Midterm question bank 2
________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. 1. SCADA attacks 2. Espionage 3. Alien software 4. Information extortion
4
________ controls restrict unauthorized individuals from using information resources. 1. Access 2. Communications 3. Physical 4. Useful
Access
A(n) ________ is located between two firewalls. 1. ERP 2. DMZ 3. anti-malware system 4.spamware detector
DMZ
________ is a remote attack requiring no user action. 1. A logic bomb 2. Virus 3. A Trojan horse 4. DoS
DoS
________ involves slicing and dicing data, drilling down in the data, and rolling up data to greater summarization. 1. Data mining 2. DSS 3. OLAP 4. OLTP
OLAP
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ________ attack. 1. SCADA 2. alien software 3. virus 4. espionage
SCADA
________ is a capability of dashboards that reflect the latest data available on KPIs or some other metric often in real time. 1. Trend analysis 2. Drill down 3. Status access 4. Exception reporting
Status access
________ causes pop-up advertisements to appear on your screen 1. adware 2. marketware 3. spamware 4. spyware
adware
A ________ represents the smallest unit of data a computer can process. A) field B) bit C) file D) byte
bit
Verification/testing of the proposed solution and picking an option occur in the ________ phase of the decision making. 1. choice 2. design 3. intelligence 4. implementation
choice
Which of the following has the strategy "I am better because I am different"? Question 133 options: A) Cost leader B) Operational effectiveness C) Customer oriented D) Innovation E) Differentiation
differential
________ is the result of optimizing the marketing and innovation processes.
differentiation
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. 1. minimum; minimum 2. minimum; maximum 3. maximum; minimum 4. maximum; maximum
minimum; maximum
In public-key encryption, the ________ key is used for locking and the ________ key is used for unlocking. 1. public; public 2. public; private 3. private; private 4. private; public
public, private
The relational database model is based on the concept of ________-dimensional tables. A) one B) two C) three D) four
two
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization 1. store 2. shop 3. warehouse 4. mart
warehouse
Examples of ________ include sensitivity, what-if, and goal-seeking analyses. 1. data mining 2. DSS 3. OLAP 4. OLTP
DSS
________ is a capability of dashboards that are specific measures of CSFs. 1. Trend analysis 2. Status access 3. KPI 4. Exception reporting
KPI
The ________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. 1. exposure 2. risk 3. threat 4. vulnerability
exposure
________ is a communications control 1. rfid 2. encryption 3. company gate 4. fire wall
firewall
The ________ creates links between two tables. A) Alien B) Foreign C) primary D) Secondary
foreign
________ is NOT a phase in decision making 1. choice 2. design 3. information 4. intelligence
information
Compliance with government regulations is a ________ pressure. market, societal, tech, non existent
societal
Which of the following is NOT a reason managing data is difficult? Question 90 options: 1. The amount of data is decreasing exponentially with time. 2. Data are subject to data rot. 3. Data are scattered throughout organizations. 4. Data are generated from multiple sources.
the amount of data is decreasing
Information-based industries are most susceptible to which one of Porter's five forces? Question 137 options: A) Threat of substitute products B) Bargaining power of suppliers C) Rivalry among existing firms in an industry D) Threat of entry of new competitors E) Bargaining power of customers
threat of subsitute products
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk ________. 1. acceptance 2. avoidance 3. limitation 4. transference
transference
As a board member, you recommend hiring a new CEO to address the scandals that have been reported in the Wall Street Journal. This is a(n) ________ decision. 1. midstructured 2. semistructured 3. structured 4. unstructured
unstructured
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. 1. structured 2. unstructured 3. semi structured 4. part structured
unstructured
________ is a remote attack requiring user action. 1. A logic bomb 2. Virus 3. DoS 4. A Trojan horse
virus
A ________ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees. 1. spear-phishing 2. spear-whaling 3. phishing 4. whaling
whaling
Carelessness using unmanaged devices is ________ and is an ________ mistake. 1. a human error; intentional 2. a human error; unintentional 3. social engineering; intentional 4. social engineering; unintentional
. a human error; unintentional
Each characteristic or quality of a particular entity is called a(n) ________. Question 86 options: 1. instance 2. record 3. field 4. attribute
attribute
udith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of ________. Question 99 options: 1. a passphrase 2. a communications control 3. a digital certificate 4. an audit
communications control
________ is the result of optimizing operations and supplier processes. differentiation, cost, productivity, quality
cost reduction
________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. 1. espionage 2. cyberterrorism 3. identity theft 4. scads attack
cyberterrorism
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) ________ control 1. access 2. communication 3. physical 4. useful
physical
Targeted marketing relies on ________ analytical information. 1. predictive 2. descriptive 3. prescriptive 4. useful
predictive
You would use optimization or simulation for ________ analytics. 1. useful 2. predictive 3. descriptive 4. prescriptiv
prescriptive
______ integrates disparate BPI initiatives to ensure consistent strategy execution. Question 146 options: A) BPM B) BPC C) BPS D) BPR
BPM
Which of the following is TRUE? Question 84 options: 1. Big Data becomes less useful over time since data changes too frequently for a system to maintain. 2. Big Data predictions come from teaching computers to think like humans. 3. Big Data systems perform well because they contain huge amounts of data on which to base their predictions. 4. Big Data is so large and complex that it must be managed by using a traditional DBMS.
Big Data systems perform well because they contain huge amounts of data on which to base their predictions.
Which of the following is NOT an example of excellent alignment? Question 149 options: A) Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. B) Organizations create a vibrant and inclusive company culture. C) Organizations allow IT employees to develop overarching goals for the business. D) Organizations view their internal and external customers and their customer service function as supremely important. E) Organizations ensure that IT employees understand how the company makes or loses money. F) Organizations rotate business and IT professionals across departments and job functions.
Organizations allow IT employees to develop overarching goals for the business.
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ________ strategy. 1. acceptance 2. avoidance 3. limitation 4. transference
acceptance
A ________ relationship exists when two entities are associated. A) unary B) binary C) solitary D) ternary
binary
________ is a technology pressure. Question 132 options: A) Globalization B) Protection against terrorist attacks C) Information overload D) Reducing the digital divide
terrorist
The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated. 1. business rules 2. cardinality 3. modality 4. data dictionary
data dictionary
________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors. 1. Data mining 2. DSS 3. OLAP 4. OLTP
data mining
Data reduction is the conversion of raw ________ into a smaller amount of more useful ________. 1. data; knowledge 2. information; data 3. data; information 4. information; knowledge
data; information
Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. A) explicit information B) explicit knowledge C) tacit information D) tacit knowledge
explicit knowledge
A ________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. 1. cold 2. hot 3. medium 4. warm
hot
________ is an example of a CSF. 1. Selling 10% more widgets 2. Improving customer satisfaction 3. Providing a 2% cost-of-living salary increase 4. Adding a new location in Mexico
improving customer sasfication
Competitive advantage for an organization manifests itself as all of the following EXCEPT ________. Question 145 options: A) higher quality B) lower costs C) increased time to market D) increased speed E) increased profits
increased time to market
Databases maximize ________; this means ________. 1. independence; applications and data are not linked to each other, so all applications are able to access the same data 2. independence; applications cannot access data associated with other applications 3. isolation; applications cannot access data associated with other applications 4. isolation; applications and data are not linked to each other, so all applications are able to access the same data
independence; applications and data are not linked to each other, so all applications are able to access the same data
Which of the following has the strategy "I'm doing something new and you can't catch up"? Question 141 options: A) Cost leader B) Customer oriented C) Differentiation D) Innovation E) Operational effectiveness
innovation
________ are materials, services, and information that flow through and are transformed as a result of process activities. Question 139 options: A) Employees B) Inputs C) Outputs D) Resources
inputs
A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity. 1. instance 2. field 3. attribute 4. record
instance
intellectual capital is another term for
knowledge
A data ________ is a central repository that stores all of an organization's data, regardless of their source or format. A) trail B) pond C) lake D) exhaust
lake
Which of the following reduces buyer power? Question 147 options: A) Internet searching B) Intermediation C) Loyalty programs D) Globalization
loyalty programs
Considering the nature of decision, acquiring and using resources efficiently in accomplishing organizational goals is ________. 1. financial planning 2. management control 3. operational control 4. strategic planning
management control
________ are a set of core data that span the enterprise information systems. A) Transaction data B) Master data C) Data governance D) Master data management
master data
In the ________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time 1. analysis 2. control 3. define 4. improve 5. measure
measure
In the ________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time. Question 138 options: A) analysis B) control C) define D) improve E) measure
measure
Databases ________ inconsistency; this means ________. 1. minimize; the same data are stored in multiple locations 2. maximize; various copies of the data do not agree 3. minimize; various copies of the data do not agree 4. maximize; the same data are stored in multiple locations
minimize; various copies of the data do not agree
Data marts and data warehouses are ________; this means they ________ be updated by users. 1. non volatile; can 2. volatile; cannot 3. non volatile; cannot 4. volatile; can
non volatile; cannot
A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. 1. mandatory many 2. mandatory single 3. optional many 4. optional single
optional many
Database systems minimize ________. 1. independence 2. security 3. integrity 4. redundancy
redundancy
Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. The team is now asking the VP of shipping to review the process diagram and give opinions. Laurie's team is at the ________ knowledge stage of the KMS cycle. 1. refine 2. disseminate 3. create 4. capture
refine
Each relational database table contains records (listed in ________) and attributes (listed in ________) . 1. rows; rows 2. columns; columns 3. columns; rows 4. rows; columns
rows; columns
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) ________ analysis. 1. affinity 2. goal-seeking 3. sensitivity 4. what-if
sensitivity
________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. 1. Espionage 2. Social engineering 3. Profiling 4. Malware
social engineering
The digital divide is an issue associated with a ________ pressure. market, societal, tech, nonexistent
societal
Keystroke loggers and screen scrapers are examples of ________. 1. adware 2. marketware 3. spamware 4. spyware
spyware
________ is the most popular query language used for interacting with a database 1. tps 2. sql 3. etl 4. rfid
sql
ou are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) ________ task and a(n) ________ decision. 1. structured; management control 2. structured; operational control 3. unstructured; management control 4. unstructured; operational control
structured; operational control
You decide to implement a new customer loyalty program that rewards customers for shopping in your store. To accomplish this, you need to implement a data warehouse to collect data from all your physical and online stores. This is an example of ________.
support for organizational transformation
A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications 1. business analyst 2. emerging technologies manager 3. systems analyst 4. system programmer
systems analyst
________ is the cumulative store of subjective or experiential learning. A) Explicit information B) Explicit knowledge C) Tacit information D) Tacit knowledge
tacit knowledge