MIS Exam 4 Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

DDoS

-Uses numerous computers to overwhelm network -Distributed Denial of Service

The most common disease related to technology is

CTS

Unauthorized access is most likely to occur in

Client-computer

Sniffing is most likely to occur in

Communication lines

The four key technical trends

Doubling computing power Data storage costs rapidly declining Data analysis advances NETWORKING ADVANCES AND INTERNET

Advances in data storage made violation of privacy more difficult T/F

False

Denial-of-Service (Dos) is used to destroy information and data T/F

False

P3P Scrambles Email or Data

False

DoS

Flooding server with thousands of false requests to crash the network

Worm

Independent computer program that copies itself from one computer to another

Intellectual Property is

Intangible property

In system development cycle, end users are

Limited to providing information requirements and reviewing the technical staff's work

The P3P is concerned with

Limiting or blocking cookies *tool to help users determine the kind of personal data that can be extracted by web sites. The Platform Privacy Preferences

Controls

Methods that ensure safety of assets, accounts, accuracy, accounting records

NORA (Non-obvious Relationship Awareness) is

New data analysis technology

In addition to email, instant messaging

P2P can also pose threats on computer systems and networks

Use of computers to create detailed information on individuals is called

Profiling

In Direct Cutover Conversion

Replaces old system immediately

Protocols used for secure information transfer

SSL (Secure Sockets Layer) TLS S-HTTP *SSL and TLS (Transport Layer Security) are designed to establish secure connection between two computers, whereas S-HTTP encrypts only individual messages

Phishing is a form of

Spoofing

Unit Testing

Tests each program separately

System Testing

Tests system as a whole

Conversion

Transferring data from one system to another

End-user developed systems can be completed more rapidly than conventional life-cycle T/F

True

Prototyping is more iterative than conventional life cycle T/F

True

Worms spread faster than viruses T/F

True

Public uses two keys T/F

True If multiple choice, 2 keys

The introduction of new information technologies can be called

a ripple effect

Evil twins are

bogus network access points that look legitimate

CVS refers to

eyestrain

As a technical project manager, you

identify user requirements

Sarbanes-Oxley Act

imposed responsibility on companies to safeguard financial information

HIPAA Act

outlines medical security

Spoofing is

redirecting link to another address

Pharming is

redirecting users to fraudulent website when correct address is typed

Process that develops detailed description of functions info system must perform

requirements analysis

Example of Phishing

setting up fake medical website

System design

shows how new system will fulfill the requirements

Key logger is a type of

spyware

Fourth-generation tools cannot replace conventional tools for some businesses because

they cannot easily handle the processing of large numbers of transactions or applications with extensive procedural logic and updating requirements

Tools for BPM (Bus. Proc. Mgmt) include all except

tools to test security

A cookie is stored on

visitor computer


संबंधित स्टडी सेट्स

Microecon - Chapter 9 Concept Check Quiz

View Set

Chapter 8: Power and influence tactics

View Set