ITC Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What scrambles information into an alternative form that requires a key or password to decrypt? a. digital certificate b. encryption c. decryption d. cryptography

b. encryption

Among the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. a. hot site b. cold site c. warm site d. disaster site

a. hot site

What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster? a. Disaster Recovery as a Service (DRaaS) b. Data as a Service (DaaS) c. Software as a Service (SaaS) d. Big Data as a Service (BDaaS)

a. Disaster Recovery as a Service (DRaaS)

What is usability? a. The system is easy to learn, efficient, and satisfying to use. b. The system functions correctly and provides accurate information. c. The system allows varying levels of access. d. The system quickly transforms to support environmental changes.

a. The system is easy to learn, efficient, and satisfying to use.

What is information security? a. a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization b. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission c. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network d. software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

a. a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

What does unavailable refer to? a. a system that is not operating and cannot be used b. the ability of an application to operate on different devices or software platforms, such as different operating systems c. how quickly a system performs a process or transaction d. the degree to which a system is easy to learn, efficient, and satisfying to use

a. a system that is not operating and cannot be used

Accessibility, availability, maintainability, portability, reliability, scalability, and usability are all elements of a(n) ________ MIS infrastructure. a. agile b. sustainable c. information d. virtualized

a. agile

Which of the following represents the definition of information property? a. an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged b. a method or system of government for information management or control c. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity d. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

a. an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

What is hardware? a. consists of the physical devices associated with a computer system b. the set of instructions the hardware executes to carry out specific tasks c. a computer designed to request information from a server d. a computer dedicated to providing information in response to requests

a. consists of the physical devices associated with a computer system

Who are hackers with criminal intent? a. crackers b. black-hat hackers c. hoaxes d. cyberterrorists

a. crackers

What is a data file that identifies individuals or organizations online and is comparable to a digital signature? a. digital certificate b. encryption c. decryption d. cryptography

a. digital certificate

Which of the following policies details the extent to which email messages may be read by others? a. email privacy policy b. email confidential policy c. right to be forgotten policy d. spam policy

a. email privacy policy

What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property? a. emergency b. preparedness c. impact analysis d. technology failure

a. emergency

Which of the following represents the principles and standards that guide our behavior toward other people? a. ethics b. intellectual property c. standards of living d. security

a. ethics

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings? a. firewall b. certificate authority c. online certificate d. digital certificate

a. firewall

What is an information MIS infrastructure? a. identifies where and how important information, such as customer records, is maintained and secured b. includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals c. identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption d. includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets

a. identifies where and how important information, such as customer records, is maintained and secured

Which policy contains general principles regarding information privacy? a. information privacy policy b. acceptable use policy c. Internet use policy d. antispam policy

a. information privacy policy

What does a single instance of a system serving multiple customers mean in the cloud? a. multi-tenancy b. single-tenancy c. cloud fabric d. cloud fabric controller

a. multi-tenancy

What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate? a. network b. software c. lient d. server

a. network

What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations? a. network behavior analysis b. cyber-vigilantes c. cyberterrorism d. cyber-espionage

a. network behavior analysis

Which of the following represents the biggest problem of information security breaches? a. people misusing organizational information b. technology failures c. customers misusing organizational systems d. company departments missing sales goals

a. people misusing organizational information

What reroutes requests for legitimate websites to false websites? a. pharming b. phishing c. phishing expedition d. spear phishing

a. pharming

Which of the following is an example of an emergency notification system? a. radio stations' occasional tests of the national alert system b. wireless alerts for promotional discounts c. text messages from your local grocery store d. All of the answer choices are correct.

a. radio stations' occasional tests of the national alert system

What refers to how well a system can adapt to increased demands? a. scalability b. capacity planning c. reliability d. availability

a. scalability

What is the traditional security process that requires a username and password? a. single-factor authentication b. two-factor authentication c. multifactor authentication d. biometrics

a. single-factor authentication

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand? a. social media monitoring b. social media manager c. social media policy d. antispam policy

a. social media monitoring

Which of the following represents the definition of information compliance? a. the act of conforming, acquiescing, or yielding information b. the ability to comply with software c. the understanding of technology d. the verbalization of information governance in a company's policies and procedures

a. the act of conforming, acquiescing, or yielding information

Which of the following describes confidentiality? a. the assurance that messages and information are available only to those who are authorized to view them b. policies and procedures that address the ethical use of computers and the Internet in the business environment c. the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent d. the principles and standards that guide our behavior toward other people

a. the assurance that messages and information are available only to those who are authorized to view them

What is information secrecy? a. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity b. a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses c. a masquerading attack that combines spam with spoofing d. a phishing expedition in which the emails are carefully designed to target a particular person or organization

a. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

Which of the following reflects Moore's law? a. the computer chip performance per dollar doubles every 18 months b. a company's ability to acquire small amounts of MIS equipment for cheaper cost c. a company's ability to acquire small amounts of capital for spending on innovative ideas every two years d. the computer chip performance per dollar doubles every 6 months

a. the computer chip performance per dollar doubles every 18 months

What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple 'virtual' machines all on a single computing device? a. virtualization b. innovation c. availability d. viral computing

a. virtualization

What is the difference between pirated and counterfeit software? a. Counterfeit software is fake technology products, whereas pirated is invisible technological cameras placed online. b. Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit is software that is manufactured to look like the real thing and sold as such. c. Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated is software that is manufactured to look like the real thing and sold as such. d. Pirated software is stolen and used to hack into a company's classified material, whereas counterfeit is a fake version of firewall software.

b. Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit is software that is manufactured to look like the real thing and sold as such.

What is dumpster diving? a. a form of social engineering in which one individual lies to obtain confidential data about another individual b. a hacker looking through your trash to find personal information c. legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident d. malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

b. a hacker looking through your trash to find personal information

What is simplelocker? a. a form of malicious software that infects your computer and asks for money b. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys c. software that allows Internet advertisers to display advertisements without the consent of the computer user d. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

b. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys

What is a method for confirming users' identities? a. phishing b. authentication c. authorization d. programming

b. authentication

What is a green personal computer? a. a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment b. built using environment friendly materials and designed to save energy c. reuses or refurbishes ewaste and creates a new product d. a company's acknowledged responsibility to society

b. built using environment friendly materials and designed to save energy

Among the sites that support disaster recovery, a ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. a. hot site b. cold site c. warm site d. disaster site

b. cold site

Sustainable MIS is a critical part of ________ within a company. a. company standard for the Green Initiative b. corporate social responsibility c. social expectations d. societal concerns

b. corporate social responsibility

What is the electronic defacing of an existing website? a. cyberbulling b. cybervandalism c. click-fraud d. competitive click-fraud

b. cybervandalism

What is a facility used to house management information systems and associated components, such as telecommunications and storage systems? a. call center b. data center c. delivery base d. central center

b. data center

What is a hacker? a. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission b. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge c. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network c. software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

b. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem? a. cloud computing b. grid computing c. virtualized computing d. database computing

b. grid computing

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? a. ethics b. intellectual property c. privacy d. confidentiality

b. intellectual property

What refers to choosing to allow permissions to incoming emails? a. opt out b. opt in c. BYOD d. nonrepudiation

b. opt in

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems? a. reliability b. portability c. maintainability d. usability

b. portability

What occurs when each customer or tenant must purchase and maintain an individual system? a. multi-tenancy b. single-tenancy c. cloud fabric d. cloud fabric controller

b. single-tenancy

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand? a. social media monitoring b. social media manager c. social media policy d. antispam policy

b. social media manager

What is ediscovery? a. the unauthorized use, duplication, distribution, or sale of copyrighted software b. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry c. a law passed to protect minors from accessing inappropriate material on the Internet d. the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals

b. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

What is software? a. consists of the physical devices associated with a computer system b. the set of instructions the hardware executes to carry out specific tasks c. a computer designed to request information from a server d. a computer dedicated to providing information in response to requests

b. the set of instructions the hardware executes to carry out specific tasks

Which of the following types of viruses spread themselves not just from file to file but also from computer to computer? a. polymorphic virus b. worm c. Trojan-horse virus d. backdoor program

b. worm

Which of the following describes the difference between a backup plan and a recovery plan? a. Recovery is an exact copy of a system's information, whereas backup is the ability to get a system up and running in the event of a system crash or failure. b. Backup is mandatory, whereas recovery is optional. c. Backup is an exact copy of a system's information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure. d. Recovery is mandatory, whereas backup is optional.

c. Backup is an exact copy of a system's information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure.

What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks? a. cyberattacks b. data security c. Cybersecurity and Infrastructure Security Agency d. information attacks

c. Cybersecurity and Infrastructure Security Agency

What is dynamic scaling? a. the ability for the system to cut back on expenses when needed b. the infrastructure that is fixed and has no surprises c. MIS infrastructure that can be automatically scaled up or down based on needed requirements d. the flexibility to charge more or less, depending on the market

c. MIS infrastructure that can be automatically scaled up or down based on needed requirements

Which rule is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence? a. Rule 4 b. Rule 1 c. Rule 41 d. Rule 4.2

c. Rule 41

What is a client? a. consists of the physical devices associated with a computer system b. the set of instructions the hardware executes to carry out specific tasks c. a computer designed to request information from a server d. a computer dedicated to providing information in response to requests

c. a computer designed to request information from a server

Which of the following is not an example of unplanned downtime? a. power outage b. tornado c. system upgrade d. flood

c. system upgrade

What is the Child Online Protection Act? a. the unauthorized use, duplication, distribution, or sale of copyrighted software b. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry c. a law passed to protect minors from accessing inappropriate material on the Internet d. the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals

c. a law passed to protect minors from accessing inappropriate material on the Internet

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email? a. email privacy policy b. spam policy and procedures c. antispam policy d. GDPR policy

c. antispam policy

What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? a. disaster recovery plan b. disaster recovery cost curve c. business continuity planning d. emergency notification system

c. business continuity planning

What identifies all critical business functions and the effect that a specific disaster may have upon them? a. emergence b. emergency preparedness c. business impact analysis d. technology failure

c. business impact analysis

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser? a. cyberbulling b. cybervandalism c. click-fraud d. competitive click-fraud

c. click-fraud

What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high or peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes? a. community cloud b. private cloud c. cloud bursting d. hybrid cloud

c. cloud bursting

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them? a. contentment b. ethical standard c. confidentiality d. firewall security

c. confidentiality

What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals? a. network behavior analysis b. cyber-vigilantes c. cyberterrorism d. cyber-espionage

c. cyberterrorism

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction? a. white-hat hackers b. black-hat hackers c. cyberterrorists d. script bunnies

c. cyberterrorists

Which of the following represents the two fundamental building blocks that protect organizational information? a. security and sales b. human resources and security c. ethics and security d. ethics and technology

c. ethics and security

Which of the following definitions represents Internet censorship? a. a problem that occurs when someone registers purposely misspelled variations of well-known domain names b. the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner c. government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens d. an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

c. government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens

What is performance? a. a system that is not operating and cannot be used b. the ability of an application to operate on different devices or software platforms, such as different operating systems c. how quickly a system performs a process or transaction d. the degree to which a system is easy to learn, efficient, and satisfying to use

c. how quickly a system performs a process or transaction

What measures how quickly a system performs a process or transaction? a. portability b. capacity planning c. performance d. sustainability

c. performance

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent? a. safety b. ethical standard c. privacy d. confidentiality

c. privacy

What type of encryption technology uses multiple keys, one for public and one for private? a. private key encryption b. policy key encryption c. public key encryption d. protective key code

c. public key encryption

What is multifactor authentication? a. the traditional security process, which requires a username and password b. requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token) c. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) d. the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

c. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)

What is upcycle? a. a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment b. built using environment friendly materials and designed to save energy c. reusing or refurbishing ewaste and creating a new product d. storing, managing, and processing data and applications over the Internet rather than on a personal computer or server

c. reusing or refurbishing ewaste and creating a new product

What is a device that is around the same size as a credit card and contains embedded technologies that can store information and small amounts of software to perform some limited processing? a. token b. password c. smart card d. biometrics

c. smart card

What outlines the corporate guidelines or principles governing employee online communications? a. social media monitoring b. social media manager c. social media policy d. antispam policy

c. social media policy

What does reliability ensure? a. the system has the ability to operate in many different operating systems. b. the system is easy to learn and efficient and satisfying to use. c. the system is functioning correctly and providing accurate information. d. the time frames when the system is operational

c. the system is functioning correctly and providing accurate information.

What is availability? a. ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems b. varying levels that define what a user can access, view, or perform when operating a system c. time frames when the system is operational d. how quickly a system can transform to support environmental changes

c. time frames when the system is operational

Among the sites that support disaster recovery, a ________ is a separate facility with computer equipment that requires installation and configuration. a. hot site b. cold site c. warm site d. disaster site

c. warm site

Which of the following is a benefit of a solid MIS infrastructure? a. reduces costs b. improves productivity c. optimizes business operations d. All of the answer choices are correct.

d. All of the answer choices are correct.

Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane? a. disrupted communications b. damaged physical infrastructures c. halted transportation d. All of the answer choices are correct.

d. All of the answer choices are correct.

Which of the following is one of the four basic options included in a bring your own device policy? a. unlimited access for personal devices b. access only to nonsensitive systems and data c. access but preventing local storage of data on personal devices d. All of the answer choices are correct.

d. All of the answer choices are correct.

What is a disaster recovery plan? a. a separate and fully equipped facility where the company can move immediately after a disaster and resume business b. a separate facility that does not have any computer equipment but is a place where employees can move after a disaster c. a separate facility with computer equipment that requires installation and configuration d. a detailed process for recovering information or a system in the event of a catastrophic disaster

d. a detailed process for recovering information or a system in the event of a catastrophic disaster

What is reliability? a. ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems b. varying levels that define what a user can access, view, or perform when operating a system c. how quickly a system can transform to support environmental changes d. ability to ensure that a system is functioning correctly and providing accurate information

d. ability to ensure that a system is functioning correctly and providing accurate information

What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user? a. spyware b. hacker c. drive-by hacking d. adware

d. adware

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware? a. firewall b. digital certificate c. virus software d. antivirus software

d. antivirus software

Where do organizations typically place firewalls? a. between a personal computer and the server b. between a personal computer and a printer c. between the server and the content filtering software d. between the server and the Internet

d. between the server and the Internet

What is a company's acknowledged responsibility to society? a. cloud computing b. clean computer c. upcycle d. corporate social responsibility

d. corporate social responsibility

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them? a. digital certificate b. encryption c. decryption d. cryptography

d. cryptography

Which of the following represents the definition of information management? a. an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged b. a method or system of government for information management or control c. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity d. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

d. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

What is scalability? a. a system that is not operating and cannot be used b. the ability of an application to operate on different devices or software platforms, such as different operating systems c. the degree to which a system is easy to learn and efficient and satisfying to use d. how well a system can scale up or adapt to the increased demands of growth

d. how well a system can scale up or adapt to the increased demands of growth

What are the first two lines of defense a company should take when addressing security risks? a. technology first, customers second b. technology first, people second c. innovation first, technology second d. people first, technology second

d. people first, technology second

What is a form of social engineering in which one individual lies to obtain confidential data about another individual? a. dumpster texting b. dumpster diving c. rash retrieval d. pretexting

d. pretexting

What promotes massive, global, industry-wide applications offered to the general public? a. community cloud b. private cloud c. utility computing d. public cloud

d. public cloud

What is a computer dedicated to providing information in response to requests? a. hardware b. software c. client d. server

d. server

What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment? a. environmental MIS b. holistic MIS c. green designation for technology d. sustainability or green MIS

d. sustainability or green MIS

What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements? a. technology failure b. incident record c. incident management d. technology recovery strategy

d. technology recovery strategy

What are biometrics? a. the traditional security process, which requires a username and password b. requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token) c. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) d. the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

d. the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

What are computer viruses that wait for a specific date before executing their instructions? a. zombies b. zombie farms c. pharming attacks d. time bombs

d. time bombs

What is software written with malicious intent to cause annoyance or damage? a. elevation of privilege b. spoofing c. sniffer d. virus

d. virus

What is a system weakness that can be exploited by a threat? a. capacity b. web usability c. web accessibility initiative d. vulnerability

d. vulnerability


संबंधित स्टडी सेट्स

NU144- Chapter 70: Management of Patients With Oncologic or Degenerative Neurologic Disorders

View Set

Principles Of Biology 1 (Unit 3 Study Guide)

View Set

Principles of Macroeconomics Chapter 18

View Set

Real Estate Chapter 15 Taxes and liens

View Set

2. Android Architecture Stack and Introduction to UI

View Set

Drugs That Lower LDL Cholesterol Levels

View Set