MIS test 2
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. -Data administration -Authentication -Usurpation -Access Control -Data encryption
Data administration
Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax is most likely to have an RFM score of ________. 155 555 515 511 151
155
________ is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence. A classful application A trans enterprise application An OLAP application A reporting application A NoSQL application
A reporting application
________ is a standard set of terms and graphical notations for documenting business processes. A) Business Process Modeling Notation (BPMN) B) Business Process Execution Language (BPEL) C) International Organization for Standardization (ISO) 9000 D) International Business Modeling Notation (IBMN) E) Component Object Model (COM)
Business Process Modeling Notation (BPMN)
________ set the stage for the requirements for any information systems and applications that need to be created or adapted. -Business reports -Business repositories -Business process models -Business requirements -Business policies
Business process models
Capturing customers' clicking behavior is referred to as ________? Dimensional data Attributed data Outsourced data Metadata Clickstream data
Clickstream data
________ are small files that enables a browser to access Web sites without having to sign in every time. -Botnets -Web bugs -Cookies -Public keys -Payloads
Cookies
In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. -diamonds -ovals -solid arrows -circles -dotted arrows
Correct solid arrows
Which of the following statements is TRUE about data marts? -Data marts contain only metadata for data warehouses. -Data mart users possess the data management expertise that data warehouse employees have. -Data marts address the needs of a particular department or functional area of a business. -A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. -Data marts are larger than data warehouses.
Data marts address the needs of a particular department or functional area of a business.
A ______ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. -Data Bus -Data Mine -Data Warehouse -Data Link Layer -Data Model
Data warehouse
Which of the following statements is TRUE about the position definitions component of human safeguards? -All employees must be provided with uniform, general training on security regardless of the sensitivity of their positions. -Holding public users of Web sites accountable for security violations is easy and inexpensive. -Security considerations should not be part of the hiring process. -Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. -System administrators should retain user accounts after an employee has been terminated.
Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
Which of the following statements is TRUE of information systems? -Information systems should consist of only one application. -Information systems should be bought entirely off-the-shelf. -Every business process should include at least one information system. -Every information system has at least one application. -Information systems include all business process activities.
Every information system has at least one application.
Achilles Gear has four major retail customers. Based on the following RFM scores of these customers, the sales team at Achilles' should attempt to up-sell more expensive sporting goods to ________. -Pelican Stores with an RFM score of 113 -WindyRiver Sports with an RFM score of 225 -Five Star Stores with an RFM score of 214 -Goalkeeper with an RFM score of 551 -Cable Sports Inc. with an RFM score of 545
Goalkeeper with an RFM score of 551
________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. -Loss of infrastructure -Unauthorized data disclosure -Unauthorized data encryption -Denial of service -Incorrect data modification
Incorrect data modification
Which of the following statements is TRUE of the swim-lane layout used for modeling business processes? -It models knowledge flows -Each role in the business process has to share the swim-lane with other roles. -It draws attention to the interactions among components of the diagram. -All activities for a given role are repeated in all the swim-lanes. -It complicates the process diagrams.
It draws attention to the interactions among components of the diagram.
Which of the following is a characteristic of BigData? It is processed using traditional techniques. It is unstructured. It is usually around 100 gigabytes in size. It is generated rapidly. It is typically only text-based.
It is generated rapidly
Which of the following is TRUE of scrum? -It is generic enough to be used for the development of business processes, information systems, and applications. -It was developed to overcome the problems that occur when using the Business Process Modeling Notation (BPMN). -It does not adapt to change easily. -It produces error free systems. -Its work periods are usually three months or longer.
It is generic enough to be used for the development of business processes, information systems, and applications.
Which of the following statements is TRUE about the Secure Sockets Layer (SSL)? -It is used to send sensitive data such as credit card numbers. -It is used in wireless encryption suites. -It is a stronger version of https. -It uses asymmetric encryption exclusively. -It uses one set of encryption keys for multiple sessions.
It is used to send sensitive data such as credit card numbers.
Which of the following statements is TRUE about biometric identification? -It will decline in usage in the future. -It is a relatively inexpensive mode of authentication. -It provides weak authentication. -It involves the use of a personal identification number (PIN) for authentication. -It often faces resistance from users for its invasive nature.
It often faces resistance from users for its invasive nature.
Which of the following statements is TRUE of source data for a business intelligence (BI) system? It refers to the hierarchical arrangement of criteria that predict a classification or a value. It refers to the detailed level of data. It refers to data that the organization purchases from data vendors It refers to the relative strength of data's predictive capabilities. It refers to the organization's metadata.
It refers to data that the organization purchases from data vendors.
_______ is a broad category that includes viruses, spyware and adware. -cookie -malware -crackers -firewall -spam
Malware
An ________ and an OLAP report are the same thing. OLAP array OLAP measure OLAP cube OLAP permutation OLAP dimension
OLAP cube
_____ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. -private keys -personal identification numbers -passwords -usernames CA key rings
Passwords
Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________. -Phishing -Wardriving -Stack Smashing -Sniffing -Hacking
Phishing
________ play a key role in moving development projects through the SDLC or scrum development process. -Systems analysts -Database designers -Programmers -Business analysts -Technical managers
Systems analysts
________ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance. The Singularity Business intelligence systems Moore's Law Knowledge management Expert systems
The Singularity
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. -Phishers -Tibutors -Keyloggers -Pretexters -Wardrivers
Wardrivers
Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall. -blogs -blackboxes -activity logs -honeypots -Rich Site Summary (RSS) feeds
activity logs
Rapid application development, the unified process, extreme programming, and scrum have led to ________. -systems development life cycle (SDLC) -agile development -joint application development -dynamic systems development model -coalesced development
agile development
Which of the following is considered a threat caused by human error? -a virus and worm writer infecting computer systems -an employee intentionally destroying data and system components -a tsunami floods a data center causing total data loss -an employee inadvertently installing an old database on top of the current one -a hacker breaking into a system to steal for financial gain
an employee inadvertently installing an old database on top of the current one
With ________, the sender and receiver transmit a message using different keys. -a Caesar shift -asymmetric encryption -a stream cipher -symmetric encryption -a block cipher
asymmetric encryption
A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. A) business developer B) business analyst C) business application programmer D) business supervisor E) business administrator
business analyst
During the requirements definition stage of developing an information system, the project team will consist mostly of ________. -systems engineers -test engineers and business users -database designers and administrators -finance and account managers -business and systems analysts
business and systems analysts
Packet-filtering firewalls ________. -examine the destination address but not the source address -seldom examine the data or the addresses of the message are the most complex type of firewall -can examine the contents of VPN packets -can filter both inbound and outbound traffic
can filter both inbound and outbound traffic
In ________, statistical techniques can identify groups of entities that have similar characteristics. metadata matching cluster analysis supervised data mining regression analysis neural networks
cluster analysis
The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions. -component design -system maintenance -system definition -system implementation -requirements analysis
component design
Which of the following are the dimensions of feasibility? -operational, strategic, technical, and tactical feasibility -planning, process, technical, and schedule feasibility -cost, schedule, technical, and organizational feasibility -schedule, process, technical, and competitive feasibility -technical, process, procedural, and operational feasibility
cost, schedule, technical, and organizational feasibility
According to Brooks' Law, adding more people to a late project will ________. A) create diseconomies of scale B) reduce managerial overhead C) speed up the project D) reduce the need for coordination E) guarantee efficiencies
create diseconomies of scale
In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying Y, sell them X." double-sales cross-selling value added selling quid pro quo break-even
cross-selling
In a business process, a ________ shows the movement of data among activities and repositories. -activities -repository -data flow -control flow -role
data flow
Which of the following is a fundamental category of business intelligence (BI) analysis? cataloging data hiding automation encapsulation data mining
data mining
In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization's BI data. information tank Web server OLAP cube data warehouse neural network
data warehouse
_____ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. -database administration -data encryption -data authentication -database normalization -data access control
database administration
The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.
define the goals and scope
The first phase of the systems development life cycle (SDLC) is ________. -defining the system -implementing the system -determining the requirements -maintaining the system -design system components
defining the system
Problematic operational data is termed as ________. metadata septic data dirty data rough data granular data
dirty data
In business process management (BPM), an as-is model ____________. -represents the desired state of a business process -documents the existing business process -represents the ideal state of a business process -predicts the likely future state of a business process -contrasts the former and current states of a business process
documents the existing business process
the remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. dynamic accurate informal specific precise
dynamic
A sales report that is current at the time the user accessed it on a Web server is an example of a(n) ________. hybrid market report expert system temporal report static report dynamic report
dynamic report
Which of the following is a critical security function that should be addressed by the senior management of an organization? -sharing the private key with all systems connected to the network -reducing internal systems auditing -establishing the security policy -avoiding the use of perimeter firewalls -creating IS security software programs
establishing the security policy
Which of the following is classified as a technical safeguard? -training -key escrow -passwords -cookies -firewalls
firewalls
Knowledge management (KM) benefits organizations because it ________. -allows suppliers to work according to the organizational policies -improves data integrity, transmission, and valueenables -employees to solve problems and rectify mistakes later -improves process quality and increases team strength -allows distributors to work within the company premises
improves process quality and increases team strength
Which of the following terms is used as a synonym for data mining? parallel processing in databases (PPD) data warehousing data spelunking regression analysis knowledge discovery in databases (KDD)
knowledge discovery in databases (KDD)
in market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. confidence lift loop granularity support
lift
Which of the following are the steps in the business process management (BPM) cycle? -model processes; create components; implement processes; assess results -implement processes; create components; model processes; assess results -create components; model processes; implement processes; assess results -create components; implement processes; model processes; assess results -model processes; implement processes; assess results; create components
model processes; create components; implement processes; assess results
____ presents the largest risk for an organizations infrastructure loss. -electromagnetic pulse weapons -hackers -employees dissatisfaction -competitors -natural disasters
natural disasters
In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. -pilot -phased -parallel -plunge -immersion
parallel
In the context of malware protection, the program code that causes the unwanted actions is called the ________. -bundler -payload -key escrow -bot herder -kernel
payload
In a business process, resources are ________. -collections of related tasks that receive inputs and produce outputs -collections of procedures and activities -the total number of points of work that can be accomplished in each scrum period -data stores within the system -people or computer applications that are assigned to roles
people or computer applications that are assigned to roles
A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________. -appropriating -hacking -pretexting -usurping -sniffing
pretexting
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. -prevent unauthorized encryption -prevent brute force attacks -prevent email spoofing -stop SQL injection attacks -provide physical security
provide physical security
RFM analysis is used to analyze and rank customers according to their ________. motivation and needs socioeconomic status receptivity to promotions purchasing patterns propensity to respond to marketing stimulus
purchasing patterns
Which of the following is an example of a supervised data mining technique? metadata matching regression analysis cluster analysis click streaming market-basket analysis
regression analysis
Which of the following is a personal security safeguard? -using single password for all the sites -disabling operating system updates -removing high-value assets from computers -storing browsing history, temporary files, and cookies -sending valuable data only via email or IM
removing high-value assets from computers
In a business process, a ________ is defined as a collection of something. Selected Answer: -repository -activities -resources -presentations -applications
repository
The project plan which results from defining the system is the input to the ________ phase of the SDLC. -system maintenance -system design -requirement collection -requirements analysis -systems implementation
requirements analysis
Key escrow is a(n) ________. -protocol used to secure communication over the internet -device that prevents unauthorized network access -the creation of related public and private keys -safety procedure that allows a trusted party to have a copy of the encryption key -encryption algorithm that uses both public and private keys
safety procedure that allows a trusted party to have a copy of the encryption key
During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity? -system control -system conversion -system configuration -system overlay -system development
system conversion
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? -the Computer Privacy Act of 2014 -the Privacy Act of 1974 -the Gramm-Leach-Bliley Act -the Sarbanes-Oxley Act -the HIPAA of 1996
the HIPAA of 1996
A ________ involves balancing three critical factors: requirements, cost, and time. -diagnostic plan -test plan -trade-off -work breakdown structure (WBS) -critical path
trade-off
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. -loss of infrastructure -SQL injection -incorrect data modification -unauthorized data disclosure -faulty services
unauthorized data disclosure
Which of the following is one of the keys to successful systems development life cycle (SDLC) projects? -critical path template -internal process auditing -scatter plot -control chart -work breakdown structure
work breakdown structure
A ________ is a type of virus that self-propagates using the Internet or other computer network. -sniffer -worm -mole -phisher -Trojan horse
worm