CIS ITIO Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A NOS must reside on a dedicated server computer in order to manage a network.

False

An acceptable use policy defines the acceptable level of access to information assets for different users.

False

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.

False

HTML has become the preferred method of communicating with back-end databases because it is a cross-platform language.

False

NFC tags are always passive.

False

Quantum computing is implemented primarily with enterprise or ISP servers.

False

The Apple iOS platform is the mobile platform most frequently targeted by hackers.

False

Every record in a file should contain at least one key field.

True

Fiber-optic cable is more expensive and harder to install than wire media.

True

High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.

True

In financial services firms, investments in IT infrastructure represent more than half of all capital invested.

True

It is much easier to eliminate a cloud service than to remove functionality from a company's core internal systems.

True

Microsoft is the market leader in client/server networking.

True

More than 200 million Americans access the Internet via mobile devices.

True

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

True

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

True

The term data governance refers to the policies and processes for managing the integrity and security of data in a firm.

True

VoIP technology delivers voice information in digital form using packet switching.

True

You can manipulate data on a web server by using a CGI script.

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

True

________ states that the value or power of a network grows exponentially as a function of the number of network members.

a. Metcalfe's Law

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

a. bps.

All of the following are technologies used to analyze and manage big data except:

a. cloud computing.

Digital subscriber lines:

a. operate over existing telephone lines to carry voice, data, and video.

Data ________ occurs when the same data is duplicated in multiple files of a database.

a. redundancy

A digital certificate system:

a. uses third-party CAs to validate a user's identity.

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?

b. Managing the supply chain

In data mining, which of the following involves events linked over time?

b. Sequences

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

c. Green computing

Which of the following is not a characteristic of packet switching?

c. Packet switching requires point-to-point circuits.

Which of the following is not an example of a wearable computing device?

c. Smartphones

Which of the following is not a method for performing a data quality audit?

c. Surveying data definition and query files

Which of the following statements about Internet security is not true?

c. VoIP is more secure than the switched voice network.

Which of the following statements is not true about search engines?

d. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

d. radiation.

At what percent of capacity do most servers operate?

e. 15-20%

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?

e. Conficker

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

e. Controls

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with:

e. a crow's foot topped by a short mark.

Interpretations of Moore's law assert that:

e. computing power doubles every 18 months.


Ensembles d'études connexes

CTB: Cartilage, Bone, Diffusion and Osmosis

View Set

Chapter 11 Mastery Progress Exam

View Set

Chemistry -- Terms and Definitions

View Set