ISDS 351 Exam #3
_____ is a program in which malicious code is hidden inside a seemingly harmless program.
A Trojan horse
Which of the following is created and issued by software engineers to remove a system vulnerability?
A patch
With a(n) _____ contract, the buyer pays the supplier for allowable performance costs plus a fixed fee payment usually based on a percentage of estimated costs.
CPFF
From the buyer's perspective, the _____ is the least desirable among all contracts because the supplier has no incentive to decrease costs.
CPPC
_____ contracts involve payment to the supplier for direct and indirect actual costs and often include fees.
Cost-reimbursable
Which of the following statements is true of a cookie?
Data about user preferences and activity is captured and stored under a cookie on a company's Web server.
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.
Doxing
Which of the following can result in effective knowledge management?
Enabling employees to share and build on one another's experience and expertise so that mistakes are not repeated
Which of the following has caused organizations to establish knowledge management programs in their information technology (IT) or human resource management departments?
Globalization
Social networking users are prone to _____.
Identity Theft
Which of the following is a reason for the rapid growth of the Internet of Everything?
Increased availability of network access
Which costs are difficult to measure in monetary terms?
Intangible costs
Identify a true statement about the bring your own device (BYOD) business policy.
It can improve employee productivity.
Which of the following is true of a cookie?
It captures browsing history for Web site customization and personalization purposes.
Which of the following is a drawback of the bring your own device (BYOD) business policy?
It exposes a company's data to malware.
Which of the following is true of stingray?
It impersonates a cell tower and forces all mobile phones within range to connect to it.
Which of the following is a technical description of a virus?
It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.
Which is true of earned value?
It is an estimate of the value of the physical work actually completed.
Which of the following is true of an enterprise search software?
It matches a user's query to many sources of information.
_____ is a process in which a novice and an expert work side-by-side to solve a problem so that the expert's approach is slowly revealed to the observant novice.
Joint problem solving
_____ comprises a range of practices concerned with increasing awareness, fostering learning, speeding collaboration and innovation, and exchanging insights of individuals, teams, or entire organizations.
Knowledge management
Which reserves allow for future situations that are unpredictable?
Management reserves
Which of the following is a feature of Internet censorship?
Monitoring the Internet activity of individuals
Which analysis technique simulates a model's outcome many times to provide a statistical distribution of the calculated results?
Monte Carlo
_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.
Net neutrality
Which of the following is true of knowledge management?
Organizations implement knowledge management projects to foster innovation by encouraging the free flow of ideas.
Which chart helps users identify the vital few contributors that account for most quality problems in a system?
Pareto
Which of the following can result in a significant damage to productivity and a decrease in the quality of service in an organization?
Permanent loss of expertise related to core operations
_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.
Phishing
A document used to solicit quotes or bids from prospective suppliers is known as a(n) _____.
RFQ
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?
Ransomware
The _____ is a description of the work required for a procurement.
SOW
Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?
Secure flight program
_____ involves a novice observing an expert executing his or her job to learn how he or she performs.
Shadowing
_____ is the abuse of email systems to send unsolicited email to large numbers of people.
Spam
Which statement is true of contingency reserves?
They allow for future situations that can be partially planned for.
Which of the following is true of white hat hackers?
They are hired by an organization to test the security of its information systems.
Which statement is true of analogous estimates?
They are most reliable when previous projects are similar in fact with current projects
Which statement is true of bottom-up estimates?
They are time-intensive and expensive to develop.
Identify the goal of knowledge management.
To improve the creation, retention, sharing, and reuse of an individual's or a team's knowledge
_____ is a qualitative risk analysis tool that maintains an awareness of risks throughout the life of a project in addition to identifying risks.
Top Ten Risk Item Tracking
What do people who seek to excel and tend to avoid both low-risk and high-risk situations to improve their chances for achieving something worthwhile have a high need for?
achievement
An example of pull communication is _____.
blogs
What is e-mail communication is most suited for?
communicating simple information
Validated changes and validated deliverables are the outputs of the ____ subprocess of project quality management.
controlling
In project procurement management, which process involves completion and settlement of each contract, including resolution of any open items?
controlling procurements
ZoomMe is a company that accumulates data on people from various sources such as online product registration forms, credit card purchases, and other public records. It then uses these data to create profiles on people and sell them to advertisers. ZoomMe comes under the category of _____.
data brokers
What term is used for any instance where the product or service fails to meet customer requirements?
defect
According to the guidelines provided by Practical Communications, Inc., a(n) _____ is a medium that is "excellent" for encouraging creative thinking.
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability.
exploit
What are the system's special characteristics that appeal to users?
features
Which document predicts future project status and progress based on past information and trends?
forecasts
In order to evolve, grow, and prosper, an organization must _____.
foster innovation by encouraging the free flow of ideas
Which term is used for the degree to which a system performs its intended function?
functionality
Most organizations are not in business to provide information technology services, yet many have spent valuable time and resources on information technology functions when they should have instead worked on important competencies such as marketing, customer service, and new product design. Outsourcing helps tackle this problem. Which benefit does outsourcing primarily provide in such a scenario?
helps focus on an organization's core business
Which type of intelligence involves the capacity to understand the motivations, intentions and desires of others?
interpersonal
What is one drawback of outsourcing?
it can make an organization become overly dependent on particular suppliers.
The items discussed in a(n) _____ include reflections on whether project goals were met, whether the project was successful or not, causes of variances on the project, reasoning behind corrective actions chosen, use of different project management tools and techniques, and personal words of wisdom based on team members' experiences.
lessons-learned report
What does the process of controlling costs primarily involve?
managing changes to the project budget
Which process involves tracking team member performance, motivating team members, providing timely feedback, resolving issues and conflicts, and coordinating changes to help enhance project performance?
managing the project team
According to the guidelines provided by Practical Communications, Inc., which is the most appropriate medium for giving complex instructions?
meeting
Which process involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project?
monitoring risk
Which statement is true regarding indirect costs?
not directly related to the products or services of a project.
Which addresses how well a product or service performs the customer's intended use?
performance
In the Tuckman model, what occurs when the emphasis is on reaching the team goals, rather than working on team process?
performing
Which process involves prioritizing risks based on their probability and impact of occurrence?
performing qualitative risk analysis
What is another term used for budget?
planned value
In project procurement management, which process involves determining what to procure, when, and how?
planning procurement management
Which process involves taking steps to enhance opportunities and reduce threats to meeting project objectives?
planning risk responses
According to McClelland's acquired-needs theory, what do people who want to direct others, and can be seen as bossy, have a need for?
power
Unenforceable conditions or contract clauses and adversarial relations are risk conditions associated with the project _____ management knowledge area.
procurement
What documents include a complete set of organized project records that provide an accurate history of the project?
project archives
What type of management includes the processes required to ensure that a project team completes a project within an approved budget?
project cost management
A shortage of qualified personnel is one of the main reason that companies outsource. A project may require experts in a particular field for several months and planning for this procurement ensures that the needed services will be available for the project. Which benefit does this characteristic of outsourcing provide an organization?
provides access to specific skills
Which process is often associated with the technical tools and techniques of quality management, such as Pareto charts, quality control charts, and statistical sampling?
quality control
What term is used for the relation of harmony, conformity, accord, or affinity?
rapport
Which type of power is based on an individual's personal charisma?
referent
What term is used for the ability of a product or service to perform as expected under normal conditions?
reliability
Which technique is used for resolving resource conflicts by delaying tasks?
resource leveling
Which term refers to the amount of individual resources an existing schedule requires during specific time periods?
resource loading
Which action applies to positive risks when the project team cannot or chooses not to take any actions toward a risk?
risk acceptance
Which action involves reducing the impact of a risk event by reducing the probability of its occurrence?
risk mitigation
Which action involves allocating ownership of the risk to another party?
risk sharing
What is at the top of Maslow's hierarchy of needs?
self-actualization
Which technique is used to show the effects of changing one or more variables on an outcome?
sensitivity analysis
Which method of communication is likely to be most effective for conveying sensitive or important information?
short face-to-face meetings
Which process involves choosing part of a population of interest for inspection?
statistical sampling
Which document describes where the project stands at a specific point in time?
status reports
The _____ line for any e-mail messages you write should clearly state the intention of the e-mail.
subject
Which testing involves an independent test performed by end users prior to accepting the delivered system?
user acceptance