ISYS 363 Final Exam ! Set 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

black hat

A ______-_____ hacker breaks into computer systems with the intent of causing damage or stealing data.

technology

According to National Institute for Standards ____________ , once a cybersecurity risk assessment has been conducted and the various questions in the risk assessment have been answered, an organization will be able to decide what to protect.

penetration

Activities where white-hat hackers are paid to hack into private networks and applications is referred to as ___________ testing.

firewall

Personal software ________ are typically included with the operating system and can be configured based on user preference.

91%

What percentage of cyberattacks are launched with a phishing email?

85%

What percentage of daily email attachments are harmful for their intended recipient?

Distributed Denial of Service

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

- Store data in different areas across the United States (geographic data redundancy) - Create a business continuity plan - Utilize off-site cloud storage

According to the Federal Emergency Management Agency (FEMA), which of the following are steps businesses can take to help protect systems, data, and information from natural disasters?

leads

CRM software assists organizations in identifying marketing qualified ______ (MQLs)

Consistent Updates to CRM Software

CRM systems and software constantly being updated to help prevent data breaches. Software that is not consistently updated is potentially at risk for data breaches.

43%

What percentage of cyberattacks are aimed at small business?

high

A _____ share of customer or share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors.

cyberattack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

key logger

A form of spyware that records all actions typed on a keyboard is called a

natural

Businesses need to take steps to protect computer systems, data, and information from ___________ disasters.

- Improved visibility - The ability to generate financial reports - Structured compliance architecture

ERP systems can be integrated with financial management systems to provide centralized access and management of financial data. The benefits of this type of integration include which 3 of the following?

- specific, - measurable, - achievable - relevant - time-bound.

SMART stands for

Product/Service Measurments

terms concerning how customer relationship management market analytics are used to develop new products to the correct narrative: Analytics around this data can provide insights about what features to include or improve in a new product or service.

Botnet

A group of computers under the control of a hacker.

DoS (distributive denial of service)

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _____ attack.

bot

A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie

trojan horse virus

A program that appears legitimate, but executes an unwanted activity when activated is called a ________ ______ ______.

- Integration allows for projects to be divided into phases, subprojects, and tasks to make data analysis and project monitoring easier. - Integration provides a centralized location where data is stored and easily retrieved, allowing management to review planning, management, and analysis of an organization's project. - Integration provides management with the ability to assign project management tasks and responsibilities.

Advantages of integrating project management software into an enterprise resource planning system include which 3 of the following?

- Integration allows for projects to be divided into phases, subprojects, and tasks to make data analysis and project monitoring easier. - Integration provides management with the ability to assign project management tasks and responsibilities. - Integration provides a centralized location where data is stored and easily retrieved, allowing management to review planning, management, and analysis of an organization's project.

Advantages of integrating project management software into an enterprise resource planning system include which 3 of the following?

DOS

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ___ attack.

Tiny Banker Trojan

As reported by Andrei Ene, ______ ______ ______(TBT) is one of the worst malware attacks in the last 10 years.

$18,000

Based on the following scenario, choose the correct value for Customer Lifetime Value (CLV). Let's say you are brand loyal and exhibit brand preference for Apple computers. After you graduate high school you decide to purchase a new Toyota MacBook. Apple would like you to purchase another computer from them in the future. The company will likely spend money with the goal of maintaining a customer relationship with you, thus increasing the likelihood that you will purchase another vehicle from them. Your CLV calculation might be $3,000 for each MacBook purchased (average over time) multiplied by six computers over your lifetime, which equals a CLV of _____.

enterprise

Because they facilitate informed business decisions by integrating data from various operational areas within the organization, ___________ resource planning systems allow managers to view reports that are generated from across the organization.

- They have lower IT infrastructure expenses. - Organizations using cloud-based ERP have reduced IT labor expenses. - Cloud-based ERP allows organizations to access reports from remote locations.

Benefits of Cloud-based ERP, over on-premises ERP solutions, include which 3 of the following?

CRM Software

Benefits of integrating ___ into an ERP include better visibility of customer relationships, faster billing, and single source reporting via user customized dashboards.

Saas

Cloud-based ERP solutions are usually offered as ___.

software

Cloud-based ERP systems are a form of as _________ a Service (SaaS).

white hat

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called ______-____ hackers.

False

Computer viruses are not frequently disguised as attachments of funny images, greeting cards, or audio and video files.

value

Customer Lifetime ________ is the total amount an existing customer will spend on an organization's products or services over that customer's lifetime.

- Traditional mail - Social media - Email

Customer interaction encompasses all the communication that takes place between a customer and an organization. This includes which of the following:

cyberwarfare

Cyberattacks that originate and are executed by foreign governments is called state-sponsored ___________ . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

E-commerce operations

Data collected from ___ includes customer information, order history, shipping information, and customer satisfactions measures.

Access

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ___ Translation provides a type of firewall protection by hiding internal IP addresses.

CAD

ERP software integrates several software packages into a single platform. An example of one of these software packages is ___ software, that engineers use in the design process.

HRM

ERP software integrates several software packages into a single platform. An example of one of these software packages is ___ software, that stores employee compensation and performance information.

accounting

ERP software provides value by integrating several software packages into a single platform. An example of one of these software packages is ___ software, that records ledger journaling and billing.

- Structured compliance architecture - The ability to generate financial reports - Improved visibility

ERP systems can be integrated with financial management systems to provide centralized access and management of financial data. The benefits of this type of integration include which 3 of the following?

- Access to data - Customizable - Centralized database

ERP systems help organizations improve operational efficiency in which 3 of the following ways?

resource

Enterprise ________ planning (ERP) is a software that businesses use to manage activities in both the internal and external operational environment.

attainable

In the initiation process of project management the client and project manager determine if the project is SMART. The A in SMART refers to ___.

- Reduces human error - Labor cost reduction - Saves time

Integration of TPS with ERP has many advantages to managers including which 3 of the following?

Proper CRM Administration

It is important to make sure staff who interact with the CRM system are properly trained and that managed access and access-levels are in place.

Server Security

It is important to take security measures to protect data. This can be accomplished by ensuring firewalls and routers are secured and that all software is up to date.

- Steal information - Destroy data - Incapacitate networks and computers

Malware is designed to do which of the following?

malicious

Malware is short for ________ software.

- Worms - Viruses - Trojans

Malware is short for malicious software and is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Common types of malware include:

- Critical files may be automatically deleted - The operating system may not launch properly - Unexpected error messages

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. Symptoms of a computer virus include:

trojan

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

learning

One disadvantage of ERP systems is that they often have steep ___________ curves, making it difficult for users to implement or even comprehend a new system without significant training.

behavioral

One method organizations are using to deal with the increase in cybersecurity threats and the decrease in the effectiveness of traditional security means is through the use of ___________ science in their data and network security policies.

AutoCAD

One of the first computer-aided design programs ever developed was also among the first to be integrated into ERP systems. This popular program is ___

Ransomware

One version of this type of malware encrypts a victims data until a payment is made. Another version threatens to make public a victim's personal data unless a payment is made. This type of malware is called ___>

financial management system software

Regulatory and compliance information can be created and maintained from a centralized location when ___ is integrated into an enterprise resource management solution.

- Create a backdoor into a computer - Remotely control the operations of a computer.

Rootkits are typically used to allow hackers to do which of the following?

Asset

Security risk can be calculated using the following calculation: Risk = Threat x Vulnerability x ______

- Cyberwarfare can cause widespread damage to IT infrastructure. - Cyberwarfare is relatively inexpensive when compared to traditional warfare. - Cyberwarfare is often difficult to trace and identify.

Select the reasons a government may choose to get involved in state-sponsored cyberwarfare.

- Organizations use CLV to determine how much they should spend to acquire new customers versus how much they should spend to retain existing customers. - One of the key metrics used to determine the profitability of an organization's customers.

Select the true statements about Customer Lifetime Value (CLV).

- One of the most popular methods used in ransomware attacks is through phishing. - Ransomware attacks invade computers via Trojan Horse viruses, worms, or by a user opening a legitimate looking email. - Ransomware is malware that makes a computer's data inaccessible until a ransom is paid.

Select the true statements about ransomware attacks.

- Can be used to send warnings or to create conflict between countries. - Originate and are executed by foreign governments. - Attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack

Select the true statements about state-sponsored cyberwarefare.

- According to research by Risk Based security, there were 2037 publicly reported data breaches in the first half of 2020. - In the first half of 2020, data breaches exposed over 27 billion records of information. - The main reason most data breaches occur is due to misconfigured databases and services.

Select the true statements about the risks involved with storing customer data.

- In the first half of 2020, data breaches exposed over 27 billion records of information. - The main reason most data breaches occur is due to misconfigured databases and services. - According to research by Risk Based security, there were 2037 publicly reported data breaches in the first half of 2020.

Select the true statements about the risks involved with storing customer data.

- CRM software is often used to analyze large data sets contained in a database to determine which customers are the most profitable. - CRM systems are used to measure customer profitability.

Select the true statements about the use of CRM in customer profitability analysis.

- Use the same techniques and tools that are used by illegitimate hackers. - The goal of white hat hackers is to find gaps in network security and to test security defenses.

Select the true statements about white hat hackers.

- Often used to find passwords, destroy data, or to bypass firewalls - Often found attached to free downloads and apps - Similar to viruses, but do not replicate themselves

Select what's true about Trojan malware.

- Trojans are designed using some sort of social engineering tactic. - Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities. - Trojans are commonly used by hackers to gain access to systems and devices.

Select what's true about how a Trojan infects a computer system.

- Trojans are designed using some sort of social engineering tactic. - Trojans are commonly used by hackers to gain access to systems and devices. - Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities.

Select what's true about how a Trojan infects a computer system.

- Spear phishing attacks are designed to steal data and some attacks may also be designed to install malicious software on a device. - Spear phishing is a type of email scam that is directed toward a specific person or organization.

Select what's true about spear phishing attacks.

wallet

Share of customer, also known as share of __________ , focuses on getting as much business as possible from fewer customers.

accounting system software

Software designed to handle a variety of financial calculations that are used for reporting and monitoring of business performance including tracking accounts receivable and payable, billing, and payroll along with payment processing, ledger journaling, expenses, and purchase orders are referred to as _________ ________ __________.

sniffer

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

financial

Systems that allow organizations the ability to measure cash flows, calculate tax liabilities, maintain compliance to legal and accounting regulations, and optimize profitability are _____________ management systems.

relationship

Systems that assist organizations to synchronize business operating units relating to customer interaction are customer ___________ management systems.

- CRM - BI - PM

There are a number of different business software applications that can be integrated with an ERP system. Select 3 commonly included application modules.

- Phishing - Trojan Horse

There are multiple ways ransomware attacks can be launched. Which of the following are methods a ransomware attack can be launched?

38%

What percentage of malicious attachments are masked as Microsoft Office files?

Distributed Denial of Service (DDoS) Attack

When a hacker gains unauthorized access and control of a network of computers that are connected to the Internet.

- Marketing - Sales - Service

Which of the following are considered customer interaction metrics? More than one answer can be selected.

- Digital identity theft - Trojan horse viruses - Computer hacking

Which of the following are considered cybercrimes?

- CRM systems provide insights into customer satisfaction metrics - CRM is used to manage critical relationships - Systems assist organizations to help synchronize customer interactions

Which of the following explain the importance of CRM to businesses?

Revenue earned from sales - Costs associated with sales and engagement

Which of the following is the correct formulas for calculating customer profitability?

- CRM software systems track prospective customers (and current customers) through the various stages of the funnel - Organizations often track customer acquisition using a lead generation funnel - Customers can be acquired using a number of approaches including social media, search, affiliate, referral, and email marketing. *

Which of the following statements about CRM systems use in customer acquisition are true?

- Customers can be acquired using a number of approaches including social media, search, affiliate, referral, and email marketing. * - CRM software systems track prospective customers (and current customers) through the various stages of the funnel - Organizations often track customer acquisition using a lead generation funnel

Which of the following statements about CRM systems use in customer acquisition are true?

- Organizations often track customer acquisition using a lead generation funnel - Customers can be acquired using a number of approaches including social media, search, affiliate, referral, and email marketing. * - CRM software systems track prospective customers (and current customers) through the various stages of the funnel

Which of the following statements about CRM systems use in customer acquisition are true?

- A computer virus is software that infects computers and is created using computer code. - Viruses can destroy programs or alter the operations of a computer or network.

Which of the following statements about computer viruses are true?

- An organization's target market shares common characteristics including geographic location, demographic and psychographic backgrounds, and income level - Analysis of customer characteristics is an important part of the target market identification process. - CRM software is often used to identify an organization's target market and to provide critical insights into the profiles of these customers.

Which of the following statements about how CRM systems assist businesses in targeting a market segment are true?

- Organizations must precisely identify their target markets so they best utilize resources when marketing to potential and existing customers.* - CRM systems provide a variety of analytical tools, including those used to identify and understand the target market.* - CRM systems are used to collect data from customer transactions. This data is used for target market identification

Which of the following statements about how CRM systems assist businesses in targeting a market segment are true?

- Phishing scams use legitimate looking email messages to con a user into giving up private information. - Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank.

Which of the following statements correctly describes phishing?

high costs

While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their ___.

- Rootkits - Back door programs - Social engineering

White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include which of the following?

- Tangible assets - Intangible assets

With accounting management software, organizations can not only structure basic accounting information, but track a variety of other resources including which 2 of the following?

- If you receive a suspicious message, contact the institution that the message was allegedly sent from. - Banks and credit card companies will never ask you to provide personal information via email messages. - Contact US-CERT.

You are speaking with a friend about how to protect yourself from phishing scams. Your friend (who works in cybersecurity) gives you some advice about what to do if you receive a phishing message. Which of the following statements would be considered good advice?

Variability

terms concerning how customer relationship management market analytics are used to develop new products to the correct narrative: CRM analytics can be used to test the viability of products or services. This viability check results from the analysis of consumption trends and usage behaviors.

product development

terms concerning how customer relationship management market analytics are used to develop new products to the correct narrative: CRM analytics often give insights that foster innovation. This information can be used by decision-makers to identify strong areas and potential growth areas.

user expirience

terms concerning how customer relationship management market analytics are used to develop new products to the correct narrative: CRM systems can be designed to capture data about why users are buying a product or service and how they are using it.


Ensembles d'études connexes

Chapter 5: Foundations of Employee Motivation

View Set

IGCSE PE: Social, Cultural and Ethical Influences

View Set

RPA 4: Immunity & Epidemiology (Lect. 11-13)

View Set

Career development module questions

View Set

A Man for All Seasons - Thomas More Study Guide

View Set

RICCI Peds Review Exam 2 - Chapter 37 + 47

View Set

Chp 7: Long-Term Memory (Encoding, Retrieval, & Consolidation)

View Set