Combo with "Combo with "Info 360 Final Exam" and 2 others" and 3 others

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The comments of consumers in the blogosphere concerning a company's products are called ____________________.

b) Consumer-generated media.

Which of the following is not an example of Web 2.0 applications?

e) AJAX

Which of the following is not a strategy for mitigating the risk of threats against information?

e) Installing an updated operating system.

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.

e) Logic bombs

Refer to Opening Case -- Small Businesses in Danger; Which of the following is not a consequence of poor information security practices?

e) Loss of equipment

Web site that combines content from other Web sites to form new content is called a(n) ______

e) Mashup

Which of the following tools are not used by marketing professionals to compile market research?

e) RSS

Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications?

e) Social commerce

Refer to IT's About Business 8.4 - So You Want to Find a Job: Which of the following is a benefit of searching for a job online?

e) Social networking can help personalize the search.

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?

e) The name of the company spelled backward

Which of the following is not a characteristic of strong passwords?

e) They tend to be short so they are easy to remember.

Many companies are using ________ to capture updated product features and specifications.

e) Wikis

You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?

e) Wikis

In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.

e) distributed denial-of-service

Crowdsourcing

e) presumes that a large number of enthusiasts can outperform a small group of experienced professionals.

In _____, the organization purchases insurance as a means to compensate for any loss.

e) risk transference

Voice and signature recognition are examples of:

e) something the user does.

HR departments use social computing applications to assist them in which of the following activities:

e. e) All of the above

Which of the following is a risk of social computing?

e. e) Consumer-generated content is not edited or filtered

Conversational marketing can take place in which of the following forums?

. e) All of the above

Cybercriminals can obtain the information they need in order to assume another person's identity by:

All of the above are strategies to obtain information to assume another person's identity.

The reliability of the content in Wikipedia, the online encyclopedia, is questionable because

It is difficult to test the authenticity of the content due to the fact that anyone can contribute content.

Refer to Closing Case 1 - Compliance: Which of the following is not an important component of a GRC framework?

Restricing employee use of Web sites.

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?

The site should be an almost exact replica of the IT configuration at headquarters

The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their cold site to minimize downtime should such a disaster hit. Which of the following statements is false?

The site will have all of the company's applications

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources

a) Access

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

a) Alien software

Refer to Closing Case 2 - Computer Espionage: Which of the following is not a technique used in electronic espionage?

a) VPN

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

a) Viruses

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.

a) keyloggers, screen scrapers

Unintentional threats to information systems include all of the following except:

a) malicious software

An information system's _____ is the possibility that the system will be harmed by a threat.

a) vulnerability

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is not on the ________________ list so it cannot be installed.

a) white

Social computing has allowed customers

a. a) To be advocates and influencers.

Which type of social network allows users to edit and contribute content posted to a particular site?

a. a) Wiki

Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services.

a. a) intermediaries

35) Which of the following statements concerning blogging is false?

b) A reader can believe all of the details in a blog.

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

b) Computer attack programs, called scripts, are available for download from the Internet.

Refer to IT's About Business 8.5 - Scientific Discoveries: InnoCentive organizes online contests (challenges which are aimed at solving a business or scientific problem) with prize money. This is an example of

b) Crowdsourcing

Refer to Opening Case - Tiger Tans and Gifts: Which of the following is true about Lisa's use of Facebook to grow her business?

b) Lisa does not do online selling via Facebook

With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________.

b) Passively receive information, participate with the site.

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

b) Risk analysis

Which of the following is (are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

b) Spamware

Which of the following is an advantage of social commerce over traditional ecommerce?

b) The ability to predict buying habits based on real-time data

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?

b) The message could be a phishing attack.

Refer to IT's About Business 8.3 - Buying a Vehicle Takes Work: Cars.com integrates different types of data from different sources and presents it to customers. Which of the following is false about its Web 2.0 efforts?

b) Users need to join Cars.com in order to obtain pricing quotes from dealerships.

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?

b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.

Access controls involve _____ before _____.

b) authentication, authorization

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is on the ________________ list so it cannot be installed.

b) black

Employees in which functional areas of the organization pose particularly grave threats to information security?

b) human resources, management information systems

A _____ is a document that grants the holder exclusive rights on an invention for 20 years.

b) patent

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key

b) public, private

Which of the following is a type of collaborative consumption?

b. b) Craigslist

50) Which of the following is not an example of social shopping?

b. b) Going to Amazon.com to buy a book

Which of the following social shopping methods contributes to environmental sustainability?

b. b) Peer-to-peer shopping

The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________.

b. b) social intelligence

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is false?

c) A hot site needs to be located close to the organization's offices

Which of the following is a true statement about the impact of social computing on a business?

c) A small minority of individuals contribute the majority of feedback and can provide skewed data

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?

c) A trade secret

The cost of a stolen laptop includes all of the following except:

c) Backup costs

Which of the following is true about social commerce?

c) Businesses can easily learn about customers' experiences.

Which of the following statements is false?

c) It is easy to assess the value of a hypothetical attack.

Refer to IT's About Business 7.3 - How to Fight a Botnet: A botnet is a collection of Intenet connected computers whose security defenses have been breached and control ceded to a malicious party. Which of the following types of software attacks did Rustock use to create its botnet.

c) Phishing attack

Which of the following is not an example of crowdsourcing?

c) Posting a call for out-pf-date textbooks

Which of the following statements concerning the difficulties in protecting information resources is not correct?

c) Rapid technological changes ensure that controls are effective for years.

Refer to IT's About Business 7.1 - "Anonymous" Attacks the Vatican: Which of the following statements about Anonymous' attack on the Vatican is true?

c) The final effort was a DDoS attack.

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

c) Trojan horses

Pinterest is:

c) a shareable online bulletin board.

Rank the following in terms of dollar value of the crime, from highest to lowest.

c) cybercrime - white collar crime - robbery

You start a new job. You know that logging in with your password authenticates who you are. What actions, rights, or privileges you have based on

c) passphrase.

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a PostIt note and put it on your laptop screen. This is an example of

c) poor security.

In _____, the organization takes concrete actions against risks.

c) risk mitigation

One of the problems that HR departments have with using social computing to recruit is

c) they receive many more applications than they can process.

A _____ is intellectual work that is known only to a company and is not based on public information.

c) trade secret

Dumpster diving is:

c) typically committed for the purpose of identity theft.

Which of the following is true about the impact of social computing on customer service?

c. c) Customers themselves can be used to reduce problems.

A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________.

c. c) Enterprise Social Networks

Groupon is an example of ________________

c. c) Group shopping

Which of the following is false about social advertising?

c. c) Social advertising removes peer pressure from the buying decision.

57) The monitoring, collection, and analysis of socially generated data is called

c. c) Social intelligence

Which of the following is not an example of social commerce?

d) Best Buy has a Web site which can be used to purchase products for pick up in a store.

Using social computing tools to do market research

d) Can foster closer customer relationships

Which of the following statements concerning firewalls is false?

d) Firewalls filter messages the same way as anti-malware systems do.

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

d) Phishing

Which of the following is not a strong password?

d) Rainer

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

d) Social engineering

The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their warm site to minimize downtime should such a disaster hit. Which of the following statements is true?

d) The site will not have any of the company's applications.

LinkedIn is a _______________________ social networking site that makes money from advertising and services.

d) Video-upload

Which of the following is not a social networking site?

d) Wikipedia

You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?

d) You will be notified of updates in the content areas you selected.

The most overlooked people in information security are:

d) janitors and guards

Which of the following factors is not increasing the threats to information security?

d) limited storage capacity on portable devices

Your friend works in the risk management department for a mid-size financial institution. She said it's an interesting job - she has to put a value on each asset (information included), determine a probability that it would get compromised, and compare that to the cost of protecting that asset. This process is called

d) risk analysis.

Passwords and passphrases are examples of:

d) something the user knows.

A _____ is any danger to which an information resource may be exposed.

d) threat

An organization's e-mail policy has the least impact on which of the following software attacks?

d) zero-day

Ratings, reviews, and recommendations

d. d) Are an aspect of social shopping.

All of the following are used to provide online market research except

d. d) Emails

Biometrics are an example of:

something the user is

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved

whitelisting, blacklisting


संबंधित स्टडी सेट्स

BTT Vocabulary/Comprehension:Chapters 9-10

View Set

Quiz Chapter 8: The Global Classroom

View Set

Strength Training Conditioning & Programming

View Set

SL American Government Quiz 2 (Topics 4-7)

View Set

Businesss Foundations Seminar Mid Term PCR S7&8 Quiz Review

View Set