MIS352 - Chapter 7-14 Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure?

$1,250

According to the 2018 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2017?

$17 billion

Which of the following statements about 5G is true?

5G will be able to transmit data in the gigabit range.

Which of the following is a type of ambient data?

A file deleted from a hard disk

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

Which signal types are represented by a continuous waveform?

Analog

What are the four layers of the TCP/IP reference model?

Application, Transport, Internet, and Network Interface

Implementation controls:

Audit the systems development process at various points to ensure that the process is properly controlled and managed.

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

A network that spans a college or corporate facility is called a:

CAN

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Disaster recovery planning

CRM systems help businesses achieve which of the following business objectives?

Enhanced customer intimacy

A NOS must reside on all the local computers in a network.

False

Enterprise systems are built around a small number of predefined business processes.

False

Enterprise systems do not require fundamental changes in the way the business operates.

False

Extensive customization of enterprise software reduces the overall cost of implementation.

False

Firms in the supply chain develop safety stocks in order to increase the efficiency of their operations.

False

Most IoT devices support sophisticated security approaches.

False

Organizations can use existing network security software to secure mobile devices.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

Smartphones do not have the same security flaws as other Internet-connected devices.

False

Telephone networks are based on the same principles as computer networks.

False

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.

False

You have been hired by a small new web design firm to set up a network for its single office location. The network is primarily needed for exchanging files, accessing and managing beta websites on their web server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad-hoc basis and it does not have a lot of money to spend on infrastructure. What type of network will you recommend?

I would recommend a mixed wired and wireless network. The wired LAN would connect the Web servers and primary workstations and connect via cable service to the Internet. Freelancers could connect wirelessly via access points.

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

Intrusion detection systems

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

________ software modules seek to enhance collaboration between a company and its selling partners.

PRM

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?

Packet switching

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

Peer-to-peer

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

Peer-to-peer network

Which type of application does Macy's use to track items for sale on store shelves?

RFID application

CryptoLocker is an example of which of the following?

Ransomware

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

Risk assessment

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

Router

Which of the following can be used to help a website achieve a higher ranking with the major search engines?

SEO

________ monetizes the value of the data stored by search engines.

Search engine marketing

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

A statement ranking information risks and identifying security goals would be included in which of the following?

Security policy

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?

Select the functions of the system you wish to use.

Which of the following enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product?

Supply chain planning system

What are the two types of signals used to communicate a message in a network and how are they different? What device converts one type to the other type?

The two types of signals used to communicate a message in a network are analog and digital signals. In the textbook, "Management Information Systems: Managing the Digital Firm," Laudon & Laudon describe an analog signal as " a continuous waveform that passes through a communications medium." An example of devices that use analog signals are audio communication devices, such as a telephone handset, computer speaker, or iPhone earphone. While a digital signal is defined as "a discrete, binary waveform" that computers use, which are "represented as on-off electrical pulses." These two types of data are different in the way the data is communicated, audio versus information strings of data through bits. A modem, also known as a "modulator-demodulator," is the device that must be used to convert digital signals into analog signals, and vice versa. This data is then sent and received over various networks, such as telephone lines, cable lines, or wireless media.

A computer network consists of at least two computers.

True

A computer worm is a program that can copy itself to other computers on the network.

True

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.

True

Apple Pay uses an RFID-related technology called near field communication.

True

Application proxy filtering examines the application content of packets.

True

Authentication refers to verifying that people are who they claim to be.

True

Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel.

True

Churn rate is an important indicator of the growth or decline of a company's customer base.

True

Fiber-optic cable is more expensive and harder to install than wireless media.

True

In a client/server network, a network server sets the rules of communication for the network.

True

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

True

Inefficiencies in a supply chain are primarily caused by inaccurate or untimely information.

True

Organizations can rewrite enterprise system software to support their existing business processes.

True

Packet filtering catches most types of network attacks.

True

Wikis allow visitors to change or add to the original posted material.

True

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

UTM

Two-factor authentication utilizes a(n):

a multistep process of authentication.

The Internet of Things (IoT) refers to:

billions of Internet-connected sensors.

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

bps

Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application.

business intelligence

IPv6 has been developed in order to:

create more IP addresses.

The intentional defacement or destruction of a website is called:

cybervandalism.

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

cyberwarfare.

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

deep packet inspection

A company having difficulty with timely delivery of parts to its manufacturing plants should implement a supply chain ________ system.

execution

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:

hotspots

A Trojan horse:

is software that appears to be benign but does something other than expected.

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy.

just-in-time

Digital subscriber lines:

operate over existing telephone lines to carry voice, data, and video.

The HIPAA Act of 1996:

outlines medical security and privacy rules.

Most computer viruses deliver a:

payload

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

phishing

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.

planning; execution

Predictive search in Google's search engine:

predicts what you are looking for as you enter words into the query box.

A supply chain driven by forecasts of consumer demand follows a(n) ________ model.

push-based

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The bullwhip effect can be countered by:

reducing information uncertainty.

Coca-Cola implemented enterprise software from Oracle that enabled it to achieve all of the following except:

reducing the number of employees.

Fault tolerant information systems offer 100 percent availability because they use:

redundant hardware, software, and power supplies.

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

sniffing

Using social networking tools to converse with customers is called:

social CRM.

All of the following have contributed to an increase in software flaws except:

the increase in the number of computer hackers in the world.

The domain .gov is a(n):

top-level domain.

Supply chain planning systems perform all of the following functions except:

track the physical status of goods.

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

two-factor authentication.

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

uniform resource locator.

WPA2 is a more effective way to secure a wireless network than WEP because it:

uses much longer encryption keys.

A digital certificate system:

uses third party CAs to validate a user's identity.

A network that covers entire geographical regions is most commonly referred to as a(n):

wide area network.


Kaugnay na mga set ng pag-aaral

Chapter 10: Object-Oriented Programming: Polymorphism Q7

View Set

Chapter 34: The Child with Musculoskeletal or Articular Dysfunction

View Set

ITALIAN CULTURE THROUGH MUSIC MIDTERM

View Set

EMT Pocket Prep: SIGW w/explanations

View Set

FI 305 Morosan - Chapters 9 & 10

View Set

Chapter 3 Energy, Chemical Reactions, and Cellular Respiration

View Set