Exam1 Management&InfoSystems
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.
Sabotage
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social Engineering
Which of the following is NOT a reason managing data is difficult.
The amount of data is decreasing exponentially with time.
A ________ represents the smallest unit of data a computer can process.
bit
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
bit, byte, field, record, file, database
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
exposure
Database systems minimize ________.
inconsistency (redundancy )
Database systems maximize ________.
independence
Databases ________ redundancy; this means ________.
minimize; the same data are stored in multiple locations
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.
piracy; illegal
The ________ key is an identifier field that uniquely identifies a record.
primary
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________.
tailgating; an unintentional threat to the organization
A(n) _________ to an information resource is any danger to which a system may be exposed.
threat
A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.
trusted; untrusted
An information resource's _________ is the possibility that the system will be harmed by a threat.
vulnerability
Microsoft ________ is a popular example of a relational database.
Access
_______ is an approach to managing information across an entire organization.
Data governance
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
Espionage