CIS ITIO Exam 2
A NOS must reside on a dedicated server computer in order to manage a network.
False
An acceptable use policy defines the acceptable level of access to information assets for different users.
False
Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.
False
HTML has become the preferred method of communicating with back-end databases because it is a cross-platform language.
False
NFC tags are always passive.
False
Quantum computing is implemented primarily with enterprise or ISP servers.
False
The Apple iOS platform is the mobile platform most frequently targeted by hackers.
False
Every record in a file should contain at least one key field.
True
Fiber-optic cable is more expensive and harder to install than wire media.
True
High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.
True
In financial services firms, investments in IT infrastructure represent more than half of all capital invested.
True
It is much easier to eliminate a cloud service than to remove functionality from a company's core internal systems.
True
Microsoft is the market leader in client/server networking.
True
More than 200 million Americans access the Internet via mobile devices.
True
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
True
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
True
The term data governance refers to the policies and processes for managing the integrity and security of data in a firm.
True
VoIP technology delivers voice information in digital form using packet switching.
True
You can manipulate data on a web server by using a CGI script.
True
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
True
________ states that the value or power of a network grows exponentially as a function of the number of network members.
a. Metcalfe's Law
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
a. bps.
All of the following are technologies used to analyze and manage big data except:
a. cloud computing.
Digital subscriber lines:
a. operate over existing telephone lines to carry voice, data, and video.
Data ________ occurs when the same data is duplicated in multiple files of a database.
a. redundancy
A digital certificate system:
a. uses third-party CAs to validate a user's identity.
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?
b. Managing the supply chain
In data mining, which of the following involves events linked over time?
b. Sequences
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?
c. Green computing
Which of the following is not a characteristic of packet switching?
c. Packet switching requires point-to-point circuits.
Which of the following is not an example of a wearable computing device?
c. Smartphones
Which of the following is not a method for performing a data quality audit?
c. Surveying data definition and query files
Which of the following statements about Internet security is not true?
c. VoIP is more secure than the switched voice network.
Which of the following statements is not true about search engines?
d. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
d. radiation.
At what percent of capacity do most servers operate?
e. 15-20%
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
e. Conficker
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
e. Controls
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with:
e. a crow's foot topped by a short mark.
Interpretations of Moore's law assert that:
e. computing power doubles every 18 months.