ISYS 209 Exam 3
Which of the following is FALSE regarding public-key encryption?
On receiving the message, the recipient uses the public key to decrypt it.
_________________________ systems help firms analyze, model, and optimize its supply chain.
Supply chain planning
__________________ are an added complexity to implementing an Enterprise Application as it can require vendors to have to upgrade their systems as well.
Switching costs
Security in an information systems context refers to ___________________________, which are used to prevent unauthorized access or theft.
policies, procedures, and technical measures
Establishing a risk level of malware threats to an organization is an example of _______________.
risk assessment
Education being represented by .edu and business represented by .com are examples of:
top level domains
ERP implementations can be very expensive, averaging approximately _____.
$2.8 million
Although it can be risky, a __________________ strategy is based on knowing exactly when components would arrive within the supply chain.
just-in-time
Customer relationship management typically focuses on three key elements of the customer relationship:
marketing, sales, and service.
A company needing reliable network speeds at 1.5 Mbps would probably need to lease a dedicated:
T1 line
Application controls can be classified as _____ controls, _______controls, and ________ controls.
input; processing; output
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
keylogger
Which of the following is false about ERP systems?
ERP systems collect and organize firm-wide data that must be passed to other applications for executive decision making.
________ is a new network backed by universities, government, and private companies in more than 100 countries.
Internet2
Enterprise systems have a set of integrated software modules and a _______________ by which business processes and functional areas throughout the company can _____ data.
central database; share
The ________ measures the number of customers who stop purchasing products or using a firm's services.
churn rate
Enterprise systems provide value by both __________________ and providing __________________ to help managers make better decisions.
increasing operational efficiency; firm-wide information
Interactions are critical when working to improve customer relations. Specific interactions with customers are called ____________.
touch points
According to the information in this video, the telephone system is an example of a _____ network
circuit-switched
In this video, Special Agent Macey says the single largest threat to the Internet is _____.
denial-of-service attacks
If you were building a network intended to service two buildings that were next to each other, you would construct a:
local area network.
What type of communications processor directs packets of data through different networks, ensuring that the data sent gets to the correct address?
router
A _____ is great for a city to set up for emergency and public use since it is larger than many types of network configuration.
MAN
Which of the following is FALSE regarding digital certificates?
The CA verifies a digital certificate user's identity online.
Enterprise software includes a database and thousands of predefined ________________.
business processes
The measurement of the number of customers who stop using or purchasing products or services from a company is called ________.
churn rate
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
click fraud
If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices.
router
A company's suppliers and the suppliers' suppliers are considered the _____________ portion of the supply chain.
upstream
Why is an order-to-cash service considered a complex process to implement as an enterprise application?
It needs information from many different functions of the enterprise.
One wireless security concern is called _________, where eavesdroppers drive by locations trying to intercept wireless network traffic.
war driving
A large corporation managing a network over a global area would be considered a ________.
wide area network
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a:
wide area network.
A __________ is a unique type of malware that replicates itself from one computer to another.
worm
The current average cost of an ERP project is ______________.
$2.8 million
If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed:
100 meters.
The average ERP project takes ___________ months to complete.
16
_____ can be destructive to a company when at risk for people or programs deliberately moving through ads, thus driving up advertising costs for a company.
Click fraud
The Internet is based on which of the following three key technologies?
Client/server computing, packet switching, and TCP/IP and related communications standards for linking networks and computers
Some firms, like Ernst and Young, use ______ to carefully collect and maintain data in such a way that they can be used as evidence in a court of law, on the behalf of a company or government agency.
Computer forensics
As a way to ensure that data transfers occur quickly, some companies employ _____ to determine the priority of data so important data is sent more quickly than less important data.
Deep packet inspection
Which of the following examine(s) data files and sorts out low-priority online material while assigning higher priority to business-critical files?
Deep packet inspection
Which of the following is NOT a security threat posed by the use of the iPhone, iPad, and other mobile computing devices in the workplace?
Dictating what kind of data an app can access inside its sandbox domain.
Which single word below best describes Web 2.0?
Dynamic
In this video, Kevin describes _____ as a set of integrated software modules that support nearly all of their organization's business processes.
ERP
Improving the tracking of employee training could involve adopting enterprise software focused on _______________________.
Employee relationship management
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
With regard to ERP implementation, which of the following is false?
Firms see immediate operating efficiency and associated profits when first implementing an ERP application.
If your financial institution shares your financial records without your permission, this is considered a ________________ violation.
Gramm-Leach-Bliley Act
The _____ mandates that financial services firms ensure security and confidentiality of customer data.
Gramm-Leach-Bliley Act
Which of the following is NOT one of the ways in which next-generation enterprise application vendors are delivering more value?
Making their software easier to customize
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
______________ are supported by enterprise systems that includes procurement and inventory management.
Manufacturing and production processes
Business processes supported by enterprise systems related to credit checking are associated with __________________.
sales and marketing processes
Identifying the most profitable customers would utilize the _____________ of a CRM system.
sales force automation
A(n) _________________ policy identifies and ranks information risks and goals.
security
One authentication technology that is about the size of a credit card and contains a chip containing access permission is called ___________________.
smart card
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
social engineering
Facebook and Twitter are both companies that enable users to join up with a larger community. The formal name for this type of organization is called __________________.
social networking
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.
spoofer
In an effort to ___________ critical business processes, Coca-Cola implemented an SAP enterprise system
standardize
Activities related to procuring materials and refining these materials into finished projects to distribute to retail outlets are a firm's ________________.
supply chain
A hub is often used as a connection point between networked computers. A _________ is very similar, but contains more advanced capabilities/intelligence.
switch
ERP implementations introduce _____ which are large expenses associated with jumping from one vendor to another when implementing an ERP system.
switching costs
One finding from Alcoa's enterprise system found a positive correlation between ______________ and quality.
training
The signal from your iPod earphone is a(n):
analog signal.
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.
In this video dramatization, Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments?
customer relationship management (CRM)
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
cybervandalism
Using SAP to help determine customers' demand for its products is called ____________ planning.
demand
A ________ is a set of rules that programs on two communicating devices follow.
protocol
A just-in-time strategy means:
raw materials would arrive just-in-time to be transformed into a product and the product would ship as soon as completed.
What is Secure Hypertext Transfer Protocol?
A protocol for encrypting data transferred over the Internet
_________________ tracks and coordinates the delivery process and associated financial information.
A supply chain execution system
If you are purchasing a router that can provide wireless Wi-Fi at up to 11 Mbsp (but not over), you would need to purchase an __________ router.
802.11b
In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety?
An underground wireless Wi-Fi network
Which type of enterprise software would allow you to analyze Customer Lifetime Value (CLTV)?
Analytical CRM
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
If your computer allows authentication using your fingerprint, this technology is considered __________________.
Biometric authentication
802.15 is the popular networking standard also known as ________________.
Bluetooth
A common wireless networking standard, _______ is generally used for PANs.
Bluetooth
Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables?
Bluetooth
Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain?
Bullwhip effect
In addition to developing a policy for restoring computer and communication services, some companies go a step further with _____, which focuses on how they can get the business operations up and running again after a disaster.
Business continuity planning
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Bliley Act
If your doctor shares your medical records without your permission, this is considered a ________________ violation.
HIPAA
_______________ requires that your patient records be protected and saved for six years.
HIPAA
What outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data?
HIPAA Act
What is the name of the organization responsible for assigning public IP addresses?
ICANN
The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000.
ILOVEYOU
The domain name system converts domain names to ________________________.
IP addresses
Which of the following is false concerning transmission of electronic data?
IP handles the data moving between computers, and TCP handles packaging of data at each end of the transmission.
Which of the following is FALSE about the TCP/IP protocol?
IP helps to recover any packets that are lost or damaged during transmission.
If you are renting a home while going to college and would like to connect to the Internet, you will need to contact a(n)______________ such as EarthLink, NetZero, or AT&T to connect.
ISP
________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer.
Input controls
Which of the following is NOT formally included as business processes supported by enterprise systems?
Instructional technology processes
Instead of sending an entire file in one big chunk across the Internet, __________ is used which dices the file up into little pieces that are sent independently across the communications paths, and then reassembled when they reach their destination.
Packet switching
A supply chain driven by actual customer orders or purchases follows which model?
Pull-based model
What type of systems provide technology for tracking the movement of goods throughout the supply chain?
RFID
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
Which of the following is an important capability for service-category business processes that are found in most major CRM software products?
Returns management
Which of the following TCP/IP application-layer protocols is used for email transmission?
SMTP
What are the three general business functions that CRM software serves?
Sales, customer service, and marketing
__________________ was created as a result of financial scandals such as Enron and WorldCom.
Sarbanes-Oxley
_____________ provides rules related to the creation of financial statements to help avoid fraud.
Sarbanes-Oxley Act
Connecting customer conversations in Twitter to CRM processes is called ____________.
Social CRM
_________________________ systems track the flow and status of products through the distribution process.
Supply chain execution
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides applications services.
Which of the following is FALSE about the Domain Name Service (DNS)?
The first name in the domain name is the organization name.
Which is the BEST definition of hertz?
The number of cycles per second that can be sent through a medium
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
According to this video, which of the following statements is true regarding enterprise resource planning systems?
They integrate data with a centralized database.
Which of the following is NOT one of the characteristics of enterprise applications that cause challenges in implementation?
They support "best practices" for each business process and function.
A _______________ is a program that seems like a normal program, but does something completely unexpected.
Trojan horse
What is Pharming?
Users are redirected to a phony web page even when the correct URL is typed in.
It is possible to use a special secure, encrypted network, a _____, which works on the public network, like the Internet.
VPN
Which of the following is an opportunity for threats to gain access to assets?
Vulnerability
One promising prediction for the future is that _____ will bring digital information, in all forms, together into a single, meaningful, experience.
Web 3.0
Because it is difficult to lay cable or set up numerous Wi-Fi networks in rural areas of the U.S., ______ becomes a more viable option as it has a range of approximately 30 miles.
WiMax
A(n) _________________ policy would indicate if you are able to use your work computer to access social media websites.
acceptable use
Electronic evidence on computer storage media that is not visible to the average user is called ________.
ambient data
Because so many Web pages use databases, _____ is a major malware threat since poorly coded Web application software is vulnerable.
an SQL injection attack
A(n) __________________ is a way to communicate in a network that is recognized by a continuous waveform:
analog signal
In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____.
analog signal
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes:
analytical customer relationship management applications.
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication.
biometric
According to the information in this video, computers represent data using _____.
bits
Shopping _______ use intelligent agent software to help people filter and discover information about potential products.
bots
The phenomenon of perceived demand that changes as it passes across the supply chain is called the ________________ effect.
bullwhip
When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the _________________________.
bullwhip effect
Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack.
denial-of-service
Bandwidth is determined by:
determining the difference between the highest and lowest frequency on a channel.
Network signals that are represented by on-off pulses indicate a(n):
digital signal.
A(n) ______________ specifically addresses plans for power outages, floods, fire, and other calamities.
disaster recovery plan
Delivering products to retail stores is considered the _____________ portion of the supply chain.
downstream
As Kevin explains, _____ processes support activities in multiple departments and span an organization
enterprise
ERP stands for ___________________________________.
enterprise resource planning
According to the information provided in this video, any business that has an online presence is at risk of _____.
exposure to hacker activity denial-of-service attack unauthorized data disclosure loss of customer data *all of the above*
The business processes supported by enterprise systems most closely related to financial statements and the Sarbanes-Oxley Act include _________________.
financial and accounting processes
Using a combination of hardware and software, _______ are able to control incoming and outgoing data on a network.
firewalls
Bandwidth transmission speed is measured in ______________.
hertz
The measurement ____________ is equivalent to one cycle of the medium.
hertz
Business processes supported by enterprise systems related to travel expense reporting are associated with __________________.
human resources processes
Mary's company is implementing an ERP system to achieve which main business objective?
improved decision making
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
Target was attacked by hackers who installed ___________ in the company's security and payments system.
malware
Business processes supported by enterprise systems related to quality control are associated with __________________.
manufacturing and production processes
Today's broadband in households allows for connections of up to 15 ________________ per second.
million bits
As Zero and One explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.
modem
At its most basic level, a(n) _________ simply consists of two computers that are connected together.
network
Microsoft Windows Server and Linux are examples of:
network operating systems.
Microsoft Windows Server and Linux are both considered examples of ____________.
network operating system
Public key encryption uses __________________.
one public and one private key
Analytical CRM applications are based on data from _____________________.
operational CRM systems
In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.
packet switching
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________.
packet switching
Using parts of CRM software to help maximize efficiencies with selling partners would include _____________ management.
partner relationship management
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing
Which of the following could represent a current IP address?
207.46.250.119
If you want your cell phone to transmit up to 100 megabits/second downloads, you would need to upgrade to a(n) _____________ network.
4G
Unfortunately, a majority of enterprise applications deliver __________ percent or less of the expected benefits.
50
Twisted pair wire, also known as ____________, is the most common 10 Mbps LAN cable on the market today.
CAT 5