Combo with "IS 300 ch.6 Network" and 1 other

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. b) Establishing the Internet connection between two computers. c) Moving packets over the network. d) Sequencing the transfer of packets across the network. e) Error checking

a) Disassembling and reassembling of packets during transmission.

Portals are an example of which network application? a) Discovery b) Collaboration c) Communications d) Web services e) None of these

a) Discovery

A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.

Answer: True

A local area network connects two or more communicating devices in a limited geographical area.

Answer: True

A major problem of the discovery applications of networks is the huge amount of information available.

Answer: True

A negative value for a student's grade point average is an example of a data integrity problem.

Answer: True

An Internet service provider is a company that offers Internet connections for a fee.

Answer: True

An attribute is any characteristic or quality that describes a particular entity.

Answer: True

An entity is a person, place, thing, or event about which information is maintained.

Answer: True

An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.

Answer: True

Answer: True Voice recognition is an example of "something a user does" authentication.

Answer: True

Cable media use wires or cables to transmit data and information.

Answer: True

Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.

Answer: True

Commercial portals are intended for broad audiences and offer fairly routine content.

Answer: True

Currently, ATM networks operate only on fiber-optic cable.

Answer: True

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage.

Answer: True

Data marts are designed for the end-user needs in a strategic business unit or department.

Answer: True

Electronic mail is the largest-volume application running over the Internet.

Answer: True

Extranets offer limited accessibility to the intranets of participating companies.

Answer: True

Human errors cause more than half of the security-related problems in many organizations.

Answer: True

IT security is the responsibility of everyone in the organization.

Answer: True

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy.

Answer: True

Increasing amounts of external data need to be considered in making organizational decisions.

Answer: True

Internet kiosks are computer terminals located in public places like libraries and airports.

Answer: True

Intranets support discovery, communication, and collaboration inside an organization.

Answer: True

Metasearch engines search several engines at once and integrate the findings of the various search engines.

Answer: True

Network interface cards are special adapters that link an individual device to the communications medium on a local area network.

Answer: True

Online analytical processing (OLAP) involves the analysis of accumulated data by end users.

Answer: True

Organizations use authentication to establish privileges to systems operations.

Answer: True

Organizations utilize layers of controls because they face so many diverse threats to information security.

Answer: True

Public-key encryption uses two different keys, one public and one private.

Answer: True

Software can be copyrighted.

Answer: True

Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.

Answer: True

The Internet is a global network of computer networks.

Answer: True

The U.S. public telephone system was designed as an analog network to carry voice signals.

Answer: True

The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture.

Answer: True

The area located between two firewalls within an organization is called the demilitarized zone.

Answer: True

The best way to capture the data in an organized format is to use a database.

Answer: True

The computing skills necessary to be a hacker are decreasing.

Answer: True

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

Answer: True

The higher the level of an employee in organization, the greater the threat that he or she poses to the organization.

Answer: True

The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.

Answer: True

The rightmost part of an Internet name is the top-level specification, or the zone.

Answer: True

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Answer: True

Uniform resource locators (URLs) point to the address of a specific resource or site on the Web.

Answer: True

Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet.

Answer: True

You would be an instance of your university's STUDENT class.

Answer: True

Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery b) Communications c) Collaboration d) Web services e) None of these

a) Discovery

Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people b) Possible loss of fringe benefits c) Lower pay (in some cases) d) No workplace visibility e) Slower promotions

a) Fewer opportunities for housebound people

The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure.

a) They are organized by subject.

A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card

b) A standard set of rules and procedures for the control of communications in a network

_____ signals convey information in wave form, whereas _____ signals convey information in binary form. a) Analog, packet b) Analog, digital c) Digital, packet d) Digital, analog e) Packet, analog

b) Analog, digital

Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN

b) Asynchronous transfer mode

In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File.

b) Bit.

A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems b) Client/server c) Peer-to-peer d) Centralized e) Mainframe-centric

b) Client/server

The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today.

b) Computer attack programs, called scripts, are available for download from the Internet.

24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports

b) Corporate databases

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence

b) Data inconsistency

Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence

b) Data integrity.

A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web

b) Extranet

A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database

b) Field

Refer to Opening Case - Cybercriminals Use Social Networks for Targeted Attacks: Cybercriminals use Facebook for all of the following reasons except: a) It is easy to get into the Facebook code itself. b) People trust messages from their Facebook friends. c) Social networks aren't closely regulated in corporate network defense systems. d) Many social network users aren't technology savvy and wouldn't realize their computer is under the control of outsiders. e) There is a black market for Facebook usernames and passwords

a) It is easy to get into the Facebook code itself.

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge

a) Knowledge, information

A(n) _____ connects two or more devices in a limited geographical area. a) Local area network b) Wide-area network c) Personal area network d) Enterprise network e) Value added network

a) Local area network

The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients

a) Modems

_____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields

a) Primary keys

In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols b) Client/server architectures c) WANs d) Application software packages e) Developmental architectures

a) Protocols

Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated.

a) Providing information on each record.

A _____ sends messages through several connected LANs or to a wide-area network. a) Router b) Network interface card c) Bridge d) Gateway e) File server

a) Router

Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can't handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated.

a) The data is not reliable.

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. a) Access b) Physical c) Data security d) Administrative e) Input

a) Access

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. a) Alien software b) Virus c) Worm d) Back door e) Logic bomb

a) Alien software

A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database

a) Byte

_____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence

a) Data isolation

The part of a network that handles the major traffic is the ________. a) Front end b) Network interface c) Multiplexer d) Backbone e) Front end processor

d) Backbone

Place the following members of the data hierarchy in their correct order: a) Bit - byte - field - record - database - file b) Bit - field - byte - record - file - database c) Byte - bit - record - field - database d) Bit - byte - field - record - file - database e) Bit - record - field - byte - file -- database

d) Bit - byte - field - record - file - database

_____ portals coordinate content within relatively narrow organizational and partners' communities. a) Publishing b) Personal c) Affinity d) Corporate e) Commercial

d) Corporate

_____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart

d) Data governance

_____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence

d) Data redundancy

A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database

d) File

Which of the following statements concerning firewalls is not true? a) Firewalls prevent unauthorized Internet users from accessing private networks. b) Firewalls examine every message that enters or leaves an organization's network. c) Firewalls filter network traffic according to categories of activities that are likely to cause problems. d) Firewalls filter messages the same way as anti-malware systems do. e) Firewalls are sometimes located inside an organization's private network.

d) Firewalls filter messages the same way as anti-malware systems do.

A _____ connects dissimilar networks. a) Router b) Network interface card c) Bridge d) Gateway e) File server

d) Gateway

Which of the following is not a communications channel? a) Fiber-optic cable b) Satellite transmission c) Twisted-pair wire d) Integrated circuits e) Cellular radio

d) Integrated circuits

) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web

d) Intranet

_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management

d) Master data management

Consider this domain name, www.business.gsu.edu. The "business" is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster

d) Name of the specific computer

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. a) Zero-day b) Denial-of-service c) Distributed denial-of-service d) Phishing e) Brute force dictionary

d) Phishing

Refer to IT's About Business 4.4 - Information Security at City National Bank and Trust: Using the M86 Security software allowed City National Bank and Trust to do all of the following except: a) Apply policy-based standards for e-mail. b) Comply with Sarbanes-Oxley. c) Categorize Web sites and block questionable ones. d) Provide all employees with secure access to external e-mail. e) Prevent employees from downloading potentially dangerous files.

d) Provide all employees with secure access to external e-mail.

Which of the following is not a characteristic of twisted-pair wire? a) Inexpensive b) Easy to work with c) Subject to interference from other electrical sources d) Secure transmissions e) None of these

d) Secure transmissions

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. a) Tailgating b) Hacking c) Spoofing d) Social engineering e) Spamming

d) Social engineering

A VPN is a network within the organization.

Answer: False

A password refers to "something the user is."

Answer: False

An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.

Answer: False

An organization's data warehouse generally maintains its operational data.

Answer: False

Cyberterrorism is usually carried out by nations.

Answer: False

Data rot refers to the quality of the data itself.

Answer: False

Digital signals are continuous waves that transmit information by altering the characteristics of the waves.

Answer: False

Digital signals have two parameters: frequency and amplitude.

Answer: False

Dumpster diving is always illegal because it involves trespassing on private property.

Answer: False

E-learning is conducted only in virtual classrooms, where all coursework is completed online.

Answer: False

Employees who telecommute have generally found that the experience enhances their careers.

Answer: False

Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.

Answer: False

Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.

Answer: False

Having one backup of your business data is sufficient for security purposes.

Answer: False

In a data warehouse, existing data are constantly purged as new data come in.

Answer: False

Industrywide portals are intended for broad audiences and offer fairly routine content.

Answer: False

It is easy to manage all the data coming into an organization.

Answer: False

It is important for applications and data to be dependent on each other.

Answer: False

Master data are generated and captured by operational systems.

Answer: False

Risk analysis involves determining whether security programs are working.

Answer: False

Supervisory control and data acquisition (SCADA) systems require human data input.

Answer: False

Systems that use digital subscriber lines (DSL) do not require modems.

Answer: False

Tacit knowledge is the more objective, rational, and technical types of knowledge.

Answer: False

The network interface card typically houses the LAN's network operating system.

Answer: False

The quality of automatic translation of Web pages is usually just as good as human translation.

Answer: False

The relational database model is based on the concept of three-dimensional tables.

Answer: False

The secondary key is a field that identifies a record with complete uniqueness.

Answer: False

The security of each computer on the Internet is independent of the security of all other computers on the Internet.

Answer: False

Twisted-pair wire is the least-used form of communications wiring.

Answer: False

Uniform resource locators (URLs) are software applications through which users access the Web.

Answer: False

When data are normalized, attributes in the table depend on the primary key and any secondary keys.

Answer: False

Wide-area networks have a large capacity, and they typically use a single communications channel.

Answer: False

With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call.

Answer: False

Zero-day attacks use deceptive e-mails to acquire sensitive personal information.

Answer: False

A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security.

Answer: True

All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. b) They have large capacity. c) They cover large geographical areas. d) They combine multiple communications channels. e) The Internet is an example of a wide-area network.

a) They are provided by individual companies.

Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate

a) They cost less

Consider this domain name, www.business.gsu.edu. The "edu" is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster

a) Top-level domain

_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases

a) Transaction data, master data

_____ are segments of computer code that attach to existing computer programs and perform malicious acts. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs

a) Viruses

With _____, phone calls are treated as just another kind of data. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat

a) Voice over IP

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file.

a) attribute.

As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship

a) instance

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers

a) keyloggers, screen scrapers

Unintentional threats to information systems include all of the following except: a) malicious software b) tailgating c) power outage d) lack of user experience e) tornados

a) malicious software

Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous

a) objective

Biometrics are an example of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows

a) something the user is.

Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines.

a) to process transactions faster.

An information system's _____ is the possibility that the system will be harmed by a threat. a) vulnerability b) risk c) control d) danger e) compromise

a) vulnerability

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. a) whitelisting, blacklisting b) whitelisting, encryption c) encryption, whitelisting d) encryption, blacklisting e) blacklisting, whitelisting

a) whitelisting, blacklisting

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining

b) Knowledge management

Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster

b) Name of the organization

A _____ allows a device to physically connect to a local area network's communications medium. a) File server b) Network interface card c) Network operating system d) Communications channel e) Gateway

b) Network interface card

_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis

b) Normalization

With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat

b) Plain old telephone service

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. a) Risk management b) Risk analysis c) Risk mitigation d) Risk acceptance e) Risk transference

b) Risk analysis

_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys

b) Secondary keys

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? a) Spyware b) Spamware c) Adware d) Viruses e) Worms

b) Spamware

Which of the following enables users to send data across sometimes unreliable networks? a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network

b) TCP/IP

The newest type of videoconferencing technology is ________. a) Teleconferencing b) Telepresence c) Work group analysis software d) Workflow software e) Groupware

b) Telepresence

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? a) The message could be an industrial espionage attack. b) The message could be a phishing attack. c) The message could be a denial of service attack. d) The message could be a back door attack. e) The message could be a Trojan horse attack.

b) The message could be a phishing attack.

Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization's databases. e) Data across their organizations are generally consistent.

b) They are responding to federal regulations

The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient.

b) They make best practices available to employees.

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? a) The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines. c) You can back up sensitive data to a thumb drive so you can take them home to work with. d) The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. e) The document permits you to lend your laptop to your brother for the weekend.

b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.

Access controls involve _____ before _____. a) biometrics, signature recognition b) authentication, authorization c) iris scanning, voice recognition d) strong passwords, biometrics e) authorization, authentication

b) authentication, authorization

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural

b) explicit

The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing.

b) extracting, transforming, and loading.

Employees in which functional areas of the organization pose particularly grave threats to information security? a) human resources, finance b) human resources, management information systems c) finance, marketing d) operations management, management information systems e) finance, management information systems

b) human resources, management information systems

A _____ is a document that grants the holder exclusive rights on an invention for 20 years. a) copyright b) patent c) trade secret d) knowledge base e) private property notice

b) patent

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key. a) public, public b) public, private c) private, private d) private, public e) none of these

b) public, private

In a relational database, every row represents a(n) _____. a) file b) record c) attribute d) primary key e) secondary key

b) record

Which of the following is not an example of a weak password? a) IloveIT b) 08141990 c) 9AmGt/* d) Rainer e) InformationSecurity

c) 9AmGt/*

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? a) A cold site has no equipment. b) A warm site has no user workstations. c) A hot site needs to be located close to the organization's offices. d) A hot site duplicates all of the organization's resources. e) A warm site does not include actual applications.

c) A hot site needs to be located close to the organization's offices.

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following? a) Copyrighted material b) Patented material c) A trade secret d) A knowledge base e) Public property

c) A trade secret

_____ portals support communities such as hobby groups or political parties. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial

c) Affinity

The cost of a stolen laptop includes all of the following except: a) Loss of intellectual property b) Loss of data c) Backup costs d) Loss of productivity e) Replacement cost

c) Backup costs

Which of the following is not a component of a local area network? a) File server b) Client computers c) Bridge d) Network interface cards e) All of these

c) Bridge

Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery b) Communications c) Collaboration d) Web services e) None of these

c) Collaboration

_____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks b) Digital subscriber lines c) Communications channels d) Integrated circuits e) Communications processors

c) Communications channels

_____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence

c) Data consistency

Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both "decisions about hardware" and "decisions about software." e) All of these have an equal impact.

c) Decisions about data.

The cable medium with the highest bandwidth is: a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable

c) Fiber-optic cable

The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web

c) Internet

Which of the following statements is false? a) Credit card companies usually block stolen credit cards rather than prosecute. b) People tend to shortcut security procedures because the procedures are inconvenient. c) It is easy to assess the value of a hypothetical attack. d) The online commerce industry isn't willing to install safeguards on credit card transactions. e) The cost of preventing computer crimes can be very high.

c) It is easy to assess the value of a hypothetical attack

Refer to IT's About Business 4.2 - Virus Attack Hits the University of Exeter. Which of the following statements about the virus attack is true? a) The attack was confined to the Exeter campus. b) Telephone service was not disrupted. c) It took three days to clean infected computers and bring the network back into operation. d) Only the PCs owned by the University had to be scanned. e) The attack did not affect the professors' ability to run their classes.

c) It took three days to clean infected computers and bring the network back into operation.

Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch b) Electromagnetic switch c) Laser d) Multiplexer e) Optical modem

c) Laser

Internet service providers connect to one another through _____. a) Internet connection points b) Common carrier connection points c) Network access points d) Network connection points e) An extranet

c) Network access points

Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. b) Packets are routed through different paths. c) Packets require dedicated circuits. d) Packets use TCP/IP to carry their data. e) Packets contain destination addressing. Answer: c

c) Packets require dedicated circuits

Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization.

c) Rapid technological changes ensure that controls are effective for years.

A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database

c) Record

Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN

c) Synchronous optical network

In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing

c) Telepresence

Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address

c) URL address

The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users

c) are not updated.

) Rank the following in terms of dollar value of the crime, from highest to lowest. a) robbery - white collar crime - cybercrime b) white collar crime - extortion - robbery c) cybercrime - white collar crime - robbery d) cybercrime - robbery - white collar crime e) white collar crime - burglary - robbery

c) cybercrime - white collar crime - robbery

) In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was: a) weak passwords. b) unattended computers. c) employee negligence. d) contract labor, such as consultants. e) poor antivirus software

c) employee negligence.

A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database

c) interface between applications and a database

When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record

c) primary key

In _____, the organization takes concrete actions against risks. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference

c) risk mitigation

A _____ is intellectual work that is known only to a company and is not based on public information. a) copyright b) patent c) trade secret d) knowledge base e) private property

c) trade secret

Dumpster diving is: a) always illegal because it is considered trespassing. b) never illegal because it is not considered trespassing. c) typically committed for the purpose of identity theft. d) always illegal because individuals own the material in the dumpster. e) always legal because the dumpster is not owned by private citizens

c) typically committed for the purpose of identity theft.

Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical

c) unstructured

Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN

d) T-carrier system

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site should be an almost exact replica of the IT configuration at headquarters. e) The site will not have up-to-date data.

d) The site should be an almost exact replica of the IT configuration at headquarters.

Skype is an example of _______. a) Teleconference b) Telepresence c) Plain old telephone service d) Voice over IP e) Videoconference

d) Voice over IP

In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files

d) columns

The most overlooked people in information security are: a) consultants and temporary hires. b) secretaries and consultants. c) contract laborers and executive assistants. d) janitors and guards. e) executives and executive secretaries.

d) janitors and guards.

Which of the following factors is not increasing the threats to information security? a) smaller computing devices b) downstream liability c) the Internet d) limited storage capacity on portable devices e) due diligence

d) limited storage capacity on portable devices

At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many

d) many-to-many

A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language

d) structured query language

A _____ is any danger to which an information resource may be exposed. a) vulnerability b) risk c) control d) threat e) compromise

d) threat

In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute

d) uniquely identify a record

) Which of the following is not a consequence of poor information security practices? a) Stolen information b) Stolen identities c) Financial loss d) Loss of service e) All of the above are consequences of poor information security practices.

e) All of the above are consequences of poor information security practices

Which of the following is not a strategy for mitigating the risk of threats against information? a) Continue operating with no controls and absorb any damages that occur b) Transfer the risk by purchasing insurance. c) Implement controls that minimize the impact of the threat d) Install controls that block the risk. e) All of the above are strategies for mitigating risk.

e) All of the above are strategies for mitigating risk.

Cybercriminals can obtain the information they need in order to assume another person's identity by: a) Infiltrating an organization that stores large amounts of personal information. b) Phishing. c) Hacking into a corporate database. d) Stealing mail. e) All of the above are strategies to obtain information to assume another person's identity.

e) All of the above are strategies to obtain information to assume another person's identity.

Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both "They enable faster program development." and "They make it easier to modify data and information." e) All of these

e) All of these

Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs b) To free up time for busy managers c) To improve profitability d) To offer customers self-service opportunities e) All of these

e) All of these

Networks enable which of the following applications? a) Discovery b) Communications c) Collaboration d) Web services e) All of these

e) All of these

The benefits of e-learning include which of the following? a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of these

e) All of these

The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these

e) All of these

Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these

e) All of these

Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time.

e) All of these are reasons why managing data is difficult over time.

Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All these

e) All these

_____ refers to the range of frequencies available in any communications channel. a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth

e) Bandwidth

Refer to IT's About Business 5.2 - Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All of these e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."

e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."

_____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial

e) Commercial

_____ are Internet access points that are located in public places, such as libraries and airports. a) Clients b) Servers c) Internet access computers d) Network computer e) Internet kiosks

e) Internet kiosks

Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies.

e) It is not yet a major consideration for most companies

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs

e) Logic bombs

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs

e) Logic bombs

In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week

e) Product, store, and week

BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching b) Collaboration c) Packet switching d) Torrents e) Swarming

e) Swarming

Refer to Opening Case - The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. b) Under current models, the investment required to meet future demand exceeds projected revenue growth. c) Net neutrality might hinder U.S. competitiveness. d) Network providers could censor certain content by slowing down or blocking access. e) Telecommunications and cable companies are in favor of net neutrality.

e) Telecommunications and cable companies are in favor of net neutrality.

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? a) The name of the company b) Your last name c) Your birthdate d) Your initials (capitalized) and the number of the floor you are on e) The name of the company spelled backward

e) The name of the company spelled backward

Refer to IT's About Business 4.3 - The Stuxnet Worm: Which of the following statements is true? a) The worm targeted large data warehouses. b) The worm was fairly simplistic. c) The worm spread from Iran to other countries. d) The worm probably only took a month to build. e) The worm specifically targeted nuclear facilities

e) The worm specifically targeted nuclear facilities

Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember

e) They tend to be short so they are easy to remember

Applications offered by the Internet2 include which of the following? a) remote diagnosis b) digital libraries c) distance education d) virtual laboratories e) all of these

e) all of these

In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. a) phishing b) zero-day c) worm d) back door e) distributed denial-of-service

e) distributed denial-of-service

In _____, the organization purchases insurance as a means to compensate for any loss. a) risk management b) risk analysis c) risk mitigation d) risk acceptance e) risk transference

e) risk transference

Voice and signature recognition are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does

e) something the user does

Passwords and passphrases are examples of: a) something the user is. b) something the user wants. c) something the user has. d) something the user knows. e) something the user does.

e) something the user does.

An organization's e-mail policy has the least impact on which of the following software attacks? a) virus b) worm c) phishing e) zero-day e) spear phishing

e) zero-day


Ensembles d'études connexes

Chemistry , Chp.7, Chemical quantities & reactions

View Set

Distributed Ledger / Blockchain / Cryptocurrency

View Set

Chapter 1-B: Characteristics of Insurance Contracts

View Set

Is the sentence Declarative, Interrogative, Imperative, or Exclamatory?

View Set

Algebraic and Geometric Properties for Proofs

View Set