IS 3100

Ace your homework & exams now with Quizwiz!

Select three of the following examples that show the relationship between inventory management and business success.

A California grocery store reduces prices on several varieties of summer fruit. A New York electronics retailer limits the number of niche smartphones it orders. A Chicago hardware store runs out of snow shovels in January to the frustration of its customers.

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment.

The level of protection provided may be determined by the priority level.

A computer virus is software that infects computers and is created using computer code. Viruses can destroy programs or alter the operations of a computer or network.

Which of the following is a situation that UEBA would flag for review? More than one answer may be correct.

A user normally spends less than an hour accessing a secure server. One day, she spends almost all of her time accessing the data on that server. A user who normally sends between 50 and 100 emails a day sends over 1,000 emails one day.

What is conducted in the process design step of business process management?

Activities are examined and divided into their individual components.

Why do organizations need to determine their highest priority security risk? More than one answer may be correct.

An organization may not have the resources to protect all of its data. The level of protection provided may be determined by the priority level.

Which of the following are important questions to ask before signing a service level agreement (SLA) with a cloud services security vendor? More than one answer may be selected.

Are you in compliance with local, state, and federal security standards and regulations? Do you go through external security audits? How is data from different corporations kept separate?

Imagine you are speaking with a friend about how to protect yourself from phishing scams. Your friend, who works in cybersecurity, gives you some advice about what to do if you receive a phishing message. Which of the following statements would be considered good advice?

Banks and credit card companies will never ask you to provide personal information via email messages. If you receive a suspicious message, contact the institution that the message was allegedly sent from. Contact US-CERT to report the suspected scam.

Describe benefits of cloud-based ERP systems over on-premises ERP solutions. More than one answer may be correct.

Cloud-based ERP systems allow organizations to access reports from remote locations. Cloud-based ERP systems have lower IT infrastructure expenses. Organizations using cloud-based ERP systems have reduced IT labor expenses.

Which of the following statements about sources of customer data are correct?

Customer surveys collect feedback from customers. Data collection from social media platforms can be integrated within a CRM platform. Analytics are used to uncover trends in the collected data.

What typically happens during Step 3 of business process management just before the execution process is fully automated?

Decision makers compare engine output to previous business activity.

Which statement best explains why rootkits can be difficult to detect?

Many types of rootkits are designed to bypass installed security software.

Cloud-based ERP systems are a form of

SaaS- software as a service

Which privacy law gives the government authority to prevent unfair or deceptive trade practices?

Section 5 of the Federal Trade Commission

Which of the following describes a popular collaboration software program that is used in business? More than one answer may be correct.

Smartsheet is online project management software that focuses on the collaborative aspects of project management. Smartsheet is online project management software that focuses on the collaborative aspects of project management. Trello is a collaboration tool that organizes projects into boards to create visual representations of project info and status.

Which of the following are true about spear phishing attacks? More than one answer may be correct.

Spear phishing is a type of attack designed to target specific individuals. Spear phishing attacks are designed to install malware on a device.

Which step of business process management allows managers to create a continually improving process?

Step 5: process optimization

Integrating a business software module into an ERP has several advantages. Which of the following business software modules includes customer payment information?

TPS software

A company is trying to determine why users are deleting or no longer engaging with their app on a regular basis. Which of the below is an example of how the company could use CRM to make this determination?

The company could use CRM to determine what part of the app users who deleted it were in right before the app was deleted.

Which of the following is an example of how the project communications piece of project management software could be used when integrated with enterprise resource planning software? More than one answer may be correct.

The visual project completion map is automatically updated as phases are completed. The client is able to access information about all phases of the project in one place, reducing the need for individual status reports.

According to the National Institute of Standards and Technology (NIST) there are four cloud computing deployment models. Community cloud is a cloud deployment model where cloud infrastructure is provided to multiple business units within an organization.

false

Geographically distributed network server groups that work together to provide more efficient delivery of Internet and Web content are called Customer Delivery Networks (CDN).

false

Normally in a company's overall compensation strategy, employee salary is more important than employee benefits.

false

Trello is a collaboration hub that is composed of channels where teams and members of the organization can communicate, thus replacing email and making communication seamless.

false

What must be integrated into an organization's enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location?

financial management systems software

Describe difficulties in implementing an ERP system. More than one answer may be correct.

high costs steep learning curve maintenance costs

While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their

high costs.

Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?

high share of wallet

According to research by Risk Based security, there were 2037 publicly reported data breaches

in the first half of 2020.

What is the overarching goal of organizations choosing to adopt an enterprise resource planning (ERP) system?

increase operational efficiency

The stage of the project management (PM) process in which project objectives are identified and feasibility studies are conducted is the

initiation phase

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)

keystroke logger.

Descriptive data about a customer includes categories such as

lifestyle and career.

A form of spyware that records all actions typed on a keyboard is called a keystroke

logger.

Describe the cost benefits of using a cloud-based ERP compared to an on-premise system. More than one answer may be correct.

lower IT infrastructure expenses lower maintenance costs reduced IT labor expenses

From the following list, select all the vital functions of customer relationship management (CRM) systems for businesses.

managing critical relationships helping synchronize customer interactions providing insights into customer satisfaction metrics

A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

mobile software development kit

According to the National Institute of Standards and Technology (NIST), which of the following are recommendations of cloud computing? More than one answer may be correct. Check All That Apply

on-demand self service broad network access resource pooling

Which stage of the project management process involves meetings with project stakeholders to ensure everyone understands their role in the project?

planning

The third step in business process management provides managers the ability to play the "what-if" game by changing input variables (abstract) decision making. This step is called

process execution.

What aspect of today's business environment is central to the need for robust transaction management processing systems?

proliferation of e-commerce-based organizations

In what ways do Enterprise Resource Planning (ERP) systems help organizations improve operational efficiency? More than one answer may be correct.

provide a centralized database provide access to data offer customization

In the initiation phase of project management, the client and project manager determine if the project is SMART. What does the R in SMART refer to?

realistic

Which three of the following advantages for managers are realized through integration of a transaction processing system (TPS) with an enterprise resource planning (ERP) system?

reduced costs of labor less human error time savings

From the following list, select the techniques and tools that are used by both white-hat hackers and illegitimate hackers.

rootkits social engineering backdoor programs

List steps organizations who employ a CRM system can take to protect customer data. More than one answer may be correct.

server security proper CRM administration CRM software updates

Which of these tasks is malware designed to do? More than one answer may be correct.

steal info destroy data incapacitate networks and computers

From the following list, select the two resources that organizations can track using accounting management software.

tangible assets intangible assets

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

What is the primary, underlying goal or purpose of state-sponsored cyberwarfare?

to protect or pursue national security interests

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

trello

What is the purpose of social engineering in conjunction with ransomware?

tricks victims into allowing access to data

Which three of the following phrases apply to aspects of inventory optimization?

triggers for automatic reordering provision of data to aid accurate ordering in the future evaluation of customer feedback on shipments

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojian

A computing model where services are provided over a network, primarily accessed via the Internet, is called cloud computing.

true

One benefit of cloud computing is flexibility.

true

Platform as a service is a cloud-based computing model where cloud service providers host the hardware and software needed for development on their own infrastructure, removing the need for developers to install this on their own devices.

true

Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system's security measures?

white-hat hackers

The practice of human resources management originated

with or before the ancient Egyptians, who had many scribes and priests dedicated to organizing workforces.

Where would you expect to encounter a hardware keystroke logger? More than one answer may be correct.

work comp school library

How does ransomware invade digital devices? More than one answer may be correct.

worm trojan email

Select three popular inventory management systems from the choices below.

Quickbooks oracle net suite Sap mm

Makoto and Rebecca want to hire a nanny for their 6-month-old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background check, including a credit check. Which law specifies whether Makoto and Rebecca are legally allowed to access potential candidate's credit information?

Fair Credit Reporting Act

In the second step in business process management, analysts use flowcharts and other tools to depict the workflow, the sequence of operations, and the decision points. This is called the process monitoring step.

False

From the following list, select the questions that an organization should consider before choosing a new business management system.

How will the new system interact with existing systems? Is the change worth the expense and impact on employee morale? Where will the new system be housed?

What benefits does customer relationship management software (CRM) provide to an organization? More than one answer may be correct.

Identify and attract potential customers. Determine ways to sell additional products and services to existing customers.

Which two of the following statements describe key benefits of an integrated computer-assisted design (CAD) module within an ERP system?

Managers can track processes that use computer-assisted design throughout an entire manufacturing cycle. Managers can monitor the use of materials, machines and labor, and level of completion within CAD processes.

Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in

enterprise software.

Which of the following are correct statements about Infrastructure as a Service (IaaS)? More than one answer may be correct.

It can grow with a company as its usage increases. It uses the cloud to assist in running a client's information systems.

Which statement describes state-sponsored cyberwarfare? More than one answer may be correct.

It originates with foreign governments. It is launched or executed by a foreign government or a paid third-party. It can be used to send warnings or to create conflict between countries.

Which of these statements about packet sniffers are true? More than one answer may be correct.

Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to stealing information.

________ shows that the number of transistors on a computer chip doubles roughly every 18 months, a phenomenon that reflects the speed at which business management systems and other technologies can advance.

Moore's Law

Which phase of the project management process involves feasibility studies?

Phase 1: initiation phase

Software that businesses use to manage activities in both the internal and external operational environment is known as Enterprise Resource

Planning.

Which of the following correctly identify National Institute of Standards and Technology (NIST) cloud computing deployment models? More than one answer may be correct.

Private cloud infrastructure is extended to a single organization with multiple consumers e.g., business units. Public cloud infrastructure is for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them.

Explain how trojans are designed and used. More than one answer may be correct.

Trojans are commonly used by hackers to gain access to systems and devices. Trojans are designed using some sort of social engineering tactic. Hackers use trojans to create a backdoor that bypasses security.

Using an inventory management system that integrates easily with an existing system is important for which of the following reasons? More than one answer may be correct.

Using a system that employees are familiar with will probably reduce training time. Employees' familiarity with a system should help reduce stress.

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

Describe web services. More than one answer may be correct.

Web services are a set of software technologies. Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language. Web services can be used to create apps that link different systems of different organizations and to build open-standard based web applications.

One of the benefits of using a CRM system is that data can be analyzed and provided to assist in measuring the value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs. This value is referred to as customer

equity.

One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool

facilitates using the company's own, collected data about customers.

From the following list, select all the sales prospecting tools that are most often integrated with CRM systems.

Zoominfo LinkedIn Sales Navigator Clearbit Prospector

Rana's employment agency is a startup with a one-person IT department, but it requires a business management system that can meet unique needs. Which type of business management system should she adopt?

a custom, cloud-based solution (PaaS or IaaS)

Troy has a customized business management system that he likes. However, it cannot easily scale up to meet his growing database storage needs, offers poor protection from hackers, and requires maintaining a large IT department. Troy should replace this system with

a custom, cloud-based solution (PaaS or IaaS).

What type of software can be integrated with ERP software to record ledger journaling and billing in the same platform as other, related data?

accounting

Organizations that use an on-premises business management system

are also responsible for maintaining, updating, and securing the system.

How is quantitative data about a customer most accurately characterized?

as a record of how a customer interacts with a business

Which of the following data types are qualitative data? More than one answer may be correct.

attitude and opinion motivation to purchase

What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?

by helping them identify and attract prospective customers

A key component, and major advantage, of an ERP is its

centralized database

Amazon, Kamatera, Salesforce, and Google are all examples of

cloud service providers

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

Rootkits are typically used to allow hackers to do which of the following? More than one answer may be correct.

create a backdoor into a computer remotely control the operations of a computer

Share of wallet is also known as share of

customer

The design of a CRM system that collects data on customer interaction should include which of the following elements?

customer interaction monitoring information on individual customers automation factors

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery.

If a customer segmentation tool supports integration, what is it able to do?

efficiently link data from various sources and platforms

Which of the following represents a type of HR management system? More than one answer may be correct.

employee benefits admin software employee evaluation software compensation Management software

A manager is using the organization's ERP software to generate a report that links its human resources data to its overall financial performance. What is one type of HR data that the ERP accounting module could factor into this report?

employees' payroll and benefits


Related study sets

Chapter 2: Chemistry Comes Alive

View Set

Fundamentals of Nursing Course Point Quiz- Ch. 6

View Set

LSU BIOL 1202 (HRINCEVICH) CH 24 HW

View Set

Computer Organization and Architecture

View Set

Pharm Exam #3 Nervous and Respiratory system

View Set

Intermediate Accounting Chapter 11: Property, Plant, and Equipment and Intangible Assets: Utilization and Disposition

View Set

Chapter 27: Safety and Emergency Preparedness.

View Set

Sienna Thomsen Diccionario Doblabo

View Set

Chapter 26 Module 2: Sections 26.03 Dynamic Study Modules

View Set