Exam 3 - MGSC 390
A(n) _____ is a temporary storage space used to speed computing tasks a. cache b. IP address c. Protocol d. domain name service e. hypertext markup language
a. cache
In database systems, a _____ refers to a list of data. a. file b. column c. field d. row e. record
a. file
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because: a. some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities b. the cost to include government surveillance technology inside their products is expensive and lowers profits compared to rivals c. the government-required installations of software, such as Stuxnet, that U.S. tech firms must comply with inevitably take up valuable storage space, adding cost to industrial and commercial products d. the cost to house government workers on-site is a burden private corporation should not have a to shoulder e. firms in foreign governments are directly contracted to perform surveillance, and are compensated for their efforts with perks and tax breaks, while U.S. firms receive no such compensation
a. some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities
The hypertext transfer protocol (http) defines the communication between: a. web browsers and web servers b. operating systems and web browsers c. hardware and operating systems d. mail servers and hardware e. hardware and web browsers
a. web browsers and web servers
What is an example of cybersquatting? a. overwhelming a firm's website by flooding it with seemingly legitimate messages b. acquiring a domain name to extort a firm, individual, product, or trademark holder c. slowing down packet transfer to an internet-connected computer d. threatening to destroy information stored in a firm's servers e. hacking into and defacing an organization's public web presence and refusing to let the site's owner regain control
b. acquiring a domain name to extort a firm, individual, product, or trademark holder
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to rival company. What crime is he being held responsible for? a. cyber-fraud b. corporate espionage c. carrying out technology d. extortion e. illegal funds transfer
b. corporate espionage
"HTML" is used to: a. load content from default page b. create and format Web pages c. generate custom content for database users d. exchange mail with other e-mail servers e. transfer files from flash drives
b. create and format Web pages
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. a. cash-out fraudsters b. data harvesters c. corporate spies d. ethical hackers e. information hoarders
b. data harvesters
Data becomes _____ when it is presented in a context so that it can answer a question or support decision-making. a. knowledge b. information c. a database d. wisdom e. a relational language
b. information
Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces? a. ratings represent a switching cost built over time by early participants in sharing economy marketplaces b. late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that entered markets more recently c. network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing. d. these are two-sided markets e. none of the above - all statements are true
b. late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently
Which of these would be an example of a DDoS attack? a. an extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases b. overloading a popular social networking site with inbound messages in order to shut down access to the site c. launching a targeted phishing campaign on a department of defense or other surveillance network d. stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services e. launching tough-to-track click-fraud efforts
b. overloading a popular social networking site with inbound messages in order to shut down access to the site
The address one types into a Web browser is also known as a: a. universal redirection link b. uniform resource locator c. unique resource locator d. universal redirection locator e. uniform resource link
b. uniform resource locator
In database terminology, a record represents: ____ a. a list of data, arranged in columns and rows. b. all of the data in a given column. c. a single instance of whatever the table keeps track of d. a field or combination of fields used to uniquely identify a file e. one or more keys that relate separate tables in a database
c. a single instance of whatever the table keeps track of
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: a. honeypots b. zombots c. botnets d. blacklists e. megabots
c. botnets
_____ refers to the process of combining aspects of reporting , data exploration and ad hoc queries, and sophisticated data modeling and analysis. a. logistics b. queritic modeling c. business intelligence d. electronic trading e. big data
c. business intelligence
An attack on the US power grid by terrorists or a foreign power is indicative of: a. DDoS attacks b. espionage c. cyberwarfare d. extortion e. phishing
c. cyberwarfare
In database systems, a table is also known as a _____. a. field b. record c. file d. row e. key
c. file
The term _____ originally referred to a particularly skilled programmer. a. data harvester b. cracke c. hacker d. black hat e. hacktivist
c. hacker
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____. a. activist b. cyber agitator c. hacktivist d. ethical hacker e. cybersquatter
c. hacktivist
Data can potentially be used as a strategic asset, capable of yielding sustainable competitive advantage. Which of the items below is not a characteristic of a potentially strategic asset? a. value b. rarity c. imperfect imitability d. lead time e. non-substitutability
c. imperfect imitability
Another major concern for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as _____ and not employees. a. investors b. critics c. independent contractors d. liabilities e. none of the above
c. independent contractors
Which of the following is a valid statement on information security? a. security breaches cannot be prevented despite the adoption of the best security policies b. technology lapses are solely responsible for almost all security branches c. information security is everybody's responsibility d. greater expenditure on security products is the only way to contain security breaches e. a reactive, rather than proactive, approach is better suited for dealing with security breaches
c. information security is everybody's responsibility
Which of the following statements holds true for the term "HTML"? a. it refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet b. It refers to the broadband service provided via light-transmitting fiber-optic cables c. it refers to the language used to create and format Web pages d. it refers to a situation when separate ISPs link their networks to swap traffic on the Internet e. it refers to a system that connects end users to the internet
c. it refers to the language used to create and format Web pages
A _____ enables communication by defining the format of data and rules for exchange a. nomenclature b. regulation c. protocol d. dialect e. convention
c. protocol
knowledge is define as: _____ a. raw facts and figures b. the data presented in a context so that it can answer a question or support decision-making c. the insight derived from experience and expertise d. a listing of primary data e. the process of breaking a complex topic into smaller parts
c. the insight derived from experience and expertise
What is the difference between collaborative consumption firms Zilok and Chegg? a. zilok has gone public, chegg hasn't b. zilok is a service where a person comes to your home to complete a task, chegg is a rental firm c. zilok provides inventory provided by participating "citizen suppliers", chegg owns its own inventory d. zilok is the european equivalent of chegg e. zilok was purchased by chegg underscoring the "winner take all" dynamics of these markets
c. zilok provides inventory provided by "citizen suppliers", chegg owns its own inventory
_____ refers to software for creating, maintaining, and manipulative data. a. extranet b. ROM c. RAM d. DBMS e. Internet 2
d. DBMS
The exploit referred to as _____ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request. a. cybersquatting b. phishing c. an online imposture d. cache poisoning e. a distributed denial of request
d. cache poisoning
______ is the term used to describe raw facts and figures. a. information b. knowledge c. analytics d. data e. intelligence
d. data
Which of the following statements is consistent with ground realities regarding information security? a. cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies b. law-enforcement agencies are well-resourced to fight cyber-crimes effectively c. governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay d. law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals e. cyber-crime is not rewarding in terms of financial gain
d. law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals
Which of the following aspects of international law would enable a cyber-criminal operating across borders to evade prosecution? a. lack of technology to identify the origin of a security attack b. non-recognition of commission of a security-related crimes c. unwillingness of developed countries to share technical know-how with lesser-developed countries d. non-existent extradition agreements between two countries e. technological incompatibility between the two countries
d. non-existent extradition agreements between two countries
In database systems, a row is also known as a _____. a. table b. column c. key d. record e. field
d. record
The fault-tolerant nature of the DNS ensures that: a. if users can't reach a host computer, they are redirected back to the previous page b. mistyped or misspelled Web addresses are automatically corrected c. if a document or file can't be accessed, it won't result in a 404 error d. the service continues functioning even if one nameserver goes down e. mismatched host names and domain names are still assigned with the correct IP address
d. the service continues functioning even if one nameserver goes down
A firm that provides hardware and services to run websites of other is known as a(n) _____ a. website incubator b. internet service facilitator c. web domain name registrar d. web hosting service e. internet web fab
d. web hosting service
A(n) _____ is someone who uncovers computer weakness and reveals them to manufacturers or system owner, without exploiting these vulnerabilities. a. hacktivist b. data harvester c. corporate spy d. white hat hacker e. ethical cyber criminal
d. white hat hacker
_____ is by far the most popular language for creating and manipulating databases. a. XML b. HTML c. PHP d. java e. SQL
e. SQL
The sharing economy consist of which of the following? a. recirculation of goods b. increased utilization of durable assets c. exchange of services d. sharing of productive assets e. all of the above
e. all of the above
In a database systems, a _____ defines the data that a table can hold. a. row b. key c. record d. file e. field
e. field
Popular sites like Google and Yahoo! have several computers assigned to their host names because: a. they have operations in different countries b. they are registered under several generic top-level domain names c. of the different devices used to access these websites d. hoarding all information in one server is expensive e. it ensures that the load of requests to their sites do not overwhelm a single computer
e. it ensures that the load of requests to their sites do not overwhelm a single computer
The domain name services (DNS) is a distributed database that allows users to communicate with other computers by: a. assigning IP addresses to different domain name b. mapping host names to domain names c. creating IIP addresses that are unique to servers d. assigning domain name to different IP addresses e. mapping host and domain names to IP addresses of computers
e. mapping host and domain names to IP addresses of computers
One of the factors that accelerated the development of the Internet during the 1990s was: a. the introduction of the personal computer into households b. the government's taking over of the Internet's operating structure from private players c. Intel's invention of low power processors used in portable computers d. the creation of the Windows and Mac OS operating systems e. the invention of graphical Web browsing
e. the invention of graphical Web browsing
A black hat hacker looks for weakness in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. true false
false
A vast majority of security breaches are not preventable and happen despite the best security practices. true false
false
Advantages based on capabilities and data that other can acquire are long-lived. true false
false
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in. true false
false
Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name. true false
false
Firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment. true false
false
In database systems, a column is also known as a key. true false
false
In the URL, the host name is the name of the network a user tries to connect to. true false
false
Logistics is the term that describes that extensive use of data, statistical and quantitive analysis, explanatory and predictive models, and fact-based management to drive decisions and actions. true false
false
Payment continues to represent a barrier to widespread adoption of the sharing economy, since many consumers feel uncomfortable exchanging cash or financial information with strangers. true false
false
The language "http" is used to create and format Web pages. true false
false
When the internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms. true false
false
A device gets it IP address from whichever organization is currently connecting it to the Internet. true false
true
All SQL databases are relational databases. true false
true
Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. true false
true
Data are raw facts that must be turned into information in order to be useful and valuable. true false
true
Dynamic pricing is considered especially tricky in situations where consumers make repeated purchases and are more likely to remember past prices, and when they have alternative choices. true false
true
Firms that base decisions on hunches are said to be gambling, not managing. true false
true
General Motors backed Lyft with more than half a billion dollars. true flase
true
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. true false
true
IP addresses can oftentimes be used to identify a user's geographic location. true false
true
If eBay and craigslist are included, some 44 percent of the US and Canadian population have participated in the sharing economy. true false
true
In many organizations, the majority of available data is not exploited to advantage. true false
true
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures. true false
true
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name. true false
true
Social media profiles can also be used to fight online fraud true false
true
The Internet has no center, and no one owns it. true false
true
The data a firm can leverage is a true strategic asset when it is valuable, rare, imperfectly imitable, and non-substitute. true false
true
Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand. true false
true
Unfortunately, IPv6 isn't backward compatible with IPv4. true false
true