ISYS 209 Exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is FALSE regarding​ public-key encryption?

On receiving the​ message, the recipient uses the public key to decrypt it.

_________________________ systems help firms​ analyze, model, and optimize its supply chain.

Supply chain planning

__________________ are an added complexity to implementing an Enterprise Application as it can require vendors to have to upgrade their systems as well.

Switching costs

Security in an information systems context refers to​ ___________________________, which are used to prevent unauthorized access or theft.

policies, procedures, and technical measures

Establishing a risk level of malware threats to an organization is an example of​ _______________.

risk assessment

Education being represented by .edu and business represented by .com are examples​ of:

top level domains

ERP implementations can be very​ expensive, averaging approximately​ _____.

​$2.8 million

Although it can be​ risky, a​ __________________ strategy is based on knowing exactly when components would arrive within the supply chain.

​just-in-time

Customer relationship management typically focuses on three key elements of the customer​ relationship:

​marketing, sales, and service.

A company needing reliable network speeds at 1.5 Mbps would probably need to lease a​ dedicated:

T1 line

Application controls can be classified as​ _____ controls,​ _______controls, and​ ________ controls.

input; processing; output

A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.

keylogger

Which of the following is false about ERP​ systems?

ERP systems collect and organize​ firm-wide data that must be passed to other applications for executive decision making.

___​_____ is a new network backed by​ universities, government, and private companies in more than 100 countries.

Internet2

Enterprise systems have a set of integrated software modules and a​ _______________ by which business processes and functional areas throughout the company can​ _____ data.

central​ database; share

The​ ________ measures the number of customers who stop purchasing products or using a​ firm's services.

churn rate

Enterprise systems provide value by both​ __________________ and providing​ __________________ to help managers make better decisions.

increasing operational​ efficiency; firm-wide information

Interactions are critical when working to improve customer relations. Specific interactions with customers are called​ ____________.

touch points

According to the information in this​ video, the telephone system is an example of a​ _____ network

​circuit-switched

In this​ video, Special Agent Macey says the single largest threat to the Internet is​ _____.

​denial-of-service attacks

If you were building a network intended to service two buildings that were next to each​ other, you would construct​ a:

local area network.

What type of communications processor directs packets of data through different​ networks, ensuring that the data sent gets to the correct​ address?

router

A​ _____ is great for a city to set up for emergency and public use since it is larger than many types of network configuration.

MAN

Which of the following is FALSE regarding digital​ certificates?

The CA verifies a digital certificate​ user's identity online.

Enterprise software includes a database and thousands of predefined​ ________________.

business processes

The measurement of the number of customers who stop using or purchasing products or services from a company is called​ ________.

churn rate

Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.

click fraud

If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of data to your different devices.

router

A​ company's suppliers and the​ suppliers' suppliers are considered the​ _____________ portion of the supply chain.

upstream

Why is an​ order-to-cash service considered a complex process to implement as an enterprise​ application?

It needs information from many different functions of the enterprise.

One wireless security concern is called​ _________, where eavesdroppers drive by locations trying to intercept wireless network traffic.

war driving

A large corporation managing a network over a global area would be considered a​ ________.

wide area network

A company needing a network to connect its offices in​ Montana, Idaho, and Utah would require​ a:

wide area network.

A​ __________ is a unique type of malware that replicates itself from one computer to another.

worm

The current average cost of an ERP project is​ ______________.

$2.8 million

If you are creating a network using​ twisted-pair (CAT​ 5) wire, the cable​ shouldn't exceed:

100 meters.

The average ERP project takes​ ___________ months to complete.

16

_____ can be destructive to a company when at risk for people or programs deliberately moving through​ ads, thus driving up advertising costs for a company.

Click fraud

The Internet is based on which of the following three key​ technologies?

Client/server computing, packet​ switching, and​ TCP/IP and related communications standards for linking networks and computers

Some​ firms, like Ernst and​ Young, use​ ______ to carefully collect and maintain data in such a way that they can be used as evidence in a court of​ law, on the behalf of a company or government agency.

Computer forensics

As a way to ensure that data transfers occur​ quickly, some companies employ​ _____ to determine the priority of data so important data is sent more quickly than less important data.

Deep packet inspection

Which of the following​ examine(s) data files and sorts out​ low-priority online material while assigning higher priority to​ business-critical files?

Deep packet inspection

Which of the following is NOT a security threat posed by the use of the​ iPhone, iPad, and other mobile computing devices in the​ workplace?

Dictating what kind of data an app can access inside its sandbox domain.

Which single word below best describes Web​ 2.0?

Dynamic

In this​ video, Kevin describes​ _____ as a set of integrated software modules that support nearly all of their​ organization's business processes.

ERP

Improving the tracking of employee training could involve adopting enterprise software focused on​ _______________________.

Employee relationship management

Which of the following is a critical security function of senior management in an​ organization?

Establishing the security policy and managing risk

With regard to ERP​ implementation, which of the following is false​?

Firms see immediate operating efficiency and associated profits when first implementing an ERP application.

If your financial institution shares your financial records without your​ permission, this is considered a​ ________________ violation.

Gramm-Leach-Bliley Act

The​ _____ mandates that financial services firms ensure security and confidentiality of customer data.

Gramm-Leach-Bliley Act

Which of the following is NOT one of the ways in which​ next-generation enterprise application vendors are delivering more​ value?

Making their software easier to customize

​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.

Malware

______________ are supported by enterprise systems that includes procurement and inventory management.

Manufacturing and production processes

Business processes supported by enterprise systems related to credit checking are associated with​ __________________.

sales and marketing processes

Identifying the most profitable customers would utilize the​ _____________ of a CRM system.

sales force automation

A(n) _________________ policy identifies and ranks information risks and goals.

security

One authentication technology that is about the size of a credit card and contains a chip containing access permission is called​ ___________________.

smart card

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.

social engineering

Facebook and Twitter are both companies that enable users to join up with a larger community. The formal name for this type of organization is called​ __________________.

social networking

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.

spoofer

In an effort to​ ___________ critical business​ processes, Coca-Cola implemented an SAP enterprise system

standardize

Activities related to procuring materials and refining these materials into finished projects to distribute to retail outlets are a​ firm's ________________.

supply chain

A hub is often used as a connection point between networked computers. A​ _________ is very​ similar, but contains more advanced​ capabilities/intelligence.

switch

ERP implementations introduce​ _____ which are large expenses associated with jumping from one vendor to another when implementing an ERP system.

switching costs

One finding from​ Alcoa's enterprise system found a positive correlation between​ ______________ and quality.

training

The signal from your iPod earphone is​ a(n):

analog signal.

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.

In this video​ dramatization, Kevin describes which component of an ERP system that consolidates data from​ sales, marketing, and service​ departments?

customer relationship management​ (CRM)

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.

cybervandalism

Using SAP to help determine​ customers' demand for its products is called​ ____________ planning.

demand

A​ ________ is a set of rules that programs on two communicating devices follow.

protocol

A​ just-in-time strategy​ means:

raw materials would arrive​ just-in-time to be transformed into a product and the product would ship as soon as completed.

What is Secure Hypertext Transfer​ Protocol?

A protocol for encrypting data transferred over the Internet

_________________ tracks and coordinates the delivery process and associated financial information.

A supply chain execution system

If you are purchasing a router that can provide wireless​ Wi-Fi at up to 11 Mbsp​ (but not​ over), you would need to purchase an​ __________ router.

802.11b

In the Dundee Precious Metals​ (DPM) case, what technology was added to dramatically increase productivity and improve​ safety?

An underground wireless​ Wi-Fi network

Which type of enterprise software would allow you to analyze Customer Lifetime Value​ (CLTV)?

Analytical CRM

​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.

Authentication

If your computer allows authentication using your​ fingerprint, this technology is considered​ __________________.

Biometric authentication

802.15 is the popular networking standard also known as​ ________________.

Bluetooth

A common wireless networking​ standard, _______ is generally used for PANs.

Bluetooth

Which of the following is a wireless protocol designed for transmitting data over short​ distances, replacing​ cables?

Bluetooth

Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply​ chain?

Bullwhip effect

In addition to developing a policy for restoring computer and communication​ services, some companies go a step further with​ _____, which focuses on how they can get the business operations up and running again after a disaster.

Business continuity planning

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?

Gramm-Leach-Bliley Act

If your doctor shares your medical records without your​ permission, this is considered a​ ________________ violation.

HIPAA

_______________ requires that your patient records be protected and saved for six years.

HIPAA

What outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care​ data?

HIPAA Act

What is the name of the organization responsible for assigning public IP​ addresses?

ICANN

The​ ________________ virus, a rather nice sounding​ virus, was one of the most famous malwares that was detected in 2000.

ILOVEYOU

The domain name system converts domain names to​ ________________________.

IP addresses

Which of the following is false concerning transmission of electronic​ data?

IP handles the data moving between​ computers, and TCP handles packaging of data at each end of the transmission.

Which of the following is FALSE about the​ TCP/IP protocol?

IP helps to recover any packets that are lost or damaged during transmission.

If you are renting a home while going to college and would like to connect to the​ Internet, you will need to contact​ a(n)______________ such as​ EarthLink, NetZero, or​ AT&T to connect.

ISP

________ check for data entering a system for accuracy and​ completeness, such as when a clerk confirms a telephone number for a new customer.

Input controls

Which of the following is NOT formally included as business processes supported by enterprise​ systems?

Instructional technology processes

Instead of sending an entire file in one big chunk across the​ Internet, __________ is used which dices the file up into little pieces that are sent independently across the communications​ paths, and then reassembled when they reach their destination.

Packet switching

A supply chain driven by actual customer orders or purchases follows which​ model?

Pull-based model

What type of systems provide technology for tracking the movement of goods throughout the supply​ chain?

RFID

____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.

Ransomware

Which of the following is an important capability for​ service-category business processes that are found in most major CRM software​ products?

Returns management

Which of the following​ TCP/IP application-layer protocols is used for email​ transmission?

SMTP

What are the three general business functions that CRM software​ serves?

Sales, customer​ service, and marketing

__________________ was created as a result of financial scandals such as Enron and WorldCom.

Sarbanes-Oxley

​_____________ provides rules related to the creation of financial statements to help avoid fraud.

Sarbanes-Oxley Act

Connecting customer conversations in Twitter to CRM processes is called​ ____________.

Social CRM

_________________________ systems track the flow and status of products through the distribution process.

Supply chain execution

Which of the following is NOT a function of the Internet service provider​ (ISP)?

The ISP provides applications services.

Which of the following is FALSE about the Domain Name Service​ (DNS)?

The first name in the domain name is the organization name.

Which is the BEST definition of​ hertz?

The number of cycles per second that can be sent through a medium

Which of the following is NOT addressed by a business continuity​ plan?

The technical issues involved in keeping systems up and running

According to this​ video, which of the following statements is true regarding enterprise resource planning​ systems?

They integrate data with a centralized database.

Which of the following is NOT one of the characteristics of enterprise applications that cause challenges in​ implementation?

They support​ "best practices" for each business process and function.

A​ _______________ is a program that seems like a normal​ program, but does something completely unexpected.

Trojan horse

What is​ Pharming?

Users are redirected to a phony web page even when the correct URL is typed in.

It is possible to use a special​ secure, encrypted​ network, a​ _____, which works on the public​ network, like the Internet.

VPN

Which of the following is an opportunity for threats to gain access to​ assets?

Vulnerability

One promising prediction for the future is that​ _____ will bring digital​ information, in all​ forms, together into a​ single, meaningful, experience.

Web 3.0

Because it is difficult to lay cable or set up numerous​ Wi-Fi networks in rural areas of the​ U.S., ______ becomes a more viable option as it has a range of approximately 30 miles.

WiMax

A(n) _________________ policy would indicate if you are able to use your work computer to access social media websites.

acceptable use

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

ambient data

Because so many Web pages use​ databases, _____ is a major malware threat since poorly coded Web application software is vulnerable.

an SQL injection attack

A(n) __________________ is a way to communicate in a network that is recognized by a continuous​ waveform:

analog signal

In this​ video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing​ a(n) _____.

analog signal

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best​ describes:

analytical customer relationship management applications.

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.

biometric

According to the information in this​ video, computers represent data using​ _____.

bits

Shopping​ _______ use intelligent agent software to help people filter and discover information about potential products.

bots

The phenomenon of perceived demand that changes as it passes across the supply chain is called the​ ________________ effect.

bullwhip

When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the​ _________________________.

bullwhip effect

Taking over computers and directing those systems to overload a network is defined as​ a(n) _____________ attack.

denial-of-service

Bandwidth is determined​ by:

determining the difference between the highest and lowest frequency on a channel.

Network signals that are represented by​ on-off pulses indicate​ a(n):

digital signal.

​A(n) ______________ specifically addresses plans for power​ outages, floods,​ fire, and other calamities.

disaster recovery plan

Delivering products to retail stores is considered the​ _____________ portion of the supply chain.

downstream

As Kevin​ explains, _____ processes support activities in multiple departments and span an organization

enterprise

ERP stands for​ ___________________________________.

enterprise resource planning

According to the information provided in this​ video, any business that has an online presence is at risk of​ _____.

exposure to hacker activity ​denial-of-service attack unauthorized data disclosure loss of customer data *all of the above*

The business processes supported by enterprise systems most closely related to financial statements and the​ Sarbanes-Oxley Act include​ _________________.

financial and accounting processes

Using a combination of hardware and​ software, _______ are able to control incoming and outgoing data on a network.

firewalls

Bandwidth transmission speed is measured in​ ______________.

hertz

The measurement​ ____________ is equivalent to one cycle of the medium.

hertz

Business processes supported by enterprise systems related to travel expense reporting are associated with​ __________________.

human resources processes

Mary's company is implementing an ERP system to achieve which main business​ objective?

improved decision making

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

Target was attacked by hackers who installed​ ___________ in the​ company's security and payments system.

malware

Business processes supported by enterprise systems related to quality control are associated with​ __________________.

manufacturing and production processes

Today's broadband in households allows for connections of up to 15​ ________________ per second.

million bits

As Zero and One explain in this​ video, a​ _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.

modem

At its most basic​ level, a(n)​ _________ simply consists of two computers that are connected together.

network

Microsoft Windows Server and Linux are examples​ of:

network operating systems.

Microsoft Windows Server and Linux are both considered examples of​ ____________.

network operating system​

Public key encryption uses​ __________________.

one public and one private key

Analytical CRM applications are based on data from​ _____________________.

operational CRM systems

In this​ video, One-Bit describes​ _____, the method of slicing digital messages into​ parcels, transmitting them across communication​ networks, and reassembling them at their destination.

packet switching

The method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

packet switching

Using parts of CRM software to help maximize efficiencies with selling partners would include​ _____________ management.

partner relationship management

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.

phishing

Which of the following could represent a current IP​ address?

207.46.250.119

If you want your cell phone to transmit up to 100​ megabits/second downloads, you would need to upgrade to​ a(n) _____________ network.

4G

Unfortunately, a majority of enterprise applications deliver​ __________ percent or less of the expected benefits.

50

Twisted pair​ wire, also known as​ ____________, is the most common 10 Mbps LAN cable on the market today.

CAT 5


संबंधित स्टडी सेट्स

612. TED (30-day Challenges) # We Bare Bears

View Set

Chapter 45: Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set

Job Application Quiz- Management

View Set