ISTM 209 EXAM 3 REVIEW (CH. 7,8,9)
Enterprise systems provide value by both __________________ and providing __________________ to help managers make better decisions.
increasing operational efficiency; firm-wide information
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
keylogger
Establishing a risk level of malware threats to an organization is an example of _______________.
risk assessment
Why is an order-to-cash service considered a complex process to implement as an enterprise application?
It needs information from many different functions of the enterprise.
Which of the following is an opportunity for threats to gain access to assets?
vulnerability
If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed:
100 meters
The average ERP project takes ___________ months to complete.
16
Which of the following could represent a current IP address?
207.46.250.119 xxx.xx.xxx.xxx
Unfortunately, a majority of enterprise applications deliver __________ percent or less of the expected benefits
50
According to the information in this video, the telephone system is an example of a _____ network
Circuit-switched
_____ can be destructive to a company when at risk for people or programs deliberately moving through ads, thus driving up advertising costs for a company.
Click Fraud
Which of the following examine(s) data files and sorts out low-priority online material while assigning higher priority to business-critical files?
Deep packet inspection
Bandwidth is determined by:
Determining the difference between the highest and lowest frequency on a channel.
Which of the following is NOT a security threat posed by the use of the iPhone, iPad, and other mobile computing devices in the workplace?
Dictating what kind of data an app can access inside its sandbox domain.
Network signals that are represented by on-off pulses indicate a(n):
Digital Signal
Which single word below best describes Web 2.0?
Dynamic
In this video, Kevin describes _____ as a set of integrated software modules that support nearly all of their organization's business processes.
ERP
Improving the tracking of employee training could involve adopting enterprise software focused on _______________________.
Employee relationship management
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Billey Act
The _____ mandates that financial services firms ensure security and confidentiality of customer data.
Gramm-Leach-Bliley Act
Which of the following is NOT one of the ways in which next-generation enterprise application vendors are delivering more value?
Making their software easier to customize
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
As Zero and One explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line
Modem
At its most basic level, a(n) _________ simply consists of two computers that are connected together.
Network
Microsoft Windows Server and Linux are examples of:
Network Operating Systems
Which of the following is FALSE regarding public-key encryption?
On receiving the message, the recipient uses the public key to decrypt it.
Which of the following is FALSE regarding digital certificates?
The CA verifies a digital certificate user's identity online.
Business processes supported by enterprise systems related to credit checking are associated with __________________.
sales and marketing processes
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
social engineering
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.
spoofer
In an effort to ___________ critical business processes, Coca-Cola implemented an SAP enterprise system.
standardize
Education being represented by .edu and business represented by .com are examples of:
top level domains
One finding from Alcoa's enterprise system found a positive correlation between ______________ and quality.
training
A company's suppliers and the suppliers' suppliers are considered the _____________ portion of the supply chain.
upstream
The Internet is based on which of the following three key technologies?
Client/server computing packet switching TCP/IP and related communications standards for linking networks and computers
_____________ provides rules related to the creation of financial statements to help avoid fraud.
Sarbanes-Oxley Act
In this video, Special Agent Macey says the single largest threat to the Internet is _____.
denial-of-service attacks
Although it can be risky, a __________________ strategy is based on knowing exactly when components would arrive within the supply chain.
just-in-time
According to the information in this video, computers represent data using _____.
Bits
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.
In this video dramatization, Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments?
customer relationship management (CRM)
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
cybervandalism
A just-in-time strategy means:
raw materials would arrive just-in-time to be transformed into a product and the product would ship as soon as completed.
According to the information provided in this video, any business that has an online presence is at risk of _____.
A. loss of customer data B. denial-of-service attack C. exposure to hacker activity D. unauthorized data disclosure *****E. ALL OF THE ABOVE*****
In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety?
An underground wireless Wi-Fi network
In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____.
Analog Signal
The signal from your iPod earphone is a(n):
Analog Signal
A(n) __________________ is a way to communicate in a network that is recognized by a continuous waveform:
Analog Signal
Which type of enterprise software would allow you to analyze Customer Lifetime Value (CLTV)?
Analytical CRM
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables?
Bluetooth
Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain?
Bullwhip effect
_______________ requires that your patient records be protected and saved for six years.
HIPAA
What outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data?
HIPAA Act
Bandwidth transmission speed is measured in ______________.
Hertz
What is the name of the organization responsible for assigning public IP addresses?
ICANN
The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000.
ILOVEYOU
The domain name system converts domain names to ________________________.
IP Addresses
Which of the following is FALSE about the TCP/IP protocol?
IP helps to recover any packets that are lost or damaged during transmission.
________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer.
Input controls
If you were building a network intended to service two buildings that were next to each other, you would construct a:
Local Area Network
A _____ is great for a city to set up for emergency and public use since it is larger than many types of network configuration.
MAN
In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.
Packet Switching
Instead of sending an entire file in one big chunk across the Internet, __________ is used which dices the file up into little pieces that are sent independently across the communications paths, and then reassembled when they reach their destination
Packet Switching
A ________ is a set of rules that programs on two communicating devices follow.
Protocol
A supply chain driven by actual customer orders or purchases follows which model?
Pull-based model
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
Which of the following is an important capability for service-category business processes that are found in most major CRM software products?
Returns management
If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices.
Router
What type of communications processor directs packets of data through different networks, ensuring that the data sent gets to the correct address?
Router
Which of the following TCP/IP application-layer protocols is used for email transmission?
SMTP
What are the three general business functions that CRM software serves?
Sales, customer service, and marketing
_________________________ systems track the flow and status of products through the distribution process.
Supply chain execution
_________________________ systems help firms analyze, model, and optimize its supply chain.
Supply chain planning
A company needing reliable network speeds at 1.5 Mbps would probably need to lease a dedicated:
T1 line
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides applications services.
Which of the following is FALSE about the Domain Name Service (DNS)?
The first name in the domain name is the organization name.
Which is the BEST definition of hertz?
The number of cycles per second that can be sent through a medium
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
According to this video, which of the following statements is true regarding enterprise resource planning systems?
They integrate data with a centralized database.
Which of the following is NOT one of the characteristics of enterprise applications that cause challenges in implementation?
They support "best practices" for each business process and function.
__________ is a program that seems like a normal program, but does something completely unexpected.
Trojan horse
What is Pharming?
Users are redirected to a phony web page even when the correct URL is typed in.
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a:
Wide Area Network
A __________ is a unique type of malware that replicates itself from one computer to another.
Worm
Electronic evidence on computer storage media that is not visible to the average user is called ________.
ambient data
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes:
analytical customer relationship management applications.
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication.
biometric
When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the _________________________.
bullwhip effect
Enterprise software includes a database and thousands of predefined ________________
business processes
Enterprise systems have a set of integrated software modules and a _______________ by which business processes and functional areas throughout the company can _____ data.
central database; share
The measurement of the number of customers who stop using or purchasing products or services from a company is called ________.
churn rate
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
click fraud
Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack.
denial-of-service
Delivering products to retail stores is considered the _____________ portion of the supply chain.
downstream
As Kevin explains, _____ processes support activities in multiple departments and span an organization.
enterprise
ERP stands for ___________________________________.
enterprise resource planning
Business processes supported by enterprise systems related to travel expense reporting are associated with __________________.
human resources processes
Mary's company is implementing an ERP system to achieve which main business objective?
improved decision making
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
Business processes supported by enterprise systems related to quality control are associated with __________________.
manufacturing and production processes
Customer relationship management typically focuses on three key elements of the customer relationship:
marketing, sales, and service
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________.
packet switching
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing