Ch.7-Ch-9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Caroline's personal laptop was attacked by malware. When she got it fixed from the service center, the computer technician advised her to install software that would detect and prevent malware from attacking her system. Which of the following software did the technician advised her to install?

Antivirus software

​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.

Authentication

Jamie uses a form of encryption technique that requires him to have two keys. He shares one key with the senders of the message, so that they can use it to encrypt the message. He uses his private key to decrypt the received message. Which of the following encryption methods is being exemplified in this scenario?

Public key encryption

Which of the following best describes public key encryption?

Public key encryption is a more secure form of encryption that uses two keys, one shared and one totally private. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

Which of the following is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver?

Encryption

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?

Gramm-Leach-Bliley Act

Which of the following best describes a firewall?

It is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

​Unfortunately, nearly half the enterprise applications deliver less than​ __________ percent of the expected benefits.

50

Which of the following notations could represent a current IP​ address?

A: 207.46.250.119

The average ERP project takes​ ___________ months to complete.

A: 21

Customer relationship management applications that use customer data to improve business performance are best described as​ ________.

A: Analytical customer relationship management applications

Information systems controls are both manual and automated and consist of general and application controls. Which of the following best describes application controls?

A: Application controls include both automated and manual procedures that ensure that only authorized data are completely and accurately processed.

Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply​ chain?

A: Bullwhip effect

Which of the following is NOT considered a next-generation enterprise application?

A: Employee relationship management systems

Just-in-time strategies are difficult to implement because of __________.

A: Inefficiencies

Which statement about public key encryption is​ FALSE?

A: On receiving the message, the recipient uses the public key to decrypt it.

The upstream portion of an organization's supply chain includes the company's __________.

A: Suppliers

​_________________________ systems help a firm to​ analyze, model, and optimize its supply chain.

A: Supply chain Planning

​_________________________ systems track the flow and status of products through the distribution process.

A: Supply chain execution

Which of the following best describes supply chain execution systems?

A: Supply chain execution systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.

Which of the following best describes supply chain planning systems?

A: Supply chain planning systems enable the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans.

Blueberry Inc. is a candy making company in Texas. The company's IT department implemented new SAP ERP enterprise software within the company. Which of the following will best support the company in reaping maximum benefits from the new enterprise software?

A: The company changing the way it works to conform to the business processes defined by the software

Which of the following is NOT addressed by a business continuity​ plan?

A: The technical issues involved in keeping systems up and running

Which of the following is NOT a characteristic of enterprise applications that cause challenges in​ implementation?

A: They support best practices for each business process and function

A​ company's suppliers and the​ suppliers' suppliers are considered the​ _____________ portion of the supply chain.

A: Upstream

__________ is/are networks of interconnected wireless devices with built-in processing, storage, and radio frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces.

A: Wireless sensor networks (WSNs)

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

A: ambient data

Tools enabling a business to link customer conversations, data, and relationships from social networking sites to CRM processes are called __________.

A: social CRM

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.

A: social engineering

The upstream portion of an organization's supply chain includes the company's __________.

A: suppliers

A company needing a network to connect its offices in Montana, Idaho, and Utah would require a ..........

A: wide area network

One finding from​ Alcoa's enterprise system found a positive correlation between​ ______________ and quality.

Training

An individual posing as an online gamer accesses information stored in an unsuspecting user's computer by placing a program in his hard disk that appears to be legitimate. The system functions normally with the program performing underlying functions. The malware used by the individual is referred to as a(n) __________.

Trojan horse

​A(n) _______________ is a program that seems like a normal​ program, but does something completely unexpected.

Trojan horse

__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes.

Unified communications

__________ deliver(s) voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks.

Voice over IP (VolP)

Which of the following is an opportunity for threats to gain access to​ assets?

Vulnerability

__________ is/are valuable in areas such as monitoring environmental changes, monitoring traffic or military activity, protecting property, efficiently operating and managing machinery and vehicles, monitoring supply chain management, or detecting biological, chemical, or radiological material.

Wireless sensor networks (WSNs)

Taking over computers and directing those systems to overload a network is defined as​ a(n) _____________ attack.

denial of service attack

If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed .... Meters .

100

__________ consists only of computers, a connection medium, network operating system software, and either a hub or a switch.

A basic network

Daniel wants to establish a broadband connection between his computer and the local ISP. He decides to set up a connection that can operate over his existing telephone lines to carry voice, data, and video at transmission rates ranging from 385 Kbps to 40 Mbps. Which of the following will best help Daniel establish such a connection?

A digital subscriber line (DSL)

Which of the following best describes a security policy?

A security policy consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.

What is the difference between a switch and a hub?

A switch has more intelligence than a hub and can filter and forward data to a destination on the network.

Which of the following best describes operational CRM?

A: A system for automating fundamental business processes like marketing, sales, and support for interacting with the customer

Matrix Inc. is a software company in California. The company recently set up an enterprise system to support its business activities. Which of the following would typically be a consequence of the company setting up an enterprise system?

A: An increase in customer satisfaction

Enterprise software includes a database and thousands of predefined​ ________________.

A: Business Processes

In enterprise applications, tools for flexible reporting, ad hoc analysis, interactive dashboards, what-if scenario analysis, and data visualization are a part of __________.

A: Business intelligence tools

Which term refers to the measurement of the number of customers who stop using or purchasing products or services from a​ company?

A: Churn rate

Delivering products to retail stores is considered the​ _____________ portion of the supply chain.

A: Downstream

Improving the tracking of employee training could involve adopting enterprise software focused on which of the​ following?

A: Employee relationship management

__________ deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.

A: Employee relationship management

Which of the following statements about the time and cost of implementing enterprise applications is true?

A: Enterprise applications involve complex pieces of software that are very expensive to purchase and implement.

Which of the following statements about the implementation of enterprise applications is true?

A: Enterprise applications require not only deep seated technological changes but also fundamental changes to the way the business operates.

ERP stands for :

A: Enterprise resource planning

An ............ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database.

A: Enterprise system

Which of the following is a critical security function of senior management in an​ organization?

A: Establishing the security policy and managing risk

Business processes supported by enterprise systems related to travel expense reporting are associated with​ ________ processes.

A: Human resource

Which statement about the​ TCP/IP protocol is​ FALSE?

A: IP helps recover any packets that are lost or damaged during transmission

Although it can be​ risky, a​ __________________ strategy is based on knowing exactly when components would arrive within the supply chain.

A: Just in time

Business processes supported by enterprise systems related to quality control are associated with​ ________ processes.

A: Manufacturing and Production

Which of the following scenarios illustrates a drive-by download?

A: Milly copies a file from the Internet to her PC, and, in the process, her PC gets infected by malware.

Which of the following is NOT a security threat posed by the use of the​ iPhone, iPad, and other mobile computing devices in the​ workplace?

A: Mobile devices may indicate what kind of data an app can access inside its sandbox domain.

With regard to the primary components of a comprehensive CRM, a system for automating fundamental business processes like marketing, sales, and support for interacting with the customer is called __________.

A: Operational CRM

Enterprise applications require organizations to make many changes. Which of the following is NOT one of the needed​ changes?

A: Organizations must adapt to minor technological changes

BlueBerry Inc. is a candy manufacturing company in New York City. The company sells its products to its customers through distributors and retailers. Which of the following comprehensive CRM packages will best assist the company in enhancing its collaboration with the distributors and retailers?

A: Partner relationship management

A supply chain driven by actual customer orders or purchases follows which​ model?

A: Pull based model

Which of the following is true of the effects of the customer relationship management systems on organizations?

A: Reduced direct marketing costs

Which of the following is an important capability for​ service-category business processes that are found in most major CRM software​ products?

A: Returns management

Business processes supported by enterprise systems related to credit checking are associated with​ ________ processes.

A: Sales and Marketing

What are the three general business functions that CRM software​ serves?

A: Sales, customer service, and marketing

Which of the following best describes social CRM?

A: Social CRM are tools enabling a business to link customer conversations, data, and relationships from social networking sites to CRM processes.

In an effort to​ ___________ critical business​ processes, Coca-Cola implemented an SAP enterprise system.

A: Standardize

Which of the following statements about supply chain management systems is true?

A: Supply chain management (SCM) systems automate the flow of information among members of the supply chain so they can use it to make better decisions about when and how much to purchase, produce, or ship.

Which statement about digital certificates is​ FALSE?

A: The CA verifies a digital certificate user's identity online.

__________ is a phenomenon in which information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain.

A: The bullwhip effect

Education being represented by .edu and business represented by .com are examples of​ ________.

A: Top level domains

Which of the following is a method of interaction with the customer, such as telephone, email, customer service desk, conventional mail, Facebook, Twitter, Web site, wireless device, or retail store?

A: Touch point

Which type of enterprise software would allow you to analyze customer lifetime value​ (CLTV)?

A: analytical CRM

Which of the following examines data files and sorts out​ low-priority online material while assigning higher priority to​ business-critical files?

A: deep packet inspections

Which of the following is NOT one of the ways in which​ next-generation enterprise application vendors are delivering more​ value?

A: making their software easier to customize

4G networks differ from 3G networks in that 4G networks __________.

A: provide more than enough capacity for watching high definition videos on smartphones

In a(n) __________ supply chain model, actual customer orders or purchases trigger events in the supply chain. Transactions produce and deliver only what customers have ordered and move up the supply chain from retailers to distributors to manufacturers and eventually to suppliers.

A: pull-based

Establishing a risk level of malware threats to an organization is an example of​ _______________.

A: risk assessment

__________ defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance.

An acceptable use policy (AUP)

Symphoniz, Inc., a software company, has installed a new device at the company's entrance. This device replaces the smart cards that provided access to the company's premises. This device requires every employee to place their palm on a scanner-like device. Once an individual's palm is scanned, the fingerprints are compared with the ones stored in the database. If they match, the individual would be granted access. If not, the individual would be required to report to the security office to complete entry formalities. Which of the following processes is being illustrated in this scenario?

Biometric authentication

Which term refers to the wireless networking standard that is popular for creating small​ personal-area networks?

Bluetooth

__________ focuses on how the company can restore business operations after a disaster strikes.

Business continuity planning

The Internet is based on which three key​ technologies?

Client/server computing, packet switching, and standard communication protocols

Which of the following scenarios illustrates denial of service (DOS), a type of security loss?

Computer worms infiltrating a network with so much artificial traffic that legitimate traffic cannot get through.

Network signals that are represented by on-off pulses indicate which type of signal?

Digital

Which of the following is a feature of Web​ 2.0?

Dynamic content

Which of the following is true of Global System for Mobile Communications (GSM)?

GSM's strength is its international roaming capability.

Information systems controls are both manual and automated and consist of general and application controls. Which of the following best describes general controls?

General controls govern the design, security, and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.

​_______________ requires that your patient records be protected and saved for six years.

HIPAA

Which of the following best describes HIPAA?

HIPAA outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans.

Which of the following statements about information systems security vulnerability is true?

Hackers can unleash denial-of-service (DoS) attacks or penetrate corporate networks, causing serious system disruptions.

__________ are very simple devices that connect network components, sending a packet of data to all other connected devices.

Hubs

What is the name of the organization responsible for assigning public IP​ addresses?

ICANN

The​ ________________ virus, a rather nice sounding​ virus, was one of the most famous malwares that was detected in 2000.

ILOVEYOU

Which of the following statements about RFID is FALSE?

In inventory control and supply chain management, RFID systems capture and manage less detailed information about items in warehouses or in production than barcoding systems.

Which of the following statements about the business value of security and control is true?

Information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability.

If you were building a network intended to service two buildings that were next to each​ other, you would construct a​ ________.

Local area network

​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.

Malware

An individual wanting to enable his desktop PC at home to access the Internet must do which of the​ following?

Obtain a subscription with an Internet Service Provider (ISP)

The method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

Packet switching

Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.

Physical transmission media

Which technology has recently been applied to inventory​ control, supply chain​ management, and the Internet of​ Things?

RFID systems

__________ provide(s) a powerful technology for tracking the movement of goods using tiny tags with embedded data about an item and its location.

Radio frequency identification (RFID) systems

Which of the following best describes radio frequency identification (RFID) systems?

Radio frequency identification (RFID) systems are technology that uses tiny tags with embedded microchips containing data about an item and its location to transmit short-distance radio signals to special readers that then pass the data on to a computer for processing.

​____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.

Ransomware

Which of the following best describes risk assessment?

Risk assessment determines the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. It is used to determine the cost/benefit of a control.

A particular malware threat looks for weaknesses in poorly coded Web application software that get exposed when the Web application fails to filter the data entered by a user on a Web page. This results in malicious program code entering into the company's systems and networks. Which of the following best refers to this malware threat?

SQL injection attack

Which law provides rules related to the creation of financial statements to help avoid​ fraud?

Sarbanes-Oxley Act

__________ refers to software that covertly gathers information about a user through an Internet connection without the user's knowledge.

Spyware

A company needing reliable digital communication service levels at speeds of 1.5 Mbps would probably need to lease a dedicated​ ________ line.

T1

__________ are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels.

T1 and T3 lines

Which of the following best describes the Gramm-Leach-Bliley Act?

The Gramm-Leach-Bliley Act requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.

Which of the following is NOT a function of the Internet service provider (ISP)?

The ISP provides application services

__________ imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.

The Sarbanes-Oxley Act

Bandwidth is determined by calculating which of the following?

The difference between the highest and lowest frequency on a channel

Which statement about the Domain Name Service​ (DNS) is​ FALSE?

The first name in the domain name is the organization name

Which of the following best defines​ hertz?

The number of cycles per second that can be sent through a medium

Which of the following statements is true of client/server computing?

The server sets the rules of communication for the network.

The four-part numeric address indicating a unique computer location on the Internet is called __________.

an Internet Protocol (IP) address.

The signal from your iPod earphone is​ a(n) ________ signal.

analog signal

​A(n) ________ signal is a way to communicate in a network and is represented by a continuous waveform

analog signal

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.

biometric

Bluetooth differs from WiMax in that Bluetooth __________.

can only link up to eight devices within a 10-meter area

Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.

click fraud

The Domain Name System (DNS) __________.

converts domain names to IP addresses

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.

cybervandalism

A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.

keylogger

At its most basic​ level, a(n)​ _________ simply consists of two or more computers that are connected together.

network

Microsoft Windows Server and Linux are examples of​ ________.

network operating systems

3G networks differ from 4G networks in that 3G networks __________.

offer fair transmission speeds for browsing the Web and online shopping, but are too slow for videos

Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small __________.

personal area networks (PANs)

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.

phishing

A​ ________ is a set of rules that programs on two communicating devices follow.

protocol

If you wanted to have connectivity in your home or​ apartment, you would need a​ _________________ to move packets of data to your different devices.

switch

The traditional telephone system, mobile cellular communication, wireless local area networks, videoconferencing systems, a corporate Web site, intranets, and extranets are all components of __________.

the networking infrastructure for a large company

The Internet is the most universal and powerful __________.

wide area network

A​ __________ is a unique type of malware that replicates itself from one computer to another.

worm


संबंधित स्टडी सेट्स

10. AWS CCP Knowledge Review - Shared Responsibility Model

View Set

AZ-900: Microsoft Azure Fundamentals (Q&A Series - 2023)

View Set

Fin 341 Chapter 5 and rest of section 3

View Set

Evaluate schema theory with reference to research studies

View Set

ACCT 212 Chapter 8: Master Budgeting

View Set