MBA 6207 Midterm
The Supreme Court has ruled that the right to anonymous expression is protected by _____.
1st amendment (free speech)
How long did Barbara Martin Coppola serve as the Chief Digital Officer at Ikea Retail?
4 yrs
Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____.
4th amendment
Netflix counts amongst its competitors not just those who make movies and TV shows, but those who provide leisure opportunities to people including books, magazines, and podcasts. Such a group of competitors is referred to as ____________.
Arena
What was an action needed to change Ikea stores to also perform as fulfilment centers?
Change floorplan of the stores.
What did digital transformation in Ikea not include?
Changing the company's culture.
A professional _____ states the principles and core values that an organization wishes to develop in its leaders and members and therefore defines desired behavior in these individuals.
Code of Ethics
Imagine you are conducting a security self-assessment. Which of the following might indicate one of your account passwords is too weak?
Contains LESS than 12 characters
Which of the following is not a part of Cyberthreat Narrative tool?
Core business processes operated by process automation.
A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?
Cost leadership
Your ex-colleague was apprehended and charged with a crime based on the Fraud and Related Activity in Connection with Access Devices Statute. He was caught using unauthorized or stolen _________
Credit Cards
What can you obtain for free once a year from three key agencies in order to find out what is stored about you in existing databases?
Credit report
Ikea's approach to designing systems where it is a priority to put people first in all data-driven processes is called the __________.
Customer Data Promise
Digital platforms efficiently enable __________, which is the process of customers becoming aware of a specific need to get something done, working through how to get the need met, such as by using a product or service, and moving to the conclusion of a service or end of a product's life.
Customer consumption chain
Which of the following activities does the USA Patriot Act define?
Cyberterrorism
______________ is a process mentioned in the case for ongoing learning approach to strategy that is low cost and quickly tests assumptions about what works, obtains new information, and minimizes risks.
Discovery-driven planning
Which of the following is an example of disruption of the traditional power generation industry by digital transformation?
Dynamically distribute power generated from dispersed small-scale producers.
Who are the employees best able to catalog the computer systems, and the services and functionality they provide for industrial control systems?
Engineers
The upper-level managers at LaDonna's organization hold a traditional view of information systems, so LaDonna's major goals for her IS department include _____.
Ensuring effectiveness and efficiency of processes
In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.
Exploit
Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?
FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.
A set of random or unrelated tasks performed to achieve a definite outcome is called a process
False
Scanning a computer's hard drive for viruses is essential, but scanning live memory is only important in certain situations.
False! Should always scan
When firms adopt a strategy of continually finding opportunities to digitize challenging processes in their core operations, which of the following is NOT a benefit they can get as described in the case?
Find which suppliers they can work with
The case study describes a cyberattack to illustrate how the narrative proposed by the authors could have prevented it. Who or what was the cyber adversary?
Former employee of a vendor
Which of the following laws covers false claims regarding unauthorized use of credit cards?
Fraud and Related Activity in Connection with Access Devices Statute
How much growth in e-commerce by Ikea is reported in the case study?
From 7% to 31% in 3 years.
Santiago's IS organization developed a mobile app that allows salespeople to include images of how a customer's bathroom would look with new tiles installed when they generate a quote for a customer. Santiago's IS organization is viewed as a _____.
Game changer
Which company did Ikea acquire to use the company's AI imaging technology to help customers shop better?
Geomagical Labs
Which of the following most precisely describes the approach to cybersecurity proposed by the authors?
Identify critical business activities, the risk to them, the systems supporting them, those system vulnerabilities, and potential attackers.
In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the __________.
Info System Security Analyst
What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in?
Info system strategic plan
collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____
Interorganizational info systems
Because digital firms' structures are evolving all the time, they are able to frequently experiment with and adjust features of their business strategies. Which of the following is NOT an example of this?
Keep activities of enforcing contracts within the firm.
The US-CERT newsletter has alerted you about a specific vulnerability in some software installed on your organization's computers. To detect any attempts at exploiting this vulnerability, you employ a(n) ____-based intrusion detection system.
Knowledge
What do cyberhackers need to execute an attack according to the authors?
Knowledge; Tools an equipment; Position
Which of the following is classified as a workgroup information system?
Monterey Bay Aquarium's tool that helps staff communicate, organize, plan, schedule, and track jobs
An operating system with _____ capabilities allows a user to run more than one program concurrently.
Multitasking
Kenneth is assisting with step 7 of his organization's security risk assessment. He and his team compare the risks of potential security breaches against the estimated costs of preventing them from happening. Why is this an important step?
No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs
What type of software is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users?
Open source
What was a major consequence of the NotPetya cyberattack?
Operations interruptions at many large companies worldwide.
_____ is/are considered to be the most important element in computer-based information systems.
People
Bubba creates a web application that allows his coworkers to generate reports providing information on sales, costs, and inventory that they need for their job functions without assistance. Bubba has developed a(n) _____.
Personal Info systems
Which of the following outlines what an organization aspires to become and lists its rules and principles?
Professional code of Ethics
What type of cyberattack was WannaCry?
Ransonware attack
After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____.
Recovery cost
What is the name of the project carried out by Best Buy to turn around the company in the last decade from huge financial losses and included digital transformation?
Renew Blue
Digital transformation often involves changing and adding skills to the workforce. What human-centric actions did Ikea take in this respect according to the case study?
Reskilling employees
The metric proposed by the authors to measure the progress on digital transformation is ____________.
Return on time invested
Which CEO is quoted in the case study in the context of changing the focus of cyberattack threat's potential impact?
Richard Lancaster of CLP Power Hong Kong
Which of these organizations offers guidelines on developing security policies?
SANS
Why would Claire, who has a Certified Information Systems Security Professional credential, object to shadow IT efforts at her company?
Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards
Ikea offers a shopping method in which customers scan the product in the store with their mobile device, pay, and skip the checkout line at the store. Ikea calls it __________.
Shop & Go
Which business organization became a cyber adversary by stealing software from its supplier business organization to carry out its own business operations?
Sinovel
The authors profess that identifying and fixing cyberrisks is a(n) __________.
Social Process
Which component of Leavitt's Diamond defines roles, responsibilities, and lines of authority among members of the organization, which must be understood and accepted for the organization to operate successfully?
Structure
Which of the following best describes human-centric technology?
Technology that leverages engraining ethical behavior and treating people without bias.
Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs?
The compiler translates the programs into a machine language
Which statement about the drivers that help set information system organizational strategy is false? a. They include innovative thinkers inside, but not outside, the organization. b. They include more general organizational strategies at the corporate level. c. They include technology innovations in hardware and software. d. They include the perception of the IS organization by the rest of the organization
They include innovative thinkers inside, but not outside, the organization.
A _____ is a low-cost, centrally managed computer with limited capabilities and no internal or external attached drives for data storage.
Thin client
An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack.
True
Digital transformation at Ikea went beyond changing the technology to transform the business.
True
If an IS organization is viewed as a cost center/service provider, its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better.
True
Managers of the business functions most affected by the new information system have a key responsibility to ensure that the people, processes, and human structure components are fully addressed.
True
There are laws that require businesses to prove that their data are secure.
True
You discover that an unknown party has gained administrator-level access to your computer, but the programs allowing this invasion are not visible to the legitimate system administrators. You have probably been hit by a rootkit.
True
The concept of a value chain is meaningful to tax preparers and restaurants because these businesses _____.
add value to their products and servcies
In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.
aid in product transformation produce output provide input into the process
Because some threats, such as insider fraud, are more likely to occur than others, step 3 of the risk assessment process is to _____.
assess the frequency of events or the likelihood of each potential threat
Which of the following is a provision of the USA PATRIOT Act?
authorization of "snack and peak warrants" for law enforcement agencies
To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled _____.
computer forensics investigation
The final step in the security risk assessment process is to _____.
decide whether or not to implement particular countermeasures
When looking for opportunities to benefit from digital transformation, a big firm with its resources to experiment with a variety of ideas, operations and processes, is more likely than a start-up to discover a _______________
dominant model
New cars come with onboard computer systems that control antilock brakes, air bag deployment, fuel injection, etc. They run operating system software known as ____.
embedded operating system
An IS manager is focusing on the people component of Leavitt's Diamond when he or she _____.
ensures that the IS help desk is available during work hours
If an activity is defined as legal then it is ethical.
false
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.
false
The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft.
false
Corporate social responsibility activities such as philanthropy benefit for-profit organizations because they:
gain the goodwill of the community
Hacktivist
hacks computers or Web sites in an attempt to promote a political ideology
One example of a common and significant ethical dilemma related to safety-critical systems is deciding:
how much software testing is sufficient
A(n) _____ device provides data and instructions to the computer and receives results from it.
input/output
Anonymous expression
is an important right of a democratic society because it protects people from reprisals for their opinions
Compared with commercially licensed software, open-source software _____.
is available for similar purposes such as CPU operation and database management
A high-quality software system _____.`
is easy to learn and use
Server virtualization offers significant cost savings because _____.
it increases the total operating capacity of each physical server
Role of an MSSP (Managed Security Service Provider)
monitoring, managing, and maintaining computer and network security
Vincent holds an executive position within an organization that processes individual customers' information. If those customers live in the European Union, Vincent _____.
must ensure his team maintains data protection policies and employs a data protection officer
Botnet
network of computers that send out access requests to servers repeatedly
Ethical business practices
often raise an organization's priority with suppliers and other business partners
The class of computer systems used by multiple concurrent users offers businesses the potential to increase their processing capability to handle more users, more data, or more transactions in a given period, which is known as _____.
scalability
Hardware utilization can be improved by logically dividing the resources of a single physical server to create multiple logical servers. This approach is known as _____.
server virtualization
When an IS organization is viewed as a business partner/business peer:
strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization
The process of building software for safety-critical systems _____.
takes much longer than that for high-quality systems
In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to
technological developments and potential terrorists threats
Kennedy's company is adopting a service-oriented architecture approach to software development. This means that _____.
their software will be flexible enough to allow the addition of new services
Procedures are an important component of an IS implementation approach because _____.
they can help avoid lengthy business disruptions following a natural disaster
Government entities may pressure upstream Internet service providers to _____.
track and monitor the Internet activities of individuals
Which firm is mentioned in the opening paragraphs whose mobile app project failed in spite of receiving top priority from its management?
veon
You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ______.
your non-work-related use of the laptop could increase vulnerability