KSU IS 2200 Final
Anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
"Cybersecurity threat mitigation" includes all the policies, procedures, and tools that help organizations
Interests of your audience
A business message should show that you have _____ _ __ ______ in mind.
(10-8)/8*100
A friend asks if you want to go see the New Avengers movie but you say it's too expensive. "No it's not, tickets have only gone up $2 since last year," says your friend. You reply, "tickets went from $8 to $10 for a matinee. That is a large percentage increase. What formula would provide the percentage increase?
Clarify the company's brand.
A public relations team's first steps is to
Personal Brand
A unique set of professional skills and attributes that others associate with you
Slanting the facts.
Adish is analyzing the benefits and feasibility of implementing a stress-reduction program on a fixed budget. Through research, Adish learns that the cost of a stress reduction program exceeds the proposed budget. He also learns that such programs are linked to increased employee health and morale. Adish then advises the company leadership to implement the program because it will be effective at improving the well-being of employees. Adish is guilty of
Lay out the supporting reasons in careful order; state the primary message.
Ali is the marketing manager at QLM. In his market survey, he finds that customers are not happy with QLM's inefficient customer service. How will Ali structure his message if he wants to use the inductive, or indirect, approach?
Social Persona
Although younger people are often expert at developing an online _____ _____, they are less skilled at developing an online professional presence.
Cybersecurity threat
An event or condition that can lead to IT asset loss and the negative consequences of such loss
Period
Each loan payment is referred to as a(n)
Freeze
If you wish to keep a column visible while you scroll through the rest of a spreadsheet file, you can use the _____ options.
Inverted pyramid
In a press-release style message, the "story" is written in third person in a style often referred to as _____ style.
Row
In a spreadsheet, a horizontal line of cells is called a
Avoid any form of self-centeredness.
In content and form, a business message should typically
Collaboration tools
In most companies, participation on enterprise social platforms with related _____ _____ is fairly low.
Challenging the team's hard-earned consensus and damaging morale.
Latecomers to forum discussions are most likely to cause problems by
Direct or deductive approach
Most business arguments employ a _____ _ ______ ______. In other words, they begin by stating the primary message, which is typically a position or recommendation.
Stating their opinion but failing to take part as the conversation evolves.
One major threat to productive discussions is inconsistency. First -comers to a forum discussion are most likely to cause problems by
Press-release style
The _____-_____ _____ accounts for most written PR messages.
Short, memorable
The art of creating effective frames involves capturing your primary message in a _____, ______ statement of 15 words of less.
Interest
The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's
Access Control, Authentication
The deactivation of access to corporate systems and documents after an employee leaves a company are examples of which tool that ensures confidentiality?
Planning
The most important stage of creating effective business messages is
Professional reputation
The profiles you post on personal and work- related social media accounts will affect your _____ ______.
Display ads to users based on their browsing behaviors. Redirect your search requests to advertising websites. Collect marketing-type data about you.
The purpose of adware is to _____.
Diplomatic, constructive
The term "argument" unnecessarily implies contention and difference of opinion. Use _____, ______ terms.
Social Media
The use of ____ _____, even for private use, complicates your relationship with your employer.
Either/Or Logic
To build well-reasoned business positions, you should avoid _____/_____ _____, which tends to close off important alternative ways of problem solving.
PMT
To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the _____ function.
Use the internet for social connection.
User 2.0 is most likely to
Viruses, Spyware, Impersonation, Distributed Denial of Service (DDOS)
What are examples of different cybersecurity breaches?
Bar Graphs, Line Graphs
What are the two common spreadsheet charts?
To ensure EU companies protect the privacy and personal data of EU citizens.
What does General Data Protection Regulation (GDPR) strive to achieve?
COUNT
What function would you use to display how many entries are made in Column A above Cell A37?
Respect the autonomy of the reader.
What is most likely to show that the writer of a business message has concern for the audience?
Ensure critical infrastructure services can be delivered without interruption, Reduce the impact of an adverse cybersecurity event
What is the goal of the protect stage in the plan-protect-respond cycle?
Code-created malware that, when executed, damages programs and performance.
Which of the following is the clearest definition of a computer virus?
Barras uses a variety of sources such as journal articles and colleagues' expertise.
Which person illustrates a characteristic of an excellent business thinker?
A personal brand built through an online presence can help business professionals gain opportunities.
Which statement about online presence is true?
You are responsible for your actions.
Which statement is one of Coca-Cola's social media guidelines?
Spyware harvests private information by monitoring how users interact online. Downloads from unvetted websites can be a vector for spyware.
Which statements apply to spyware?
Present Value (PV), Principal, Balance
Which three of the following refer the amount of money owed on a loan when it is first borrowed (excluding any origination fees).
This is not an error. The cell needs to be expanded in order to display the entire value.
You see ###### in a cell. This means that
Strong analogies
_____ _____ bolster arguments, but to build a well-reasoned business positions you should avoid weak analogies. Weak analogies lead to inaccurate conclusions and recommendations.
Cybersecurity risk analysis
_____ ______ ______ weighs the costs versus the benefits of instituting countermeasures to cybersecurity events.
Audience Analysis
during which step in the AIM planning process should you consider the constraints your readers face?
Present Value (PV)
Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's
Spreadsheet
Because they make it easy to arrange, display, and calculate numerical data, _______ programs are often used in budgeting, accounting, finance, grading, gambling houses, and even sports analysis.
Identify problems that prevent employees from making healthy choices.
Charlier has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during information gathering stage?
Mitmo
Currently, one of the biggest vector opportunities for the cybercriminals is _____.
1. Identification and Valuation of an organization's information assets. 2. Eliminate potential costs and losses per security incident, including costs of malware attacks, fees, and penalties associated with data breaches, and lost revenue. 3. Estimate the likelihood of occurrence of threats.
Describe steps in cybersecurity risk analysis.
Identify a company's assets, Calculate potential loss due to security threats, Determine how to respond a potential loss
Describe the purpose of a cybersecurity risk analysis.
Social Age
Due to the many communication tools available in the emerging ____ _____, the division between professional and private lives is becoming increasingly blurred.
= ((4.25-3.20)/(3.20)*100
Every time you go to the gas station you're amazed by how much prices have increased. At this time last year the price was $3.20/gallon and now the price is $4.25/gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?
Online communities
Excellent places to network and participate with professionals in your organization and those with shared professional interests outside your organization.
Fails to focus on the interests of the audience.
Extensive use of the 1-voice in a business message
State the primary message; lay out supporting reasons; conclude with a call to action.
For the past few months, Denver Framing has experienced high employee turnover. After investigating, human resource manager Kyle discovered that most employees are unhappy with their salaries and there unmotivated to work. Kyle plans to craft a message using the direct approach. How should he structure it?
17
If you type =8/2*4+1 into a cell in a spreadsheet and then press Enter, what will appear in the cell?
Average
If you want to find the mean of the values in cells above A37 in the above spreadsheet, what function would you place in A37?
Authentication, Encryption, Access Control
Most organizations require employees to login in to view files that are posted to a shared drive, allowing different access to the files based on employee or other people from accessing all files. What are examples of the following tools that ensure confidentiality?
Meta
Overall and underlying messages that others decode from your online communications are referred to as ____ messages.
Insert
Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the _____ tab to create a pivot table.
Spreadsheets
Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called
Cell Values
Saving a spreadsheet file in .csv format only saves the
Protect Phase
Scheduling monthly and annual maintenance activities for hardware and software systems are activities that occur during the _____ _____ of the plan-protect-respond cycle.
Budgeting, Finance
Select two common uses of spreadsheets.
1. Select the first cell in the range and drag down to the last cell. 2. Select the first cell in the range then hold down the shift key and select the last cell in the range.
Select two methods of selecting a range of adjoining cells in Excel.
Microblogs
Shorter blogs that contain just a few sentences, are part of the most enterprise social networking platforms. They are tools for broadcasting announcements and urgent information.
Are not cautious about giving out confidential or sensitive information.
Social engineering is used to target people whom
A malicious email or link opened by an unsuspecting user.
Software-based keyloggers often infect a system through
Future Value (FV)
The Rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ______ of the investment.
Setting a positive and other-oriented tone.
What is typically included in the writing stage of developing an effective business message?
An employee blogs about an embarrassing incident involving his or her boss, who sees the post.
What situation is an example of how social media can complicate professional relationships?
1. When looking up information on the Dallas Cowboys, you notice an ad for a Dallas COwboys jersey. 2. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. 3. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology.
What situations lead you to suspect the presence of adware?
Help others find your information.
When creating a blog, you should use naming, labeling, indexing, and tagging to
Red
When displaying financial information, the accepted practice is that _____ indicates negative values.
Discuss protocols for co-editing files.
When using a shared file platform, it is important to
Protect (PR) Funtion
Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?
Determine security weaknesses, Determine existing vulnerabilities by having an employee attempt to hack into a system, Figure out where vulnerabilities within your systems currently exist
Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle?
Making conclusions based on facts.
Analyzing a business problem typically involves
Decide how to frame her primary message.
Aria, an executive at American Hustle, Inc., wants to introduce a profit-sharing program. She needs to convince the other executives that it is a good idea for their company. She has considered her audience and gathered information. Next, she should
It is held in the device's RAM until it can be processed by the CPU or GPU.
How are data in process different from data at rest or data in storage?
This malware steals confidential information from the user.
How does spyware potentially harm the individual user?
Data integrity is more easily preserved if users must be authorized to access and make changes.
How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?
Unsupported generalization
Howard, a manager at ABN, has to prepare a report about the advantages of introducing a counseling program would reduce voluntary turnover because employees would be happier with their pay packages, but he offers no evidence linking counseling with pay. This report failed to effectively deliver the message that Howard has intended. What is the most likely reason for its failure?
An Equal Sign (=)
In spreadsheets, all functions and calculations begin with
Answer basic questions
In the PR story, what does the first paragraph do?
Identifying the business problem
In the context of dealing with business problems, which of the following should ideally be the first step?
Identifying reader benefits and constraints
In the context of the AIM planning process, what tends to be the single most important planning step for many messages?
Make well-reasoned conclusions and solutions.
In the course of creating an effective business message, excellent business thinkers are most likely to
Black
In the financial world, which color represents credits or profits?
Value
Wanda, the marketing manager at Royal Theatres, believes that employees should always act ethically and should also report instances of unethical behavior that they encounter. This belief held by Wanda is an example of a
Communication tools
Web 2.0 ____ _____ include social networks, like Twitter, blogs, wikis, gaming, podcasts, and information tagging.
On a cellular network
Where are data in transit found?
A discussion forum that allows users to post questions and answers
Which element is a typical Web 2.0. communication?
It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm
Which is the best definition of a cybersecurity exploit?
Team blog
Which medium is most likely to hold all of a work group's communications, such as updates, progress reports, and discussions?
I am committed to my industry.
Which meta message would most likely be communicated through a professional networking site such as LinkedIn?
Priorities
_____ involve ranking or assigning importance to things, such as projects, goals, and tasks.