MIS Exam 4 Questions
DDoS
-Uses numerous computers to overwhelm network -Distributed Denial of Service
The most common disease related to technology is
CTS
Unauthorized access is most likely to occur in
Client-computer
Sniffing is most likely to occur in
Communication lines
The four key technical trends
Doubling computing power Data storage costs rapidly declining Data analysis advances NETWORKING ADVANCES AND INTERNET
Advances in data storage made violation of privacy more difficult T/F
False
Denial-of-Service (Dos) is used to destroy information and data T/F
False
P3P Scrambles Email or Data
False
DoS
Flooding server with thousands of false requests to crash the network
Worm
Independent computer program that copies itself from one computer to another
Intellectual Property is
Intangible property
In system development cycle, end users are
Limited to providing information requirements and reviewing the technical staff's work
The P3P is concerned with
Limiting or blocking cookies *tool to help users determine the kind of personal data that can be extracted by web sites. The Platform Privacy Preferences
Controls
Methods that ensure safety of assets, accounts, accuracy, accounting records
NORA (Non-obvious Relationship Awareness) is
New data analysis technology
In addition to email, instant messaging
P2P can also pose threats on computer systems and networks
Use of computers to create detailed information on individuals is called
Profiling
In Direct Cutover Conversion
Replaces old system immediately
Protocols used for secure information transfer
SSL (Secure Sockets Layer) TLS S-HTTP *SSL and TLS (Transport Layer Security) are designed to establish secure connection between two computers, whereas S-HTTP encrypts only individual messages
Phishing is a form of
Spoofing
Unit Testing
Tests each program separately
System Testing
Tests system as a whole
Conversion
Transferring data from one system to another
End-user developed systems can be completed more rapidly than conventional life-cycle T/F
True
Prototyping is more iterative than conventional life cycle T/F
True
Worms spread faster than viruses T/F
True
Public uses two keys T/F
True If multiple choice, 2 keys
The introduction of new information technologies can be called
a ripple effect
Evil twins are
bogus network access points that look legitimate
CVS refers to
eyestrain
As a technical project manager, you
identify user requirements
Sarbanes-Oxley Act
imposed responsibility on companies to safeguard financial information
HIPAA Act
outlines medical security
Spoofing is
redirecting link to another address
Pharming is
redirecting users to fraudulent website when correct address is typed
Process that develops detailed description of functions info system must perform
requirements analysis
Example of Phishing
setting up fake medical website
System design
shows how new system will fulfill the requirements
Key logger is a type of
spyware
Fourth-generation tools cannot replace conventional tools for some businesses because
they cannot easily handle the processing of large numbers of transactions or applications with extensive procedural logic and updating requirements
Tools for BPM (Bus. Proc. Mgmt) include all except
tools to test security
A cookie is stored on
visitor computer