Exam1 Management&InfoSystems

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Increasing skills necessary to be a computer hacker

_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.

Sabotage

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social Engineering

Which of the following is NOT a reason managing data is difficult.

The amount of data is decreasing exponentially with time.

A ________ represents the smallest unit of data a computer can process.

bit

Which of the following is an accurate representation of the data hierarchy from smallest to largest?

bit, byte, field, record, file, database

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

exposure

Database systems minimize ________.

inconsistency (redundancy )

Database systems maximize ________.

independence

Databases ________ redundancy; this means ________.

minimize; the same data are stored in multiple locations

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.

piracy; illegal

The ________ key is an identifier field that uniquely identifies a record.

primary

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________.

tailgating; an unintentional threat to the organization

A(n) _________ to an information resource is any danger to which a system may be exposed.

threat

A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.

trusted; untrusted

An information resource's _________ is the possibility that the system will be harmed by a threat.

vulnerability

Microsoft ________ is a popular example of a relational database.

Access

_______ is an approach to managing information across an entire organization.

Data governance

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

Espionage


Ensembles d'études connexes

Questions on Assigned Articles Exam #2

View Set

Chapter 22 Nursing Management of the Postpartum Woman at Risk

View Set

Imperialism (overview, africa, india, china, japan)

View Set

MASTERING BIOLOGY-DNA REPLICATION

View Set

Bio 8e(Cmp-2) Q&A-Ch1 to Ch5 (Final)

View Set

Chemistry Hybridization and Bonding

View Set