Concepts assignment 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Amazon, Kamatera, Salesforce, and Google are all examples of

Cloud Service Providers

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

Why would a vendor agreement be a disadvantage of cloud computing?

Vendor agreements make it difficult to switch services.

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

Wide Area Network (WAN)

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

A Trojan horse succeeds through

deceptive access

The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.

effective interest rate

Time Value of Money (TVM) is one of the most basic fundamentals in __________.

finance

Excel functions can be found under which tab?

formulas

The main advantage of the IPv6 format for IP addresses is that

it can accommodate many more addresses than the IPv4 format.

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true.

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency

E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.

ubiquity

The total amount a series of payments is worth now is called the __________.

PV (Present Value)

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

What is a key advanced technology behind CRM analytics?

online analytical processing

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

Share of customer, which focuses on getting as much business as possible from fewer customers, is also known as share of

wallet

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?

web planning

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media

What is one of the greatest risks of an organization storing customer data?

Data breaches

Which CRM-compatible sales prospecting tool utilizes the profiles and connections on a social media platform to generate prospects?

LinkedIn Sales Navigator

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

Location-based services (LBS)

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

The __________ calculates the payment for a loan based on constant payments and a constant interest rate.

PMT

__________ is widely used in finance in the stock valuation, bond pricing, and financial modeling.

PV (Present Value)

Which threat to cybersecurity can only come from outside an organization?

Ransomware

Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?

Standardized Data Collection Processes

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

An __________ is a contract between an individual and a company in which you make a lump sum payment or series of payments and, in return, receive regular disbursements beginning either immediately or more commonly at some point in the future.

annuity

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

software

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

The concept of "share of customer" focuses on getting

the most business from the fewest customers.

Future Value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money into an account or __________ money in a financial instrument that pays interest.

to invest

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

to protect

M-commerce is a subset of

traditional e-commerce

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

The abbreviation for Future Value is (___).

FV

Which is the best definition of a cybersecurity exploit?

It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.

Social engineering is used to target people whom

are not cautious about giving out confidential or sensitive information.

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

PMT is the Excel function for __________.

payment

An interest rate (or rate) is usually stated as a __________.

percentage

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

respond function

Payment can be made in the form of funds, assets, or __________.

services

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?

Different engagement is needed to turn each type of lead into a customer.

What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?

B2G transactions involve prenegotiated contracts.

How is quantitative data about a customer most accurately characterized?

as a record of how a customer interacts with a business

Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?

bitcoin cash

How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?

by revealing whether their marketing efforts are effective or require changes

A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?

cloud services security

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

A computer network must be connected to the Internet to support

communicating via email with people on other networks.

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the last phase in a well-designed strategy?

mobile platform planning and implementation

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

Trello

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery


Ensembles d'études connexes

Concept Review 1: Chemical Nomenclature

View Set

Digital Electronics LVL 1 Lesson 7

View Set

Mgt 3370 TTU Exam 3 T/F Questions

View Set

Medical Terminology - Ch. 7: Pregnancy, Childbirth, and the Puerperium

View Set

Introduction to Old testament Exam 2

View Set

Absolute Java 6th Edition Chapter 8

View Set

Chapter 21: Personal Property and Bailments

View Set