ISTM exam 3
ERP implementations can be very expensive, averaging approximately _____.
$3.8 million
True about digital certifications
-Digital certificates authenticate that the public key belongs to the designated owner. -The recipient decodes the encrypted message by using the CA's public key. -Digital certificates contain the owner's identification and a copy of the owner's public key. -Digital certificates help a user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data.
TCP/IP protocol details
-IP is responsible for the delivery of packets and includes the disassembling and reassembling of packets. -TCP establishes a connection between the computers. -TCP/IP was developed to help scientists transmit data among different types of computers over long distances. -TCP sequences the transfer of packets and acknowledges the packets sent.
Functions of the Internet service provider (ISP)
-ISPs collect money from their customers and pay access fees. -The ISP provides a legitimate IP address. -ISPs receive communications from the Internet and pass them on to you. -ISPs serve as your gateway to the Internet.
Which of the following IS a security threat posed by the use of the iPhone, iPad, and other mobile computing devices in the workplace?
-Mobile devices have less stringent passwords and locks. -Mobile devices appear vulnerable to rogue apps. -Mobile devices are easily stolen and often contain corporate data. -Data leakage is caused by use of cloud storage services with mobile devices.
These are addressed by a business continuity plan
-The identification of critical business processes -Action plans for handling mission-critical functions if systems go down -How the company can restore business operations after a disaster strikes -When and how the plan is to be updated and refined
True about public key encryption
-The private key is kept secret. -It uses two keys that are mathematically related. -The sender encrypts the message with the recipient's public key. -The public key is shared using a directory.
Domain Name Service (DNS) details
-The top-level domain is called the "root." -DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. -DNS has a hierarchical structure. -The last word in the domain name represents the type of organization.
any business with an online presence is at risk of all of the following
-exposure to hacker activity -the loss of customer data -a denial-of-service attack -unauthorized data disclosure
If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed ________ meter(s).
100
Which of the following notations could represent a current IP address?
207.46.250.119
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to intended users.
What is Secure Hypertext Transfer Protocol?
A protocol for encrypting individual messages transferred over the Internet
Which of the following is a common wireless networking standard that is generally used for PANs?
Bluetooth
Which term refers to the wireless networking standard that is popular for creating small personal-area networks?
Bluetooth
The Internet is based on which three key technologies?
Client/server computing, packet switching, and standard communication protocols
In this video dramatization, which component of an ERP system that consolidates data from sales, marketing, and service departments is described?
Customer relationship management (CRM)
In the video, _____ is described as a set of integrated software modules that support nearly all of an organization's business processes.
ERP
According to this video, which of the following statements is true regarding enterprise resource planning systems?
Enterprise resource planning systems integrate data with a centralized database.
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Bliley Act
Which of the following mandates that financial services firms ensure security and confidentiality of customer data?
Gramm-Leach-Bliley Act
_______________ requires that your patient records be protected and saved for six years.
HIPAA
Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data?
HIPAA Act
What is the name of the organization responsible for assigning public IP addresses?
ICANN
The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000.
ILOVEYOU
The Domain Name System converts domain names to which of the following?
IP addresses
Which statement about the TCP/IP protocol is FALSE?
IP helps to recover any packets that are lost or damaged during transmission.
Enterprise systems provide value and help managers make better decisions by doing which of the following?
Increasing operational efficiency and providing firmwide information
________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer.
Input controls
Which of the following is a new network backed by universities, government, and private companies in more than 100 countries?
Internet2
A _____ is great for a city to set up for emergency and public use since it is larger than many types of network configurations.
MAN
Which of the following is NOT a security threat posed by the use of the iPhone, iPad, and other mobile computing devices in the workplace?
Mobile devices may dictate what kind of data an app can access inside its sandbox domain.
An individual wanting to enable his desktop PC at home to access the Internet must do which of the following?
Obtain a subscription with an Internet Service Provider (ISP)
Which statement about public key encryption is FALSE?
On receiving the message, the recipient uses the public key to decrypt it.
What type of system provides technology for tracking the movement of goods throughout a supply chain?
RFID
Which technology has recently been applied to inventory control, supply chain management, and the Internet of Things?
RFID systems
A just-in-time strategy means which of the following?
Raw materials arrive exactly when needed to be transformed into products, which are shipped as soon as completed.
Which of the following best describes pharming?
Redirecting users to a phony web page, even when the correct URL is typed in
Which law provides rules related to the creation of financial statements to help avoid fraud?
Sarbanes-Oxley Act
A company needing reliable digital communication service levels at speeds of 1.5 Mbps would probably need to lease a dedicated ________ line.
T1
Which statement about digital certificates is FALSE?
The CA verifies a digital certificate user's identity online.
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides application services.
Bandwidth is determined by calculating which of the following?
The difference between the highest and lowest frequency on a channel
Which statement about the Domain Name Service (DNS) is FALSE?
The first name in the domain name is the organization name.
Which of the following best defines hertz?
The number of cycles per second that can be sent through a medium
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
A(n) _______________ is a program that seems like a normal program, but does something completely unexpected.
Trojan horse
Electronic evidence on computer storage media that is not visible to the average user is called ________.
ambient data
The signal from your iPod earphone is a(n) ________ signal.
analog
A(n) ________ signal is a way to communicate in a network and is represented by a continuous waveform
analog
In this video, One Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____.
analog signal
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
authentication
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication.
biometric
According to the information in this video, computers represent data using _____.
bits
Which of the following occurs when information about product demand gets distorted as it passes from one entity to the next across the supply chain?
bullwhip effect
Enterprise software includes a database and thousands of predefined ________________.
business processes
Enterprise systems have a set of integrated software modules and a(n) _______________ by which business processes and functional areas throughout the company can ________ data
central database; share
According to the information in this video, the telephone system is an example of a _____ network.
circuit-switched
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
click fraud
Which of the following involves botnets deliberately moving through online ads and leads to higher marketing costs?
click fraud
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
cybervandalism
Which of the following examines data files and sorts out low-priority online material while assigning higher priority to business-critical files?
deep packet inspections
Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack.
denial-of-service
According to Agent Macey, the single largest threat to the Internet is _____.
denial-of-service attacks
Network signals that are represented by on-off pulses indicate which type of signal?
digital
Which of the following is a feature of Web 2.0?
dynamic content
As explained in the video, _____ processes support activities in multiple departments and span an organization.
enterprise
ERP stands for ________.
enterprise resource planning
Using a combination of hardware and software, _______ are able to control incoming and outgoing data on a network.
firewalls
Bandwidth transmission speed is measured in ______________.
hertz
Business processes supported by enterprise systems related to travel expense reporting are associated with ________ processes.
human resource
In the video, the company is implementing an ERP system to achieve which business objective?
improve decision making
Application controls can be classified as _____ controls, _______controls, and ________ controls.
input; processing; output
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers
keylogger
If you were building a network intended to service two buildings that were next to each other, you would construct a ________.
local area network
According to Agent Macey, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
malware
Customer relationship management typically focuses on three key elements of the customer relationship: ________.
marketing, sales, and service
As Zero-Bit and One-Bit explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.
modem
At its most basic level, a(n) _________ simply consists of two or more computers that are connected together.
network
Microsoft Windows Server and Linux are examples of ________.
network operating systems
Analytical CRM applications are based on data from _____________________.
operational CRM systems
In this video, One Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.
packet switching
Instead of sending an entire file in one big chunk across the Internet, __________ is used which dices the file up into little pieces that are sent independently across the communications paths, and then reassembled when they reach their destination.
packet switching
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________.
packet switching
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing
According to information provided in this video, any business with an online presence is at risk of all of the following EXCEPT _____.
poor customer service
A ________ is a set of rules that programs on two communicating devices follow.
protocol
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
ransomware
Establishing a risk level of malware threats to an organization is an example of _______________.
risk assessment
What type of communications processor directs packets of data through different networks, ensuring that data gets to the correct address?
router
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
social engineering
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers.
spoofer
If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices.
switch
ERP implementations introduce _____, which are large expenses associated with jumping from one vendor to another when implementing an ERP system.
switching costs
Education being represented by .edu and business represented by .com are examples of ________.
top-level domains
Which of the following is an opportunity for threats to gain access to assets?
vulnerability
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a ________.
wide area network
A __________ is a unique type of malware that replicates itself from one computer to another.
worm