.

Who are the employees best able to catalog the computer systems, and the services and functionality they provide for industrial control systems?

Engineers

The upper-level managers at LaDonna's organization hold a traditional view of information systems, so LaDonna's major goals for her IS department include _____.

Ensuring effectiveness and efficiency of processes

In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.

Exploit

Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?

FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.

A set of random or unrelated tasks performed to achieve a definite outcome is called a process

False

Scanning a computer's hard drive for viruses is essential, but scanning live memory is only important in certain situations.

False! Should always scan

When firms adopt a strategy of continually finding opportunities to digitize challenging processes in their core operations, which of the following is NOT a benefit they can get as described in the case?

Find which suppliers they can work with

The case study describes a cyberattack to illustrate how the narrative proposed by the authors could have prevented it. Who or what was the cyber adversary?

Former employee of a vendor

Which of the following laws covers false claims regarding unauthorized use of credit cards?

Fraud and Related Activity in Connection with Access Devices Statute

How much growth in e-commerce by Ikea is reported in the case study?

From 7% to 31% in 3 years.

Santiago's IS organization developed a mobile app that allows salespeople to include images of how a customer's bathroom would look with new tiles installed when they generate a quote for a customer. Santiago's IS organization is viewed as a _____.

Game changer

Which company did Ikea acquire to use the company's AI imaging technology to help customers shop better?

Geomagical Labs

Which of the following most precisely describes the approach to cybersecurity proposed by the authors?

Identify critical business activities, the risk to them, the systems supporting them, those system vulnerabilities, and potential attackers.

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the __________.

Info System Security Analyst

What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in?

Info system strategic plan

collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____

Interorganizational info systems

Because digital firms' structures are evolving all the time, they are able to frequently experiment with and adjust features of their business strategies. Which of the following is NOT an example of this?

Keep activities of enforcing contracts within the firm.

The US-CERT newsletter has alerted you about a specific vulnerability in some software installed on your organization's computers. To detect any attempts at exploiting this vulnerability, you employ a(n) ____-based intrusion detection system.

Knowledge

What do cyberhackers need to execute an attack according to the authors?

Knowledge; Tools an equipment; Position

Which of the following is classified as a workgroup information system?

Monterey Bay Aquarium's tool that helps staff communicate, organize, plan, schedule, and track jobs

An operating system with _____ capabilities allows a user to run more than one program concurrently.

Multitasking

Kenneth is assisting with step 7 of his organization's security risk assessment. He and his team compare the risks of potential security breaches against the estimated costs of preventing them from happening. Why is this an important step?

No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs

What type of software is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users?

Open source

What was a major consequence of the NotPetya cyberattack?

Operations interruptions at many large companies worldwide.

_____ is/are considered to be the most important element in computer-based information systems.

People

Bubba creates a web application that allows his coworkers to generate reports providing information on sales, costs, and inventory that they need for their job functions without assistance. Bubba has developed a(n) _____.

Personal Info systems

Which of the following outlines what an organization aspires to become and lists its rules and principles?

Professional code of Ethics

What type of cyberattack was WannaCry?

Ransonware attack

After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____.

Recovery cost

What is the name of the project carried out by Best Buy to turn around the company in the last decade from huge financial losses and included digital transformation?

Renew Blue

Digital transformation often involves changing and adding skills to the workforce. What human-centric actions did Ikea take in this respect according to the case study?

Reskilling employees

The metric proposed by the authors to measure the progress on digital transformation is ____________.

Return on time invested

Which CEO is quoted in the case study in the context of changing the focus of cyberattack threat's potential impact?

Richard Lancaster of CLP Power Hong Kong

Which of these organizations offers guidelines on developing security policies?

SANS

Why would Claire, who has a Certified Information Systems Security Professional credential, object to shadow IT efforts at her company?

Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards

Ikea offers a shopping method in which customers scan the product in the store with their mobile device, pay, and skip the checkout line at the store. Ikea calls it __________.

Shop & Go

Which business organization became a cyber adversary by stealing software from its supplier business organization to carry out its own business operations?

Sinovel

The authors profess that identifying and fixing cyberrisks is a(n) __________.

Social Process

Which component of Leavitt's Diamond defines roles, responsibilities, and lines of authority among members of the organization, which must be understood and accepted for the organization to operate successfully?

Structure

Which of the following best describes human-centric technology?

Technology that leverages engraining ethical behavior and treating people without bias.

Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs?

The compiler translates the programs into a machine language

Which statement about the drivers that help set information system organizational strategy is false? a. They include innovative thinkers inside, but not outside, the organization. b. They include more general organizational strategies at the corporate level. c. They include technology innovations in hardware and software. d. They include the perception of the IS organization by the rest of the organization

They include innovative thinkers inside, but not outside, the organization.

A _____ is a low-cost, centrally managed computer with limited capabilities and no internal or external attached drives for data storage.

Thin client

An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack.

True

Digital transformation at Ikea went beyond changing the technology to transform the business.

True

If an IS organization is viewed as a cost center/service provider, its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better.

True

Managers of the business functions most affected by the new information system have a key responsibility to ensure that the people, processes, and human structure components are fully addressed.

True

There are laws that require businesses to prove that their data are secure.

True

You discover that an unknown party has gained administrator-level access to your computer, but the programs allowing this invasion are not visible to the legitimate system administrators. You have probably been hit by a rootkit.

True

The concept of a value chain is meaningful to tax preparers and restaurants because these businesses _____.

add value to their products and servcies

In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.

aid in product transformation produce output provide input into the process

Because some threats, such as insider fraud, are more likely to occur than others, step 3 of the risk assessment process is to _____.

assess the frequency of events or the likelihood of each potential threat

Which of the following is a provision of the USA PATRIOT Act?

authorization of "snack and peak warrants" for law enforcement agencies

To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled _____.

computer forensics investigation

The final step in the security risk assessment process is to _____.

decide whether or not to implement particular countermeasures

When looking for opportunities to benefit from digital transformation, a big firm with its resources to experiment with a variety of ideas, operations and processes, is more likely than a start-up to discover a _______________

dominant model

New cars come with onboard computer systems that control antilock brakes, air bag deployment, fuel injection, etc. They run operating system software known as ____.

embedded operating system

An IS manager is focusing on the people component of Leavitt's Diamond when he or she _____.

ensures that the IS help desk is available during work hours

If an activity is defined as legal then it is ethical.

false

Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.

false

The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft.

false

Corporate social responsibility activities such as philanthropy benefit for-profit organizations because they:

gain the goodwill of the community

Hacktivist

hacks computers or Web sites in an attempt to promote a political ideology

One example of a common and significant ethical dilemma related to safety-critical systems is deciding:

how much software testing is sufficient

A(n) _____ device provides data and instructions to the computer and receives results from it.

input/output

Anonymous expression

is an important right of a democratic society because it protects people from reprisals for their opinions

Compared with commercially licensed software, open-source software _____.

is available for similar purposes such as CPU operation and database management

A high-quality software system _____.`

is easy to learn and use

Server virtualization offers significant cost savings because _____.

it increases the total operating capacity of each physical server

Role of an MSSP (Managed Security Service Provider)

monitoring, managing, and maintaining computer and network security

Vincent holds an executive position within an organization that processes individual customers' information. If those customers live in the European Union, Vincent _____.

must ensure his team maintains data protection policies and employs a data protection officer

Botnet

network of computers that send out access requests to servers repeatedly

Ethical business practices

often raise an organization's priority with suppliers and other business partners

The class of computer systems used by multiple concurrent users offers businesses the potential to increase their processing capability to handle more users, more data, or more transactions in a given period, which is known as _____.

scalability

Hardware utilization can be improved by logically dividing the resources of a single physical server to create multiple logical servers. This approach is known as _____.

server virtualization

When an IS organization is viewed as a business partner/business peer:

strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization

The process of building software for safety-critical systems _____.

takes much longer than that for high-quality systems

In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to

technological developments and potential terrorists threats

Kennedy's company is adopting a service-oriented architecture approach to software development. This means that _____.

their software will be flexible enough to allow the addition of new services

Procedures are an important component of an IS implementation approach because _____.

they can help avoid lengthy business disruptions following a natural disaster

Government entities may pressure upstream Internet service providers to _____.

track and monitor the Internet activities of individuals

Which firm is mentioned in the opening paragraphs whose mobile app project failed in spite of receiving top priority from its management?

veon

You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ______.

your non-work-related use of the laptop could increase vulnerability


Kaugnay na mga set ng pag-aaral

Saunders NCLEX-RN Musculoskeletal System Practice Questions

View Set

Body Fluid Distribution (Compartments)

View Set

Chapter 6 (Operant Conditioning)

View Set

SU 19: Retirement Plans for Small Businesses

View Set

Criminal Justice: Reasonable Expectation of Privacy

View Set