Mang. Info. Systems
Is the cloud a safer and more secure computing environment than an in-house network
.
Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with
.
List at least three conditions that contribute to data redundancy and inconsistency
1. different meanings in different parts of the organization, 2. different names may be used for the same item, and 3. different descriptions for the same condition
________ is spyware that logs and transmits everything a user types
A keylogger
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced
Administrative
Which of the following statements about wireless security is not true
Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers
In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules
Classifications
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards
Controls
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack
DDoS
the term big data refers to all of the following except
Datasets with fewer than a billion records.
Which of the following focuses primarily on the technical issues of keeping systems up and running
Disaster recovery planning
How does disaster recovery planning differ from business continuity planning
Disaster recovery planning devises plans for the restoration of disrupted computing and communications services. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services. Business continuity planning, on the other hand, focuses on how the company can restore business operations after a disaster strikes.
Explain how two-factor authentication increases security
Explain how two-factor authentication increases security
Explain what the term big data refers to. What benefits does it have, and what challenges does it pose
Explain what the term big data refers to. What benefits does it have, and what challenges does it pose
T/F A NOS must reside on all the local computers in a network
FALSE
T/F In a client/server environment, a DBMS is located on a dedicated computer called a web server
FALSE
T/F In green computing, reducing computer power consumption is not a top priority
FALSE
T/F It is much harder to eliminate a cloud service than to remove functionality from a company's core internal systems
FALSE
T/F Organizations can use existing network security software to secure mobile devices.
FALSE
T/F Smartphones do not have the same security flaws as other Internet-connected devices
FALSE
T/F Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses
FALSE
T/F TCO refers just to the original cost of purchased technology: both hardware and software.
FALSE
T/F VoIP technology delivers voice information in digital form using circuit switching
FALSE
In data mining, which of the following involves using a series of existing values to determine what other future values will be
Forecasting
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices
Green computing
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers
ISP
Interpretations of Moore's law assert that
Interpretations of Moore's law assert that
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?
Lack of flexibility
Have mainframes disappeared
Mainframes have not disappeared. They continue to be used to reliably and securely handle huge volumes of transactions, for analyzing very large quantities of data, and for handling large workloads in cloud computing centers
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?
On-demand
Define outsourcing and explain some of the computing tasks that are well suited to outsourcing.
Outsourcing is the shift of IT infrastructure and systems development to external vendors. This is a good option for companies without the resources or technical capability to perform certain computing tasks. Tasks well suited to outsourcing include Web site hosting, Web design, development of custom software, and software maintenance. More basic tasks such as data entry and call center operation is often outsourced as well. Outsourcing often requires firms to enter into a service level agreement (SLA) that defines the specific responsibilities of the service provider.
Which of the following statements about RFID is not true
RFIDs require line-of-sight contact to be read
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems
Security
In data mining, which of the following involves events linked over time
Sequences
T/F A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic
TRUE
T/F A hub is a networking device that sends packets of data to all other devices on the network.
TRUE
T/F An application server may reside on the same computer as a web server or on its own dedicated computer
TRUE
T/F Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel
TRUE
T/F Biometric authentication uses systems that read and interpret individual human traits
TRUE
T/F Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire
TRUE
T/F DoS attacks flood a network server with thousands of requests for service
TRUE
T/F Fiber-optic cable is more expensive and harder to install than wireless media
TRUE
T/F In a client/server network, a network server sets the rules of communication for the network
TRUE
T/F In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks
TRUE
T/F In cloud computing, accountability and responsibility for protection of sensitive data resides with the company owning the data.
TRUE
T/F It is much harder to eliminate a cloud service than to remove functionality from a company's core internal systems
TRUE
T/F Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down
TRUE
T/F The term data governance refers to the policies and processes for managing the integrity and security of data in a firm
TRUE
T/F billions of Internet-connected sensors
TRUE
List and describe four services that comprise IT infrastructure, beyond physical devices and software applications
Telecommunications services that provide data, voice, and video connectivity. Data management services to store, manage, and analyze data Physical facilities management services, to develop and manage physical installations of technology. IT education services that provide training in use of the systemS
T/F
Telephone networks are based on the same principles as computer networks
Explain the Domain Name System. What are some of the common domain name extensions currently available and what types of services do they designate?
The Domain Name System (DNS) converts domain names to IP addresses. DNS is a hierarchy, with the root domain at the top, top-level domains such as .com and .edu one level below, and second-level domains designate a top-level name and a second-level name, like amazon.com.
The Gramm-Leach-Bliley Act
The Gramm-Leach-Bliley Act
All of the following are typically factors in a firm's decision to engage consulting and system integration services except
The firm's staff knows more about the firm's IT infrastructure than service providers
Which of the following is an example of a legacy system?
Transaction processing system running on a mainframe
T/F server computing is a primary example of decentralized processing
True
Which of the following is the single greatest cause of network security breaches
User lack of knowledge
Which of the following is not a part of the IT infrastructure ecosystem found in firms
Virtual reality systems
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources
Virtualization
_______ are created by combining and customizing components from different online software applications
Web mashups
What is the role of an information systems audit
What is the role of an information systems audit
What are the security challenges faced by wireless networks
Wireless networks are vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. Local area networks (LANs) using the 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software
What are wireless sensor networks? How do they work and what are they used for
Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces. Used for monitoring environmental changes; monitoring traffic or military activity; protecting property; efficiently operating and managing machinery and vehicles; establishing security perimeters; monitoring supply chain management; or detecting chemical, biological, or radiological material
Two-factor authentication utilizes a
a multistep process of authentication
Linux is
an example of open-source software
All of the following are physical components of an RFID system except
bar codes
The Internet of Things (IoT) refers to
billions of Internet-connected sensors
The telephone system is an example of a ________ network.
circuit-switched
IPv6 has been developed in order to
create more IP addresses
A foreign country attempting to access government networks in order to disable a national power grid is an example of
cyberwarfare
List and describe three main capabilities or tools of a DBMS.
data definition, data dictionary, and data manipulation language
What are the drawbacks of cloud computing? Do you think these ever outweigh the benefits, and if so, in what cases
dependence on cloud computing provider and switching costs placing data storage and control in another firm's hands
DBMSs typically include report generating tools in order to:
display data in a more structured and polished format than would be possible just by querying
SaaS refers to
hosting and managing access to software applications delivered over the Internet to clients on a subscription basis
When hackers gain access to a database containing your personal private information, this is an example of
identity theft
The Sarbanes-Oxley Act
imposes responsibility on companies and management to safeguard the accuracy of financial information.
All of the following are issues with the traditional file environment except:
inability to develop specialized applications for functional areas
Implementation controls
include software controls, computer operations controls, and implementation controls
A VPN
is an encrypted private network configured within a public network
Infrastructure-as-a-Service (IaaS):
is one type of cloud computing service where users pay only for the computing capacity they actually use
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization
What are the essential characteristics of cloud computing?
on-demand self-service, ubiquitous network access, locationindependent resource pooling, rapid elasticity, and measured service.
All of the following are specific security challenges that threaten the communications lines in a client/server environment except
phishing
All of the following are specific security challenges that threaten corporate systems in a client/server environment except
radiation
1. different meanings in different parts of the organization, 2. different names may be used for the same item, and 3. different descriptions for the same condition
relational DBMS
In a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join
All of the following are specific security challenges that threaten corporate servers in a client/server environment except
sniffing
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as
software packages
The domain .gov is a
top-level domain
Blockchain refers to a technology that:
uses a distributed ledger system of transactions.