MIS Exam 2
which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? a. computer fraud and abuse act b. economic espionage act c. electronic communications privacy act d. data security and breach notification act e. national information infrastructure protection act
National Information Infrastructure Protection Act
_______ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation a. analytical b. employee c. operational d. partner e. next-generation
Operational
The intentional defacement or destruction of a website is called a. spoofing b. cybervandalism c. cyberwarfare d. phishing e. pharming
cybervandalism
the bullwhip effect can be countered by a. globalization b. disintermediation c. implementing a CRM d. reducing information uncertainty e. product differentiation
reducing information uncertainty
the Gramm-leach-bailey act: a. requires financial institutions ensure security of customer data b. specifies best practices c. imposes responsibility on companies c. outlines medical security and privacy rules e. identifies computer abuse as a crime
requires financial institutions to ensure the security and confidentiality of customer data
__________ monetizes the value of the data stored by search engines a. TCP/IP b. RSS c. WiMax d. IoT e. Search engine marketing
search engine marketing
Customer service modules in CRM systems provide tools for: a. assigning and managing customer service requests b. capturing prospect and customer data c. identifying profitable and not customers d. managing sales and contact info e. organizing effective marketing campaigns
assigning and managing customer service requests
According to the 2017 identity fraud study by Javelin Strategy & research, how much did consumers lose to identity fraud in 2016? a. $1.6 million b. $16 million c. $160 million d. $1.6 billion e. $16 billion
$16 billion
According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately: a. $900,000 b. $9 million c. $90 million d. $9 billion e. $90 billion
$9 million
Which of the following customer relationship management applications provides analysis for customer data? a. operational CRM b. analytical CRM c. operational SCM d. analytical SFA e. operational SFA
Analytical CRM
Which of the following is used to analyze customer buying patterns? a. CLTV b. analytical CRM c. operational CRM d. demand planning e. SFA
Analytical CRM
The most common web servers today are: a. microsoft IIS and IBM HTTP Server b. WebSTAR and Netscape server c. IBM HTTP server and Apache HTTP Server d. Netscape server and Apache HTTP e. Apache HTTP server and Microsoft IIS
Apache HTTP server and Microsoft IIS
Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall? a. NAT b. packet filtering c. deep packet inspection d. stateful inspection e. application proxy filtering
Application proxy filtering
The most appropriate wireless networking standard for creating PANs is: a. I-mode b. IEEE 802.11b c. Wifi d. Bluetooth e. RFID
Bluetooth
The measurement of the number of customers who stop using or purchasing products or services from a company is called: a. switching costs b. churn rate c. CLTV d. switch rate e. turnover percentage
Churn rate
The internet is based on which three key technologies? a. TCP/IP, HTMI, HTTP b. TCP/IP, HTTP, and packet switching c. Client/server computing, packet switching, and the development of communications standards for linking networks and computers d. Client/server computing, packet switching, and HTTP e. Email, instant messaging, and newsgroup
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Computer forensics tasks include all of the following except: a. presenting collected evidence in a court of law b. securely storing recovered electronic data c. collecting physical evidence on the computer d. finding info in a large volume e. recovering data from computers...
Collecting physical evidence on the computer
which of the following is a virus that uses flaws in Windows software to take over a computer remotely a. Sasser b. Zeus c. Cryptolocker d. ily e. Conficker
Conficker
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. a. DDos b. DoS c. SQL d. phishing e. botnet
DDoS
Which supply chain planning function determines how much product is needed to satisfy all customer demands? a. distribution management b. replenishment planning c. demand planning d. order planning e. customer planning
Demand planning
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? a. multiplexing b. packet shifting c. packet routing d. ATM e. packet switching
Packet switching
As described in the chapter case, which of the following did hackers use to gain access to the DNC network? a. trojan horse b. phishing emails c. SQL injection attack d. computer worm e. pharming attack
Phishing emails
Which of the following about RFID is not true?
RFIDs require line-of-sight contact to be read
Which of the following pulls content from websites and feeds it automatically to a user's computers? a. FTP b. RSS c. HTTP d. Bluetooth e. IPv6
RSS
________ is a malware that hijacks a users computer and demands payment in return for giving back access a. trojan horse b. ransomeware c. spyware d. a virus e. evil twin
Ransomeware
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? a. hub b. switch c. router d. NIC e. Modem
Router
From your reading of the chapters opening case, Skullcandy chose enterprise resource planning software from which of the following ERP vendors? a. oracle b. SAP c. IBM d. Microsoft e. inför Global solutions
SAP
Which of the following can be used to help a website achieve a higher ranking with the major search engines? a. VPN b. IAB c. SEM d. SEO E. RSS
SEO
_________ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services a. customer b. SOA c. Marketing d. complex e. SFA
SFA
_______ identify the access points in a wifi network a. NICs b. Mac addresses c. URLs d. UTMs e. SSIDs
SSIDs
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? a. safety stock b. continuous replenishment c. just-in-time strategies d. demand planning e. perfect information
Safety stock
which of the following is not a defining feature of Web 2.0? a. interactivity b. real-time user control c. semantic search d. social participation e. user-generated content
Semantic search
Which process is used to protect transmitted data in a VPN? a. tunneling b. PPP c. VOIP d. Packet switching e. Chaining
Tunneling
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. a. DPI b. MSSP c. NSP d. PKI e. UTM
UTM
Which of the following is the single greatest cause of network security breaches? a. viruses b. user lack of knowledge c. trojan horses d. cyberwarfare e. bugs
User lack of knowledge
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? a. war driving b. sniffing c. cybervandalism d. drive-by tapping e. snooping
War driving
the 802.11 set of standards is known as: a. WLAN b. WSN c. Wifi d. WiMax e. WAN
Wi-Fi
Which of the following is an example of a key logger? a. zeus b. conficker c. sasser d. ily e. crypto locker
Zeus
________ is spyware that logs and transmits everything a user types a. spyware b. trojan horse c. a keylogger d. a worm e. a sniffer
a keylogger
Which of the following is the best description of a protocol in a telecommunications network architecture? a. a device that handles the switching of voice and data in a local network b. a standard set of rules and procedures for control of communications in a network c. a communications service for microcomputer users d. the main computer in a telecommunications network e. a pathway through which packets are routed
a standard set of rules and procedures for control of communications in a network
What are the four layers of the TCP/IP reference model? a. physical, application, transport and network interface b. physical, application, internet, and network interface c. application, transport, internet, and network interface d. application, hardware, internet, and network interface e. software, hardware, network interface, internet
application, transport, internet, and network interface
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: a. click fraud b. DDoS attack c. spear phishing d. pharming e. identity theft
spear phishing
All of the following have contributed to an increase in software flaws except: a. growing complexity of software b. growing size of software programs c. demands for timely delivery to markets d. inability to fully test programs e. the increase in malicious intruders seeking system access
the increase in malicious intruders seeking system access
Concurrent supply chains are made possible by which technology? a. ERP systems b. the internet c. supply-chain management systems d. just-in-time supply chain technologies e. extranets
the internet
Marketing modules in CRM systems provide tools for all of the following except: a. assigning and managing customer service requests b. capturing prospect and customer data c. identifying profitable and not customers d. qualifying leads e. identifying opportunities for cross-selling
assigning and managing customer service requests
Evil twins are A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users.
bogus wireless network access points that look legitimate to users
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the _______ effect a. network b. bullwhip c. ripple d. whirlpool e. diffraction
bullwhip
Operational CRM applications include tools for all the following except? a. sales forces automation b. call center support c. marketing automation d. customer service support e. calculating CLTV
calculating CLTV
The telephone system is an example of a ________ network a. peer-to-peer b. wireless c. packet-switched d. circuit-switched e. client/server
circuit-switched
a salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitors advertising costs up. this is an example of a. phishing b. pharming c. spoofing d. evil twins e. click fraud
click fraud
Selling a customer with a checking account a home improvement loan is an example of: a. operational CRM b. direct marking c. sales force automation d. cross-channel promotions e. cross-selling
cross-selling
A foreign country attempting to access government networks in order to disable a national power grid is an example of: a. phishing b. denial-of-service attacks c. cyberwarfare d. cyberterrorism e. evil twins
cyberwarfare
Client/server computing is a: a. network that connects sensors to desktop computers b. network where centralized mainframe computers have local devices c. centralized model of computing for large corporations d. distributed computing model where clients are linked to one another through a network that is controlled by a network server computer e. centralized computing model where local computers are connected to one another by a network
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer
Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? a. churn rate b. customer lifetime value c. cost per lead d. cost per sale e. customer average value
Customer lifetime value
In TCP/IP, IP is responsible for which of the following? a. disassembling and reassembling packets during transmission b. establishing an internet connection between two computers c. moving packets over the network d. sequencing the transfer of packets e. breaking messages down into packets
disassembling and reassembling packets during transmission
The WiMax standard can transmit up to a distance of approximately: a. 30 meters b. 500 meters c. 30 miles d. 5 miles e. 70 miles
30 miles
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. a.2 b. 5 c. 8 d. 15 e. 20
8
Which of the following is a type of ambient data? a. computer log containing recent system errors b. a file deleted from a hard disk c. file that contains an applications user settings d. set of raw data e. data that has been recorded over
A file deleted from a hard disk
Which of the following provides a suite of integrated software modules for finance and accounting, HR, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? a. process management software b. ERP systems c. groupware d. CRM software e. Supply chain management systems
ERP Systems
CRM systems help businesses achieve which of the following business objectives? a. automated accounting processes b. automated production forecasts c. faster time to market d. enhanced supply intimacy e. enhanced customer intimacy
Enhanced customer intimacy
Web browser software requests web pages from the internet using which of the following protocols? a. URL b. HTTP c. DNS d. HTML e. FTP
HTTP
One of more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: a. touch points b. netcenters c. hot points d. wireless hubs e. hotspots
Hotspots
a(n) ____________ is a commercial organization with a permanent connection to the internet that sells temporary connections to retail subscribers a. RSS b. WAN c. NFP d. ISP e. FTP
ISP
Shopping bots use ________ software for searching the Internet. a. web 2.0 b. web 3.0 c. intelligent agent d. comparison e. SEO
Intelligent agent
Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? a. web 3.0 application b. IoT application c. BLE app d. GPS app e. RFID app
IoT Application
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy. a. just-in-time b. frictionless c. bullwhip d. safety stock e. streamlined
Just-in-time
4G networks use which of the following standards? A) GSM and LTD B) CDMA and PAN C) LTE and LTD D) T-Mobile and AT&T E) LTE and WiMax
LTE and WiMax
Which of the following is an important capability for sales processes that is found in most SFA modules in major CRM software products? a. returns management b. lead management c. channel promotions management d. events management e. customer satisfaction management
Lead Management
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? a. logging transactions b. managing the supply chain c. lowering network costs d. enabling client communications e. improving employee engagement
Managing the supply chain
Which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner? a. supply chain demand system b. supply chain delivery system c. supply chain planning system d. supply chain execution system e. supply chain optimization system
Supply chain execution system
Which of the following enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product? a. supply chain demand system b. supply chain delivery system c. supply chain optimization system d. supply chain execution system e. supply chain planning system
Supply chain planning system
On which of the following protocols is the internet based? a. TCP/IP b. FTP c. IMAP d. HTTP e. DNS
TCP/IP
a VPN: a. encrypted private network configured within a public network b.more expensive than a dedicated network c. provides secure, encrypted communications using telnet d. is an internet-based service for delivering voice communications e. proprietary networking service technology developed by individual corporations
encrypted private network configured within a public network
Supply chain execution systems provide all of the following functions except: a. generating demand forecasts for products b. tracking flow of finished goods c. managing materials d. managing warehouse operations e. managing the financial info involving parties
generating demand forecasts for products
When hackers gain access to a database containing your personal private information, this is an example of: a. phishing b. spoofing c. social engineering d. identity theft e. pharming
identity theft
Which of the following is not an example of a computer used as a target of crime? a. knowingly accessing a protected computer to commit fraud b. accessing a computer with authority c. illegally accessing stored electronic communication d. threatening damage to protected computer e. breaching confidentiality of protected data
illegally accessing stored electronic communication
The sarbanes-oxley act: a. requires financial institutions ensure security of customer data b. specifies best practices c. imposes responsibility on companies and management to safeguard the accuracy of financial information c. outlines medical security and privacy rules e. identifies computer abuse as a crime
imposes responsibility on companies and management to safeguard the accuracy of financial information.
the business value of an effective supply chain management system includes all of the following except: a. faster time to market b. cost reduction c. supply matched to demand d. improved delivery service e. increased inventory levels
increased inventory levels
Uncertainties in the supply chain often lead to: a. declines in production b. increases in inventory across all tiers c. strategic changes in production plans d. the bull whip effect e. a reduction in safety stocks
increases in inventory across all tiers
A trojan horse: a. A Trojan horse is a software program that appears to be benign but then does something other than expected b. virus that replicates quickly c. malware named for a breed.... d. installs spyware on users' computers e. type of sniffer....
is software that appears to be benign but does something other than expected.
Why isn't overstocking warehouses an effective solution for a problem of low availability? a. does not speed product time to market b. inefficient use of raw materials c. increases sales costs d. it increases inventory costs e. it lowers fill rate
it increases inventory costs
which of the following statements about botnets is not true? a. 80% of the world's malware is delivered by botnets b. botnets are used to perpetrate DDoS attacks c. 90% spam delivered by botnets d. used for click fraud e. it is not possible to make a smartphone part of a botnet
it is not possible to make a smartphone part of a botnet
The backbone networks of the Internet are typically owned by long-distance telephone companies called: a. regional network providers b. enhanced service p c. internet bulk p d. backbone p e. network service p
network service providers
Major CRM products typically have all of the following service capabilities except: a. customer satisfaction management b. returns management c. call center & help desk d. service analytics e. order management
order management
the HIPAA Act of 1996: a. requires financial institutions ensure security of customer data b. specifies best practices c. imposes responsibility on companies c. outlines medical security and privacy rules e. identifies computer abuse as a crime
outlines medical security and privacy rules.
Which of the following is not a characteristic of packet switching? a. packets travel independently of each other b. packets are routed through many different paths c. packet switching requires point-to-point circuits d. packets include data for checking transmission errors e. packets are reassembled into the original message when they reach their destination
packet switching requires point-to-point circuits
Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. a. push; pull b. demand; continual c. upstream; downstream d. planning; execution e. maintenance; development
planning; execution
wireless sensor networks (WSNs) are used for the following tasks except a. processing consumer transactions b. monitoring machines c. detecting radioactive materials d. protecting property
processing consumer transactions
A supply chain driven by actual customer orders or purchases follows a ________ model. a. supply-based b. demand-driven c. replenishment-driven d. pull-based e. market-driven
pull-based
A supply chain driven by forecasts of consumer demand follows a ______ model a. pull-based b. build-to-stock c. push-based d. replenishment-driven e. optimized
push-based
As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers. a. raw materials b. intermediate products c. basic products d. natural resources e. nascent products
raw materials
Pharming involves A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake Web sites to ask users for confidential information. D) using e-mails for threats or harassment.
redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
Which of the following statements is not true about search engines? a. they are arguably the internets "killer app" b. they have solved the problem of how users instantly find info on the internet c. they are monetized almost exclusively d. there are hundreds of search engines vying for user attention, with no clear leader having yet emerged e. users are increasingly using search engines on mobile devices
there are hundreds of search engines vying for user attention, with no clear leader having yet emerged
Supply chain planning systems perform all of the following functions except a. establish inventory levels for raw materials and finished goods b. identify the transportation mode c. determine where to store finished good d. determine how much product e. track the physical status of goods
track the physical status of a good
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: a. smart card authentication b. biometric authentication c. two-factor authentication d. symmetric key authorization e. token authentication
two-factor authentication
_______________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. a. wireless networks b. intranets c. virtual private networks d. modems e. unified communications
unified communications
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): a. uniform resource locator b. IP address c. third-level domain d. root domain e. child domain
uniform resource locator
Blockchain refers to a technology that: A) uses a distributed ledger system of transactions. B) uses a centralized data store in the cloud. C) relies on the Internet to provide secure transactions. D) uses existing banking systems to transfer funds. E) relies on peer-to-peer networks.
uses a distributed ledger system of transactions
a(n) _________ is software for locating and managing stored web pages a. web server b. net server c. router d. modem e. hub
web server
When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of: a. sniffing b. social engineering c. phishing d. zero-day vulnerability e. snooping
zero-day vulnerability