BIS 9,10,11,12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many dimensions or categories can the ethical concerns of the digital age be divided into?

5

To assist project managers with determining and evaluating potential risk, the project management body of knowledge (PMBOK) identifies ________ processes.

6

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?

Big Data

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

Who is protected by California's SB-327 for IoT Security and who is accountable for ensuring the guidelines are met?

California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet.

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

Alyssa says that no one would risk selling operable or effective malware programs, even on the Dark Web. Why is she wrong?

Criminal hackers do make money by selling actual malware.

The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the

Digital Millennium Copyright Act (DMCA).

Which Act outlines a plan to protect government information and assets against cyberthreats?

Federal information Security Management Act( FISMA)

What presentation tool can serve as a building block to more sophisticated program management tools?

Flowchart

June, an IT manager at a financial institution, learns that team member Charla has a health issue and needs to take a half day off once a week for a few months. Without violating Charla's privacy, how can June make an ethical decision that maintains a perception of fairness at a very busy time?

Following the Universalist Principle, June can remind the team that flexible hours are available to all members as long as everyone logs their total hours per week.

Many project managers create a flowchart before creating a

Gantt Chart

Which type of chart commonly used by project managers is a horizontal bar chart that shows project activities on the y-axis and time on the x-axis?

Gantt Chart

Which of the following is a benefit to using a Monte Carlo simulation to determine the likelihood of a project completion date?

It forces the project manager to realistically evaluate critical tasks' duration.

Which of the following statements describes a keylogger most accurately?

It is surveillance malware that captures confidential information through keyboard input.

A form of spyware that records all actions typed on a keyboard is called a keystroke

Logger

By displaying activities that have slack, a _________ can help speed the completion of an entire project by directing resources to critical activities.

PERT Chart

Which chart is used to determine and display a critical path in a project?

PERT network Chart

The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?

Phishing

A Gantt chart is fully developed during the ________ phase of the project management process.

Planning

In what stage of the plan-protect-respond cycle forensic analysis conducted?

Responding Stage

Which statement best explains why rootkits can be difficult to detect?

Rootkits are installed on a computer without the user's knowledge.

Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act?

The National Security Agency may not collect mass phone data from United States residents and citizens.

Which statement correctly summarizes the role of the project manager (PM) during the execution stage of the project management process?

The PM monitors progress and resources and adjusts the schedule as needed.

Which 1986 law makes it illegal to intercept calls or messages without a warrant?

The electronic communications Privacy Act

How does a Gantt chart indicate that two activities will be conducted concurrently (at the same time)?

The horizontal bars for each will occupy the same columns (days).

In 1998, the Child Online Protection Act was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?

The law was later found unconstitutional for violating the First Amendment (freedom of speech).

Which principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity?

The principle Of Distributive Justice

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

How do breach and attack simulation technologies help white-hat hackers test security?

They execute thousands of attack techniques continuously to reveal weaknesses.

A program that appears to be legitimate but executes an unwanted activity when activated is called a

Trojan

Which type of network chart allows project managers to redirect resources from processes that are not on the critical path to ones that are on the critical path?

a pert chart

Social engineering is used to target people whom

are not cautious about giving out confidential or sensitive information.

What does an oval represent on a flowchart?

beginning and end

How does earned value management (EVM) track what is called the project "triangle" of scope, time, and cost?

by multiplying the percentage of completion of each activity on the PERT network chart by the total value of the completed activity

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

When conducting an ethical analysis, what is the last step you should take?

deciding and preparing the consequences

On the flowchart, a decision point is depicted by a(n)

diamond

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

Because it allows clients and investors, who might not be familiar with more evolved tools, to visualize the entire project at a glance, one of the first creations of a project manager is a

flowchart

In cybersecurity risk analysis, PML (probable maximum loss) is used to

following a data breach, PML is used to determine the extent of the damage.

Which of the following is the first of the five steps in an ethical analysis?

getting the facts

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

information privacy rights

During which phases of a project is project management software used to increase the efficiency of all team members?

initiation, planning, execution, and closure

The essential function of resource leveling is to

keep the project moving toward completion by reassigning resources.

One surveillance technology that relies on how the user enters data is a

keylogger

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

By entering a project's limiting factors into a project management software system, a manager can receive ________ recommendations.

resource leveling

Every project faces limitations, such the amount of available equipment or environmental constraints. To mitigate these limitations, project managers use software that provides

resource leveling.

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

Which word best describes the nature of projects, given that they have starting points and (hopefully) ending points?

temporary

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).

When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?

the Principle of Virtue

The Act that protects person-to-person wire, oral, and electronic communications is

the wiretap Act

What distinguishes the two main types of cybercrimes?

their frequency (how often they are committed)

What is a company that purchases consumer behavior information from other organizations engaged in?

third party data purchase

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies.

third-party

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election


संबंधित स्टडी सेट्स

ECON 1015 Final Exam - George Chikhladze

View Set

BIOL115: Chapter 3: Protein Structure and Function

View Set

The Bits and Bytes of Computer Networking - Week 2

View Set

Advanced Nutrition Final Exam - Chapters 9 - 13

View Set

Peds - Chapter 18: Growth and Development of the Preschooler

View Set

IS Week 15: Social Media in Marketing

View Set