Combo with "Combo with "Info 360 Final Exam" and 2 others" and 3 others
The comments of consumers in the blogosphere concerning a company's products are called ____________________.
b) Consumer-generated media.
Which of the following is not an example of Web 2.0 applications?
e) AJAX
Which of the following is not a strategy for mitigating the risk of threats against information?
e) Installing an updated operating system.
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date.
e) Logic bombs
Refer to Opening Case -- Small Businesses in Danger; Which of the following is not a consequence of poor information security practices?
e) Loss of equipment
Web site that combines content from other Web sites to form new content is called a(n) ______
e) Mashup
Which of the following tools are not used by marketing professionals to compile market research?
e) RSS
Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications?
e) Social commerce
Refer to IT's About Business 8.4 - So You Want to Find a Job: Which of the following is a benefit of searching for a job online?
e) Social networking can help personalize the search.
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password?
e) The name of the company spelled backward
Which of the following is not a characteristic of strong passwords?
e) They tend to be short so they are easy to remember.
Many companies are using ________ to capture updated product features and specifications.
e) Wikis
You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
e) Wikis
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.
e) distributed denial-of-service
Crowdsourcing
e) presumes that a large number of enthusiasts can outperform a small group of experienced professionals.
In _____, the organization purchases insurance as a means to compensate for any loss.
e) risk transference
Voice and signature recognition are examples of:
e) something the user does.
HR departments use social computing applications to assist them in which of the following activities:
e. e) All of the above
Which of the following is a risk of social computing?
e. e) Consumer-generated content is not edited or filtered
Conversational marketing can take place in which of the following forums?
. e) All of the above
Cybercriminals can obtain the information they need in order to assume another person's identity by:
All of the above are strategies to obtain information to assume another person's identity.
The reliability of the content in Wikipedia, the online encyclopedia, is questionable because
It is difficult to test the authenticity of the content due to the fact that anyone can contribute content.
Refer to Closing Case 1 - Compliance: Which of the following is not an important component of a GRC framework?
Restricing employee use of Web sites.
Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true?
The site should be an almost exact replica of the IT configuration at headquarters
The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their cold site to minimize downtime should such a disaster hit. Which of the following statements is false?
The site will have all of the company's applications
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources
a) Access
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.
a) Alien software
Refer to Closing Case 2 - Computer Espionage: Which of the following is not a technique used in electronic espionage?
a) VPN
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.
a) Viruses
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.
a) keyloggers, screen scrapers
Unintentional threats to information systems include all of the following except:
a) malicious software
An information system's _____ is the possibility that the system will be harmed by a threat.
a) vulnerability
You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is not on the ________________ list so it cannot be installed.
a) white
Social computing has allowed customers
a. a) To be advocates and influencers.
Which type of social network allows users to edit and contribute content posted to a particular site?
a. a) Wiki
Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services.
a. a) intermediaries
35) Which of the following statements concerning blogging is false?
b) A reader can believe all of the details in a blog.
The computing skills necessary to be a hacker are decreasing for which of the following reasons?
b) Computer attack programs, called scripts, are available for download from the Internet.
Refer to IT's About Business 8.5 - Scientific Discoveries: InnoCentive organizes online contests (challenges which are aimed at solving a business or scientific problem) with prize money. This is an example of
b) Crowdsourcing
Refer to Opening Case - Tiger Tans and Gifts: Which of the following is true about Lisa's use of Facebook to grow her business?
b) Lisa does not do online selling via Facebook
With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________.
b) Passively receive information, participate with the site.
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.
b) Risk analysis
Which of the following is (are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
b) Spamware
Which of the following is an advantage of social commerce over traditional ecommerce?
b) The ability to predict buying habits based on real-time data
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?
b) The message could be a phishing attack.
Refer to IT's About Business 8.3 - Buying a Vehicle Takes Work: Cars.com integrates different types of data from different sources and presents it to customers. Which of the following is false about its Web 2.0 efforts?
b) Users need to join Cars.com in order to obtain pricing quotes from dealerships.
You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?
b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.
Access controls involve _____ before _____.
b) authentication, authorization
You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is on the ________________ list so it cannot be installed.
b) black
Employees in which functional areas of the organization pose particularly grave threats to information security?
b) human resources, management information systems
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.
b) patent
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key
b) public, private
Which of the following is a type of collaborative consumption?
b. b) Craigslist
50) Which of the following is not an example of social shopping?
b. b) Going to Amazon.com to buy a book
Which of the following social shopping methods contributes to environmental sustainability?
b. b) Peer-to-peer shopping
The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________.
b. b) social intelligence
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is false?
c) A hot site needs to be located close to the organization's offices
Which of the following is a true statement about the impact of social computing on a business?
c) A small minority of individuals contribute the majority of feedback and can provide skewed data
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?
c) A trade secret
The cost of a stolen laptop includes all of the following except:
c) Backup costs
Which of the following is true about social commerce?
c) Businesses can easily learn about customers' experiences.
Which of the following statements is false?
c) It is easy to assess the value of a hypothetical attack.
Refer to IT's About Business 7.3 - How to Fight a Botnet: A botnet is a collection of Intenet connected computers whose security defenses have been breached and control ceded to a malicious party. Which of the following types of software attacks did Rustock use to create its botnet.
c) Phishing attack
Which of the following is not an example of crowdsourcing?
c) Posting a call for out-pf-date textbooks
Which of the following statements concerning the difficulties in protecting information resources is not correct?
c) Rapid technological changes ensure that controls are effective for years.
Refer to IT's About Business 7.1 - "Anonymous" Attacks the Vatican: Which of the following statements about Anonymous' attack on the Vatican is true?
c) The final effort was a DDoS attack.
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
c) Trojan horses
Pinterest is:
c) a shareable online bulletin board.
Rank the following in terms of dollar value of the crime, from highest to lowest.
c) cybercrime - white collar crime - robbery
You start a new job. You know that logging in with your password authenticates who you are. What actions, rights, or privileges you have based on
c) passphrase.
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a PostIt note and put it on your laptop screen. This is an example of
c) poor security.
In _____, the organization takes concrete actions against risks.
c) risk mitigation
One of the problems that HR departments have with using social computing to recruit is
c) they receive many more applications than they can process.
A _____ is intellectual work that is known only to a company and is not based on public information.
c) trade secret
Dumpster diving is:
c) typically committed for the purpose of identity theft.
Which of the following is true about the impact of social computing on customer service?
c. c) Customers themselves can be used to reduce problems.
A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________.
c. c) Enterprise Social Networks
Groupon is an example of ________________
c. c) Group shopping
Which of the following is false about social advertising?
c. c) Social advertising removes peer pressure from the buying decision.
57) The monitoring, collection, and analysis of socially generated data is called
c. c) Social intelligence
Which of the following is not an example of social commerce?
d) Best Buy has a Web site which can be used to purchase products for pick up in a store.
Using social computing tools to do market research
d) Can foster closer customer relationships
Which of the following statements concerning firewalls is false?
d) Firewalls filter messages the same way as anti-malware systems do.
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
d) Phishing
Which of the following is not a strong password?
d) Rainer
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
d) Social engineering
The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their warm site to minimize downtime should such a disaster hit. Which of the following statements is true?
d) The site will not have any of the company's applications.
LinkedIn is a _______________________ social networking site that makes money from advertising and services.
d) Video-upload
Which of the following is not a social networking site?
d) Wikipedia
You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?
d) You will be notified of updates in the content areas you selected.
The most overlooked people in information security are:
d) janitors and guards
Which of the following factors is not increasing the threats to information security?
d) limited storage capacity on portable devices
Your friend works in the risk management department for a mid-size financial institution. She said it's an interesting job - she has to put a value on each asset (information included), determine a probability that it would get compromised, and compare that to the cost of protecting that asset. This process is called
d) risk analysis.
Passwords and passphrases are examples of:
d) something the user knows.
A _____ is any danger to which an information resource may be exposed.
d) threat
An organization's e-mail policy has the least impact on which of the following software attacks?
d) zero-day
Ratings, reviews, and recommendations
d. d) Are an aspect of social shopping.
All of the following are used to provide online market research except
d. d) Emails
Biometrics are an example of:
something the user is
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved
whitelisting, blacklisting