Mang. Info. Systems

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Is the cloud a safer and more secure computing environment than an in-house network

.

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with

.

List at least three conditions that contribute to data redundancy and inconsistency

1. different meanings in different parts of the organization, 2. different names may be used for the same item, and 3. different descriptions for the same condition

________ is spyware that logs and transmits everything a user types

A keylogger

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced

Administrative

Which of the following statements about wireless security is not true

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers

In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules

Classifications

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards

Controls

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack

DDoS

the term big data refers to all of the following except

Datasets with fewer than a billion records.

Which of the following focuses primarily on the technical issues of keeping systems up and running

Disaster recovery planning

How does disaster recovery planning differ from business continuity planning

Disaster recovery planning devises plans for the restoration of disrupted computing and communications services. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services. Business continuity planning, on the other hand, focuses on how the company can restore business operations after a disaster strikes.

Explain how two-factor authentication increases security

Explain how two-factor authentication increases security

Explain what the term big data refers to. What benefits does it have, and what challenges does it pose

Explain what the term big data refers to. What benefits does it have, and what challenges does it pose

T/F A NOS must reside on all the local computers in a network

FALSE

T/F In a client/server environment, a DBMS is located on a dedicated computer called a web server

FALSE

T/F In green computing, reducing computer power consumption is not a top priority

FALSE

T/F It is much harder to eliminate a cloud service than to remove functionality from a company's core internal systems

FALSE

T/F Organizations can use existing network security software to secure mobile devices.

FALSE

T/F Smartphones do not have the same security flaws as other Internet-connected devices

FALSE

T/F Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses

FALSE

T/F TCO refers just to the original cost of purchased technology: both hardware and software.

FALSE

T/F VoIP technology delivers voice information in digital form using circuit switching

FALSE

In data mining, which of the following involves using a series of existing values to determine what other future values will be

Forecasting

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices

Green computing

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers

ISP

Interpretations of Moore's law assert that

Interpretations of Moore's law assert that

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?

Lack of flexibility

Have mainframes disappeared

Mainframes have not disappeared. They continue to be used to reliably and securely handle huge volumes of transactions, for analyzing very large quantities of data, and for handling large workloads in cloud computing centers

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

On-demand

Define outsourcing and explain some of the computing tasks that are well suited to outsourcing.

Outsourcing is the shift of IT infrastructure and systems development to external vendors. This is a good option for companies without the resources or technical capability to perform certain computing tasks. Tasks well suited to outsourcing include Web site hosting, Web design, development of custom software, and software maintenance. More basic tasks such as data entry and call center operation is often outsourced as well. Outsourcing often requires firms to enter into a service level agreement (SLA) that defines the specific responsibilities of the service provider.

Which of the following statements about RFID is not true

RFIDs require line-of-sight contact to be read

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

Security

In data mining, which of the following involves events linked over time

Sequences

T/F A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic

TRUE

T/F A hub is a networking device that sends packets of data to all other devices on the network.

TRUE

T/F An application server may reside on the same computer as a web server or on its own dedicated computer

TRUE

T/F Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel

TRUE

T/F Biometric authentication uses systems that read and interpret individual human traits

TRUE

T/F Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire

TRUE

T/F DoS attacks flood a network server with thousands of requests for service

TRUE

T/F Fiber-optic cable is more expensive and harder to install than wireless media

TRUE

T/F In a client/server network, a network server sets the rules of communication for the network

TRUE

T/F In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks

TRUE

T/F In cloud computing, accountability and responsibility for protection of sensitive data resides with the company owning the data.

TRUE

T/F It is much harder to eliminate a cloud service than to remove functionality from a company's core internal systems

TRUE

T/F Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down

TRUE

T/F The term data governance refers to the policies and processes for managing the integrity and security of data in a firm

TRUE

T/F billions of Internet-connected sensors

TRUE

List and describe four services that comprise IT infrastructure, beyond physical devices and software applications

Telecommunications services that provide data, voice, and video connectivity. Data management services to store, manage, and analyze data Physical facilities management services, to develop and manage physical installations of technology. IT education services that provide training in use of the systemS

T/F

Telephone networks are based on the same principles as computer networks

Explain the Domain Name System. What are some of the common domain name extensions currently available and what types of services do they designate?

The Domain Name System (DNS) converts domain names to IP addresses. DNS is a hierarchy, with the root domain at the top, top-level domains such as .com and .edu one level below, and second-level domains designate a top-level name and a second-level name, like amazon.com.

The Gramm-Leach-Bliley Act

The Gramm-Leach-Bliley Act

All of the following are typically factors in a firm's decision to engage consulting and system integration services except

The firm's staff knows more about the firm's IT infrastructure than service providers

Which of the following is an example of a legacy system?

Transaction processing system running on a mainframe

T/F server computing is a primary example of decentralized processing

True

Which of the following is the single greatest cause of network security breaches

User lack of knowledge

Which of the following is not a part of the IT infrastructure ecosystem found in firms

Virtual reality systems

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources

Virtualization

_______ are created by combining and customizing components from different online software applications

Web mashups

What is the role of an information systems audit

What is the role of an information systems audit

What are the security challenges faced by wireless networks

Wireless networks are vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. Local area networks (LANs) using the 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software

What are wireless sensor networks? How do they work and what are they used for

Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces. Used for monitoring environmental changes; monitoring traffic or military activity; protecting property; efficiently operating and managing machinery and vehicles; establishing security perimeters; monitoring supply chain management; or detecting chemical, biological, or radiological material

Two-factor authentication utilizes a

a multistep process of authentication

Linux is

an example of open-source software

All of the following are physical components of an RFID system except

bar codes

The Internet of Things (IoT) refers to

billions of Internet-connected sensors

The telephone system is an example of a ________ network.

circuit-switched

IPv6 has been developed in order to

create more IP addresses

A foreign country attempting to access government networks in order to disable a national power grid is an example of

cyberwarfare

List and describe three main capabilities or tools of a DBMS.

data definition, data dictionary, and data manipulation language

What are the drawbacks of cloud computing? Do you think these ever outweigh the benefits, and if so, in what cases

dependence on cloud computing provider and switching costs placing data storage and control in another firm's hands

DBMSs typically include report generating tools in order to:

display data in a more structured and polished format than would be possible just by querying

SaaS refers to

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis

When hackers gain access to a database containing your personal private information, this is an example of

identity theft

The Sarbanes-Oxley Act

imposes responsibility on companies and management to safeguard the accuracy of financial information.

All of the following are issues with the traditional file environment except:

inability to develop specialized applications for functional areas

Implementation controls

include software controls, computer operations controls, and implementation controls

A VPN

is an encrypted private network configured within a public network

Infrastructure-as-a-Service (IaaS):

is one type of cloud computing service where users pay only for the computing capacity they actually use

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization

What are the essential characteristics of cloud computing?

on-demand self-service, ubiquitous network access, locationindependent resource pooling, rapid elasticity, and measured service.

All of the following are specific security challenges that threaten the communications lines in a client/server environment except

phishing

All of the following are specific security challenges that threaten corporate systems in a client/server environment except

radiation

1. different meanings in different parts of the organization, 2. different names may be used for the same item, and 3. different descriptions for the same condition

relational DBMS

In a relational database, the three basic operations used to develop useful sets of data are:

select, project, and join

All of the following are specific security challenges that threaten corporate servers in a client/server environment except

sniffing

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as

software packages

The domain .gov is a

top-level domain

Blockchain refers to a technology that:

uses a distributed ledger system of transactions.


संबंधित स्टडी सेट्स

Introduction to Computers Module 7

View Set

Chapter 12- Commercial Marine and Aviation Insurance

View Set

Chapter 4 U.S. History Review Questions

View Set

Simple past tense - irregular verbs

View Set

Behv 5627-Lecture Study Guide: Assessment and Treatment of Pediatric Feeding Disorders (Piazza)

View Set