ISTM 209 EXAM 3 REVIEW (CH. 7,8,9)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Enterprise systems provide value by both​ __________________ and providing​ __________________ to help managers make better decisions.

increasing operational​ efficiency; firm-wide information

A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.

keylogger

Establishing a risk level of malware threats to an organization is an example of​ _______________.

risk assessment

Why is an​ order-to-cash service considered a complex process to implement as an enterprise​ application?

It needs information from many different functions of the enterprise.

Which of the following is an opportunity for threats to gain access to​ assets?

vulnerability

If you are creating a network using​ twisted-pair (CAT​ 5) wire, the cable​ shouldn't exceed:

100 meters

The average ERP project takes​ ___________ months to complete.

16

Which of the following could represent a current IP​ address?

207.46.250.119 xxx.xx.xxx.xxx

​Unfortunately, a majority of enterprise applications deliver​ __________ percent or less of the expected benefits

50

According to the information in this​ video, the telephone system is an example of a​ _____ network

Circuit-switched

​_____ can be destructive to a company when at risk for people or programs deliberately moving through​ ads, thus driving up advertising costs for a company.

Click Fraud

Which of the following​ examine(s) data files and sorts out​ low-priority online material while assigning higher priority to​ business-critical files?

Deep packet inspection

Bandwidth is determined​ by:

Determining the difference between the highest and lowest frequency on a channel.

Which of the following is NOT a security threat posed by the use of the​ iPhone, iPad, and other mobile computing devices in the​ workplace?

Dictating what kind of data an app can access inside its sandbox domain.

Network signals that are represented by​ on-off pulses indicate​ a(n):

Digital Signal

Which single word below best describes Web​ 2.0?

Dynamic

In this​ video, Kevin describes​ _____ as a set of integrated software modules that support nearly all of their​ organization's business processes.

ERP

Improving the tracking of employee training could involve adopting enterprise software focused on​ _______________________.

Employee relationship management

Which of the following is a critical security function of senior management in an​ organization?

Establishing the security policy and managing risk

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?

Gramm-Leach-Billey Act

The​ _____ mandates that financial services firms ensure security and confidentiality of customer data.

Gramm-Leach-Bliley Act

Which of the following is NOT one of the ways in which​ next-generation enterprise application vendors are delivering more​ value?

Making their software easier to customize

​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.

Malware

As Zero and One explain in this​ video, a​ _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line

Modem

At its most basic​ level, a(n)​ _________ simply consists of two computers that are connected together.

Network

Microsoft Windows Server and Linux are examples​ of:

Network Operating Systems

Which of the following is FALSE regarding​ public-key encryption?

On receiving the​ message, the recipient uses the public key to decrypt it.

Which of the following is FALSE regarding digital​ certificates?

The CA verifies a digital certificate​ user's identity online.

Business processes supported by enterprise systems related to credit checking are associated with​ __________________.

sales and marketing processes

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.

social engineering

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.

spoofer

In an effort to​ ___________ critical business​ processes, Coca-Cola implemented an SAP enterprise system.

standardize

Education being represented by .edu and business represented by .com are examples​ of:

top level domains

One finding from​ Alcoa's enterprise system found a positive correlation between​ ______________ and quality.

training

A​ company's suppliers and the​ suppliers' suppliers are considered the​ _____________ portion of the supply chain.

upstream

The Internet is based on which of the following three key​ technologies?

​Client/server computing packet​ switching TCP/IP and related communications standards for linking networks and computers

​_____________ provides rules related to the creation of financial statements to help avoid fraud.

​Sarbanes-Oxley Act

In this​ video, Special Agent Macey says the single largest threat to the Internet is​ _____.

​denial-of-service attacks

Although it can be​ risky, a​ __________________ strategy is based on knowing exactly when components would arrive within the supply chain.

​just-in-time

According to the information in this​ video, computers represent data using​ _____.

Bits

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.

In this video​ dramatization, Kevin describes which component of an ERP system that consolidates data from​ sales, marketing, and service​ departments?

customer relationship management​ (CRM)

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.

cybervandalism

A​ just-in-time strategy​ means:

raw materials would arrive​ just-in-time to be transformed into a product and the product would ship as soon as completed.

According to the information provided in this​ video, any business that has an online presence is at risk of​ _____.

A. loss of customer data B. ​denial-of-service attack C. exposure to hacker activity D. unauthorized data disclosure *****E. ALL OF THE ABOVE*****

In the Dundee Precious Metals​ (DPM) case, what technology was added to dramatically increase productivity and improve​ safety?

An underground wireless​ Wi-Fi network

In this​ video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing​ a(n) _____.

Analog Signal

The signal from your iPod earphone is​ a(n):

Analog Signal

​A(n) __________________ is a way to communicate in a network that is recognized by a continuous​ waveform:

Analog Signal

Which type of enterprise software would allow you to analyze Customer Lifetime Value​ (CLTV)?

Analytical CRM

​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.

Authentication

Which of the following is a wireless protocol designed for transmitting data over short​ distances, replacing​ cables?

Bluetooth

Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply​ chain?

Bullwhip effect

​_______________ requires that your patient records be protected and saved for six years.

HIPAA

What outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care​ data?

HIPAA Act

Bandwidth transmission speed is measured in​ ______________.

Hertz

What is the name of the organization responsible for assigning public IP​ addresses?

ICANN

The​ ________________ virus, a rather nice sounding​ virus, was one of the most famous malwares that was detected in 2000.

ILOVEYOU

The domain name system converts domain names to​ ________________________.

IP Addresses

Which of the following is FALSE about the​ TCP/IP protocol?

IP helps to recover any packets that are lost or damaged during transmission.

​________ check for data entering a system for accuracy and​ completeness, such as when a clerk confirms a telephone number for a new customer.

Input controls

If you were building a network intended to service two buildings that were next to each​ other, you would construct​ a:

Local Area Network

A​ _____ is great for a city to set up for emergency and public use since it is larger than many types of network configuration.

MAN

In this​ video, One-Bit describes​ _____, the method of slicing digital messages into​ parcels, transmitting them across communication​ networks, and reassembling them at their destination.

Packet Switching

Instead of sending an entire file in one big chunk across the​ Internet, __________ is used which dices the file up into little pieces that are sent independently across the communications​ paths, and then reassembled when they reach their destination

Packet Switching

A​ ________ is a set of rules that programs on two communicating devices follow.

Protocol

A supply chain driven by actual customer orders or purchases follows which​ model?

Pull-based model

​____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.

Ransomware

Which of the following is an important capability for​ service-category business processes that are found in most major CRM software​ products?

Returns management

If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of data to your different devices.

Router

What type of communications processor directs packets of data through different​ networks, ensuring that the data sent gets to the correct​ address?

Router

Which of the following​ TCP/IP application-layer protocols is used for email​ transmission?

SMTP

What are the three general business functions that CRM software​ serves?

Sales, customer​ service, and marketing

​_________________________ systems track the flow and status of products through the distribution process.

Supply chain execution

​_________________________ systems help firms​ analyze, model, and optimize its supply chain.

Supply chain planning

A company needing reliable network speeds at 1.5 Mbps would probably need to lease a​ dedicated:

T1 line

Which of the following is NOT a function of the Internet service provider​ (ISP)?

The ISP provides applications services.

Which of the following is FALSE about the Domain Name Service​ (DNS)?

The first name in the domain name is the organization name.

Which is the BEST definition of​ hertz?

The number of cycles per second that can be sent through a medium

Which of the following is NOT addressed by a business continuity​ plan?

The technical issues involved in keeping systems up and running

According to this​ video, which of the following statements is true regarding enterprise resource planning​ systems?

They integrate data with a centralized database.

Which of the following is NOT one of the characteristics of enterprise applications that cause challenges in​ implementation?

They support​ "best practices" for each business process and function.

__________ is a program that seems like a normal​ program, but does something completely unexpected.

Trojan horse

What is​ Pharming?

Users are redirected to a phony web page even when the correct URL is typed in.

A company needing a network to connect its offices in​ Montana, Idaho, and Utah would require​ a:

Wide Area Network

A​ __________ is a unique type of malware that replicates itself from one computer to another.

Worm

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

ambient data

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best​ describes:

analytical customer relationship management applications.

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.

biometric

When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the​ _________________________.

bullwhip effect

Enterprise software includes a database and thousands of predefined​ ________________

business processes

Enterprise systems have a set of integrated software modules and a​ _______________ by which business processes and functional areas throughout the company can​ _____ data.

central database; share

The measurement of the number of customers who stop using or purchasing products or services from a company is called​ ________.

churn rate

Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.

click fraud

Taking over computers and directing those systems to overload a network is defined as​ a(n) _____________ attack.

denial-of-service

Delivering products to retail stores is considered the​ _____________ portion of the supply chain.

downstream

As Kevin​ explains, _____ processes support activities in multiple departments and span an organization.

enterprise

ERP stands for​ ___________________________________.

enterprise resource planning

Business processes supported by enterprise systems related to travel expense reporting are associated with​ __________________.

human resources processes

Mary's company is implementing an ERP system to achieve which main business​ objective?

improved decision making

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

Business processes supported by enterprise systems related to quality control are associated with​ __________________.

manufacturing and production processes

Customer relationship management typically focuses on three key elements of the customer​ relationship:

marketing, sales, and service

The method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

packet switching

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.

phishing


Ensembles d'études connexes

Lecture 14: Fear avoidance model of Pain

View Set

Chapter 6- Socioemotional Development In Infancy

View Set

Lesson 2 - What's your name 你叫什么名字 - PART B

View Set

AP Government Unit 2 Constitutional Underpinnings

View Set

MGMT 405: Chpt. 8 Strategy Formulation and Execution

View Set

Pharmacology Chapters 41, 42, 44

View Set