MIS Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? a. computer fraud and abuse act b. economic espionage act c. electronic communications privacy act d. data security and breach notification act e. national information infrastructure protection act

National Information Infrastructure Protection Act

_______ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation a. analytical b. employee c. operational d. partner e. next-generation

Operational

The intentional defacement or destruction of a website is called a. spoofing b. cybervandalism c. cyberwarfare d. phishing e. pharming

cybervandalism

the bullwhip effect can be countered by a. globalization b. disintermediation c. implementing a CRM d. reducing information uncertainty e. product differentiation

reducing information uncertainty

the Gramm-leach-bailey act: a. requires financial institutions ensure security of customer data b. specifies best practices c. imposes responsibility on companies c. outlines medical security and privacy rules e. identifies computer abuse as a crime

requires financial institutions to ensure the security and confidentiality of customer data

__________ monetizes the value of the data stored by search engines a. TCP/IP b. RSS c. WiMax d. IoT e. Search engine marketing

search engine marketing

Customer service modules in CRM systems provide tools for: a. assigning and managing customer service requests b. capturing prospect and customer data c. identifying profitable and not customers d. managing sales and contact info e. organizing effective marketing campaigns

assigning and managing customer service requests

According to the 2017 identity fraud study by Javelin Strategy & research, how much did consumers lose to identity fraud in 2016? a. $1.6 million b. $16 million c. $160 million d. $1.6 billion e. $16 billion

$16 billion

According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately: a. $900,000 b. $9 million c. $90 million d. $9 billion e. $90 billion

$9 million

Which of the following customer relationship management applications provides analysis for customer data? a. operational CRM b. analytical CRM c. operational SCM d. analytical SFA e. operational SFA

Analytical CRM

Which of the following is used to analyze customer buying patterns? a. CLTV b. analytical CRM c. operational CRM d. demand planning e. SFA

Analytical CRM

The most common web servers today are: a. microsoft IIS and IBM HTTP Server b. WebSTAR and Netscape server c. IBM HTTP server and Apache HTTP Server d. Netscape server and Apache HTTP e. Apache HTTP server and Microsoft IIS

Apache HTTP server and Microsoft IIS

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall? a. NAT b. packet filtering c. deep packet inspection d. stateful inspection e. application proxy filtering

Application proxy filtering

The most appropriate wireless networking standard for creating PANs is: a. I-mode b. IEEE 802.11b c. Wifi d. Bluetooth e. RFID

Bluetooth

The measurement of the number of customers who stop using or purchasing products or services from a company is called: a. switching costs b. churn rate c. CLTV d. switch rate e. turnover percentage

Churn rate

The internet is based on which three key technologies? a. TCP/IP, HTMI, HTTP b. TCP/IP, HTTP, and packet switching c. Client/server computing, packet switching, and the development of communications standards for linking networks and computers d. Client/server computing, packet switching, and HTTP e. Email, instant messaging, and newsgroup

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Computer forensics tasks include all of the following except: a. presenting collected evidence in a court of law b. securely storing recovered electronic data c. collecting physical evidence on the computer d. finding info in a large volume e. recovering data from computers...

Collecting physical evidence on the computer

which of the following is a virus that uses flaws in Windows software to take over a computer remotely a. Sasser b. Zeus c. Cryptolocker d. ily e. Conficker

Conficker

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. a. DDos b. DoS c. SQL d. phishing e. botnet

DDoS

Which supply chain planning function determines how much product is needed to satisfy all customer demands? a. distribution management b. replenishment planning c. demand planning d. order planning e. customer planning

Demand planning

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? a. multiplexing b. packet shifting c. packet routing d. ATM e. packet switching

Packet switching

As described in the chapter case, which of the following did hackers use to gain access to the DNC network? a. trojan horse b. phishing emails c. SQL injection attack d. computer worm e. pharming attack

Phishing emails

Which of the following about RFID is not true?

RFIDs require line-of-sight contact to be read

Which of the following pulls content from websites and feeds it automatically to a user's computers? a. FTP b. RSS c. HTTP d. Bluetooth e. IPv6

RSS

________ is a malware that hijacks a users computer and demands payment in return for giving back access a. trojan horse b. ransomeware c. spyware d. a virus e. evil twin

Ransomeware

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? a. hub b. switch c. router d. NIC e. Modem

Router

From your reading of the chapters opening case, Skullcandy chose enterprise resource planning software from which of the following ERP vendors? a. oracle b. SAP c. IBM d. Microsoft e. inför Global solutions

SAP

Which of the following can be used to help a website achieve a higher ranking with the major search engines? a. VPN b. IAB c. SEM d. SEO E. RSS

SEO

_________ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services a. customer b. SOA c. Marketing d. complex e. SFA

SFA

_______ identify the access points in a wifi network a. NICs b. Mac addresses c. URLs d. UTMs e. SSIDs

SSIDs

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? a. safety stock b. continuous replenishment c. just-in-time strategies d. demand planning e. perfect information

Safety stock

which of the following is not a defining feature of Web 2.0? a. interactivity b. real-time user control c. semantic search d. social participation e. user-generated content

Semantic search

Which process is used to protect transmitted data in a VPN? a. tunneling b. PPP c. VOIP d. Packet switching e. Chaining

Tunneling

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. a. DPI b. MSSP c. NSP d. PKI e. UTM

UTM

Which of the following is the single greatest cause of network security breaches? a. viruses b. user lack of knowledge c. trojan horses d. cyberwarfare e. bugs

User lack of knowledge

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? a. war driving b. sniffing c. cybervandalism d. drive-by tapping e. snooping

War driving

the 802.11 set of standards is known as: a. WLAN b. WSN c. Wifi d. WiMax e. WAN

Wi-Fi

Which of the following is an example of a key logger? a. zeus b. conficker c. sasser d. ily e. crypto locker

Zeus

________ is spyware that logs and transmits everything a user types a. spyware b. trojan horse c. a keylogger d. a worm e. a sniffer

a keylogger

Which of the following is the best description of a protocol in a telecommunications network architecture? a. a device that handles the switching of voice and data in a local network b. a standard set of rules and procedures for control of communications in a network c. a communications service for microcomputer users d. the main computer in a telecommunications network e. a pathway through which packets are routed

a standard set of rules and procedures for control of communications in a network

What are the four layers of the TCP/IP reference model? a. physical, application, transport and network interface b. physical, application, internet, and network interface c. application, transport, internet, and network interface d. application, hardware, internet, and network interface e. software, hardware, network interface, internet

application, transport, internet, and network interface

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: a. click fraud b. DDoS attack c. spear phishing d. pharming e. identity theft

spear phishing

All of the following have contributed to an increase in software flaws except: a. growing complexity of software b. growing size of software programs c. demands for timely delivery to markets d. inability to fully test programs e. the increase in malicious intruders seeking system access

the increase in malicious intruders seeking system access

Concurrent supply chains are made possible by which technology? a. ERP systems b. the internet c. supply-chain management systems d. just-in-time supply chain technologies e. extranets

the internet

Marketing modules in CRM systems provide tools for all of the following except: a. assigning and managing customer service requests b. capturing prospect and customer data c. identifying profitable and not customers d. qualifying leads e. identifying opportunities for cross-selling

assigning and managing customer service requests

Evil twins are A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users.

bogus wireless network access points that look legitimate to users

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the _______ effect a. network b. bullwhip c. ripple d. whirlpool e. diffraction

bullwhip

Operational CRM applications include tools for all the following except? a. sales forces automation b. call center support c. marketing automation d. customer service support e. calculating CLTV

calculating CLTV

The telephone system is an example of a ________ network a. peer-to-peer b. wireless c. packet-switched d. circuit-switched e. client/server

circuit-switched

a salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitors advertising costs up. this is an example of a. phishing b. pharming c. spoofing d. evil twins e. click fraud

click fraud

Selling a customer with a checking account a home improvement loan is an example of: a. operational CRM b. direct marking c. sales force automation d. cross-channel promotions e. cross-selling

cross-selling

A foreign country attempting to access government networks in order to disable a national power grid is an example of: a. phishing b. denial-of-service attacks c. cyberwarfare d. cyberterrorism e. evil twins

cyberwarfare

Client/server computing is a: a. network that connects sensors to desktop computers b. network where centralized mainframe computers have local devices c. centralized model of computing for large corporations d. distributed computing model where clients are linked to one another through a network that is controlled by a network server computer e. centralized computing model where local computers are connected to one another by a network

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? a. churn rate b. customer lifetime value c. cost per lead d. cost per sale e. customer average value

Customer lifetime value

In TCP/IP, IP is responsible for which of the following? a. disassembling and reassembling packets during transmission b. establishing an internet connection between two computers c. moving packets over the network d. sequencing the transfer of packets e. breaking messages down into packets

disassembling and reassembling packets during transmission

The WiMax standard can transmit up to a distance of approximately: a. 30 meters b. 500 meters c. 30 miles d. 5 miles e. 70 miles

30 miles

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. a.2 b. 5 c. 8 d. 15 e. 20

8

Which of the following is a type of ambient data? a. computer log containing recent system errors b. a file deleted from a hard disk c. file that contains an applications user settings d. set of raw data e. data that has been recorded over

A file deleted from a hard disk

Which of the following provides a suite of integrated software modules for finance and accounting, HR, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? a. process management software b. ERP systems c. groupware d. CRM software e. Supply chain management systems

ERP Systems

CRM systems help businesses achieve which of the following business objectives? a. automated accounting processes b. automated production forecasts c. faster time to market d. enhanced supply intimacy e. enhanced customer intimacy

Enhanced customer intimacy

Web browser software requests web pages from the internet using which of the following protocols? a. URL b. HTTP c. DNS d. HTML e. FTP

HTTP

One of more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: a. touch points b. netcenters c. hot points d. wireless hubs e. hotspots

Hotspots

a(n) ____________ is a commercial organization with a permanent connection to the internet that sells temporary connections to retail subscribers a. RSS b. WAN c. NFP d. ISP e. FTP

ISP

Shopping bots use ________ software for searching the Internet. a. web 2.0 b. web 3.0 c. intelligent agent d. comparison e. SEO

Intelligent agent

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? a. web 3.0 application b. IoT application c. BLE app d. GPS app e. RFID app

IoT Application

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy. a. just-in-time b. frictionless c. bullwhip d. safety stock e. streamlined

Just-in-time

4G networks use which of the following standards? A) GSM and LTD B) CDMA and PAN C) LTE and LTD D) T-Mobile and AT&T E) LTE and WiMax

LTE and WiMax

Which of the following is an important capability for sales processes that is found in most SFA modules in major CRM software products? a. returns management b. lead management c. channel promotions management d. events management e. customer satisfaction management

Lead Management

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? a. logging transactions b. managing the supply chain c. lowering network costs d. enabling client communications e. improving employee engagement

Managing the supply chain

Which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner? a. supply chain demand system b. supply chain delivery system c. supply chain planning system d. supply chain execution system e. supply chain optimization system

Supply chain execution system

Which of the following enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product? a. supply chain demand system b. supply chain delivery system c. supply chain optimization system d. supply chain execution system e. supply chain planning system

Supply chain planning system

On which of the following protocols is the internet based? a. TCP/IP b. FTP c. IMAP d. HTTP e. DNS

TCP/IP

a VPN: a. encrypted private network configured within a public network b.more expensive than a dedicated network c. provides secure, encrypted communications using telnet d. is an internet-based service for delivering voice communications e. proprietary networking service technology developed by individual corporations

encrypted private network configured within a public network

Supply chain execution systems provide all of the following functions except: a. generating demand forecasts for products b. tracking flow of finished goods c. managing materials d. managing warehouse operations e. managing the financial info involving parties

generating demand forecasts for products

When hackers gain access to a database containing your personal private information, this is an example of: a. phishing b. spoofing c. social engineering d. identity theft e. pharming

identity theft

Which of the following is not an example of a computer used as a target of crime? a. knowingly accessing a protected computer to commit fraud b. accessing a computer with authority c. illegally accessing stored electronic communication d. threatening damage to protected computer e. breaching confidentiality of protected data

illegally accessing stored electronic communication

The sarbanes-oxley act: a. requires financial institutions ensure security of customer data b. specifies best practices c. imposes responsibility on companies and management to safeguard the accuracy of financial information c. outlines medical security and privacy rules e. identifies computer abuse as a crime

imposes responsibility on companies and management to safeguard the accuracy of financial information.

the business value of an effective supply chain management system includes all of the following except: a. faster time to market b. cost reduction c. supply matched to demand d. improved delivery service e. increased inventory levels

increased inventory levels

Uncertainties in the supply chain often lead to: a. declines in production b. increases in inventory across all tiers c. strategic changes in production plans d. the bull whip effect e. a reduction in safety stocks

increases in inventory across all tiers

A trojan horse: a. A Trojan horse is a software program that appears to be benign but then does something other than expected b. virus that replicates quickly c. malware named for a breed.... d. installs spyware on users' computers e. type of sniffer....

is software that appears to be benign but does something other than expected.

Why isn't overstocking warehouses an effective solution for a problem of low availability? a. does not speed product time to market b. inefficient use of raw materials c. increases sales costs d. it increases inventory costs e. it lowers fill rate

it increases inventory costs

which of the following statements about botnets is not true? a. 80% of the world's malware is delivered by botnets b. botnets are used to perpetrate DDoS attacks c. 90% spam delivered by botnets d. used for click fraud e. it is not possible to make a smartphone part of a botnet

it is not possible to make a smartphone part of a botnet

The backbone networks of the Internet are typically owned by long-distance telephone companies called: a. regional network providers b. enhanced service p c. internet bulk p d. backbone p e. network service p

network service providers

Major CRM products typically have all of the following service capabilities except: a. customer satisfaction management b. returns management c. call center & help desk d. service analytics e. order management

order management

the HIPAA Act of 1996: a. requires financial institutions ensure security of customer data b. specifies best practices c. imposes responsibility on companies c. outlines medical security and privacy rules e. identifies computer abuse as a crime

outlines medical security and privacy rules.

Which of the following is not a characteristic of packet switching? a. packets travel independently of each other b. packets are routed through many different paths c. packet switching requires point-to-point circuits d. packets include data for checking transmission errors e. packets are reassembled into the original message when they reach their destination

packet switching requires point-to-point circuits

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. a. push; pull b. demand; continual c. upstream; downstream d. planning; execution e. maintenance; development

planning; execution

wireless sensor networks (WSNs) are used for the following tasks except a. processing consumer transactions b. monitoring machines c. detecting radioactive materials d. protecting property

processing consumer transactions

A supply chain driven by actual customer orders or purchases follows a ________ model. a. supply-based b. demand-driven c. replenishment-driven d. pull-based e. market-driven

pull-based

A supply chain driven by forecasts of consumer demand follows a ______ model a. pull-based b. build-to-stock c. push-based d. replenishment-driven e. optimized

push-based

As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers. a. raw materials b. intermediate products c. basic products d. natural resources e. nascent products

raw materials

Pharming involves A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake Web sites to ask users for confidential information. D) using e-mails for threats or harassment.

redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

Which of the following statements is not true about search engines? a. they are arguably the internets "killer app" b. they have solved the problem of how users instantly find info on the internet c. they are monetized almost exclusively d. there are hundreds of search engines vying for user attention, with no clear leader having yet emerged e. users are increasingly using search engines on mobile devices

there are hundreds of search engines vying for user attention, with no clear leader having yet emerged

Supply chain planning systems perform all of the following functions except a. establish inventory levels for raw materials and finished goods b. identify the transportation mode c. determine where to store finished good d. determine how much product e. track the physical status of goods

track the physical status of a good

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: a. smart card authentication b. biometric authentication c. two-factor authentication d. symmetric key authorization e. token authentication

two-factor authentication

_______________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. a. wireless networks b. intranets c. virtual private networks d. modems e. unified communications

unified communications

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): a. uniform resource locator b. IP address c. third-level domain d. root domain e. child domain

uniform resource locator

Blockchain refers to a technology that: A) uses a distributed ledger system of transactions. B) uses a centralized data store in the cloud. C) relies on the Internet to provide secure transactions. D) uses existing banking systems to transfer funds. E) relies on peer-to-peer networks.

uses a distributed ledger system of transactions

a(n) _________ is software for locating and managing stored web pages a. web server b. net server c. router d. modem e. hub

web server

When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of: a. sniffing b. social engineering c. phishing d. zero-day vulnerability e. snooping

zero-day vulnerability


Ensembles d'études connexes

How animals work 3 part a chapter 40

View Set

Psychology 20 True/False Questions

View Set

1.4 - Other Financial Institutions

View Set