ISTM exam 3

Ace your homework & exams now with Quizwiz!

ERP implementations can be very​ expensive, averaging approximately​ _____.

$3.8 million

True about digital certifications

-Digital certificates authenticate that the public key belongs to the designated owner. -The recipient decodes the encrypted message by using the​ CA's public key. -Digital certificates contain the​ owner's identification and a copy of the​ owner's public key. -Digital certificates help a user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data.

TCP/IP protocol details

-IP is responsible for the delivery of packets and includes the disassembling and reassembling of packets. -TCP establishes a connection between the computers. -TCP/IP was developed to help scientists transmit data among different types of computers over long distances. -TCP sequences the transfer of packets and acknowledges the packets sent.

Functions of the Internet service provider​ (ISP)

-ISPs collect money from their customers and pay access fees. -The ISP provides a legitimate IP address. -ISPs receive communications from the Internet and pass them on to you. -ISPs serve as your gateway to the Internet.

Which of the following IS a security threat posed by the use of the​ iPhone, iPad, and other mobile computing devices in the​ workplace?

-Mobile devices have less stringent passwords and locks. -Mobile devices appear vulnerable to rogue apps. -Mobile devices are easily stolen and often contain corporate data. -Data leakage is caused by use of cloud storage services with mobile devices.

These are addressed by a business continuity​ plan

-The identification of critical business processes -Action plans for handling​ mission-critical functions if systems go down -How the company can restore business operations after a disaster strikes -When and how the plan is to be updated and refined

True about public key encryption

-The private key is kept secret. -It uses two keys that are mathematically related. -The sender encrypts the message with the​ recipient's public key. -The public key is shared using a directory.

Domain Name Service​ (DNS) details

-The​ top-level domain is called the​ "root." -DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. -DNS has a hierarchical structure. -The last word in the domain name represents the type of organization.

any business with an online presence is at risk of all of the following

-exposure to hacker activity -the loss of customer data -a​ denial-of-service attack -unauthorized data disclosure

If you are creating a network using​ twisted-pair (CAT​ 5) wire, the cable​ shouldn't exceed​ ________ meter(s).

100

Which of the following notations could represent a current IP​ address?

207.46.250.119

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to intended users.

What is Secure Hypertext Transfer​ Protocol?

A protocol for encrypting individual messages transferred over the Internet

Which of the following is a common wireless networking standard that is generally used for​ PANs?

Bluetooth

Which term refers to the wireless networking standard that is popular for creating small​ personal-area networks?

Bluetooth

The Internet is based on which three key​ technologies?

Client/server computing, packet​ switching, and standard communication protocols

In this video​ dramatization, which component of an ERP system that consolidates data from​ sales, marketing, and service departments is​ described?

Customer relationship management​ (CRM)

In the​ video, _____ is described as a set of integrated software modules that support nearly all of an​ organization's business processes.

ERP

According to this​ video, which of the following statements is true regarding enterprise resource planning​ systems?

Enterprise resource planning systems integrate data with a centralized database.

Which of the following is a critical security function of senior management in an​ organization?

Establishing the security policy and managing risk

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?

Gramm-Leach-Bliley Act

Which of the following mandates that financial services firms ensure security and confidentiality of customer​ data?

Gramm-Leach-Bliley Act

​_______________ requires that your patient records be protected and saved for six years.

HIPAA

Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care​ data?

HIPAA Act

What is the name of the organization responsible for assigning public IP​ addresses?

ICANN

The​ ________________ virus, a rather nice sounding​ virus, was one of the most famous malwares that was detected in 2000.

ILOVEYOU

The Domain Name System converts domain names to which of the​ following?

IP addresses

Which statement about the​ TCP/IP protocol is​ FALSE?

IP helps to recover any packets that are lost or damaged during transmission.

Enterprise systems provide value and help managers make better decisions by doing which of the​ following?

Increasing operational efficiency and providing firmwide information

________ check for data entering a system for accuracy and​ completeness, such as when a clerk confirms a telephone number for a new customer.

Input controls

Which of the following is a new network backed by​ universities, government, and private companies in more than 100​ countries?

Internet2

A​ _____ is great for a city to set up for emergency and public use since it is larger than many types of network configurations.

MAN

Which of the following is NOT a security threat posed by the use of the​ iPhone, iPad, and other mobile computing devices in the​ workplace?

Mobile devices may dictate what kind of data an app can access inside its sandbox domain.

An individual wanting to enable his desktop PC at home to access the Internet must do which of the​ following?

Obtain a subscription with an Internet Service Provider​ (ISP)

Which statement about public key encryption is​ FALSE?

On receiving the​ message, the recipient uses the public key to decrypt it.

What type of system provides technology for tracking the movement of goods throughout a supply​ chain?

RFID

Which technology has recently been applied to inventory​ control, supply chain​ management, and the Internet of​ Things?

RFID systems

A​ just-in-time strategy means which of the​ following?

Raw materials arrive exactly when needed to be transformed into​ products, which are shipped as soon as completed.

Which of the following best describes​ pharming?

Redirecting users to a phony web​ page, even when the correct URL is typed in

Which law provides rules related to the creation of financial statements to help avoid​ fraud?

Sarbanes-Oxley Act

A company needing reliable digital communication service levels at speeds of 1.5 Mbps would probably need to lease a dedicated​ ________ line.

T1

Which statement about digital certificates is​ FALSE?

The CA verifies a digital certificate​ user's identity online.

Which of the following is NOT a function of the Internet service provider​ (ISP)?

The ISP provides application services.

Bandwidth is determined by calculating which of the​ following?

The difference between the highest and lowest frequency on a channel

Which statement about the Domain Name Service​ (DNS) is​ FALSE?

The first name in the domain name is the organization name.

Which of the following best defines​ hertz?

The number of cycles per second that can be sent through a medium

Which of the following is NOT addressed by a business continuity​ plan?

The technical issues involved in keeping systems up and running

A(n) _______________ is a program that seems like a normal​ program, but does something completely unexpected.

Trojan horse

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

ambient data

The signal from your iPod earphone is​ a(n) ________ signal.

analog

​A(n) ________ signal is a way to communicate in a network and is represented by a continuous waveform

analog

In this​ video, One Bit describes how voices travel through typical telephone transmission lines. He is describing​ a(n) _____.

analog signal

​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.

authentication

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.

biometric

According to the information in this​ video, computers represent data using​ _____.

bits

Which of the following occurs when information about product demand gets distorted as it passes from one entity to the next across the supply​ chain?

bullwhip effect

Enterprise software includes a database and thousands of predefined​ ________________.

business processes

Enterprise systems have a set of integrated software modules and​ a(n) _______________ by which business processes and functional areas throughout the company can​ ________ data

central​ database; share

According to the information in this​ video, the telephone system is an example of a​ _____ network.

circuit-switched

Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.

click fraud

Which of the following involves botnets deliberately moving through online ads and leads to higher marketing​ costs?

click fraud

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.

cybervandalism

Which of the following examines data files and sorts out​ low-priority online material while assigning higher priority to​ business-critical files?

deep packet inspections

Taking over computers and directing those systems to overload a network is defined as​ a(n) _____________ attack.

denial-of-service

According to Agent​ Macey, the single largest threat to the Internet is​ _____.

denial-of-service attacks

Network signals that are represented by​ on-off pulses indicate which type of​ signal?

digital

Which of the following is a feature of Web​ 2.0?

dynamic content

As explained in the​ video, _____ processes support activities in multiple departments and span an organization.

enterprise

ERP stands for​ ________.

enterprise resource planning

Using a combination of hardware and​ software, _______ are able to control incoming and outgoing data on a network.

firewalls

Bandwidth transmission speed is measured in​ ______________.

hertz

Business processes supported by enterprise systems related to travel expense reporting are associated with​ ________ processes.

human resource

In the​ video, the company is implementing an ERP system to achieve which business​ objective?

improve decision making

Application controls can be classified as​ _____ controls,​ _______controls, and​ ________ controls.

input; processing; output

A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers

keylogger

If you were building a network intended to service two buildings that were next to each​ other, you would construct a​ ________.

local area network

According to Agent​ Macey, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.

malware

Customer relationship management typically focuses on three key elements of the customer​ relationship: ________.

marketing, sales, and service

As​ Zero-Bit and​ One-Bit explain in this​ video, a​ _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.

modem

At its most basic​ level, a(n)​ _________ simply consists of two or more computers that are connected together.

network

Microsoft Windows Server and Linux are examples of​ ________.

network operating systems

Analytical CRM applications are based on data from​ _____________________.

operational CRM systems

In this​ video, One Bit describes​ _____, the method of slicing digital messages into​ parcels, transmitting them across communication​ networks, and reassembling them at their destination.

packet switching

Instead of sending an entire file in one big chunk across the​ Internet, __________ is used which dices the file up into little pieces that are sent independently across the communications​ paths, and then reassembled when they reach their destination.

packet switching

The method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

packet switching

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.

phishing

According to information provided in this​ video, any business with an online presence is at risk of all of the following EXCEPT​ _____.

poor customer service

A​ ________ is a set of rules that programs on two communicating devices follow.

protocol

____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.

ransomware

Establishing a risk level of malware threats to an organization is an example of​ _______________.

risk assessment

What type of communications processor directs packets of data through different​ networks, ensuring that data gets to the correct​ address?

router

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.

social engineering

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers.

spoofer

If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of data to your different devices.

switch

ERP implementations introduce​ _____, which are large expenses associated with jumping from one vendor to another when implementing an ERP system.

switching costs

Education being represented by .edu and business represented by .com are examples of​ ________.

top-level domains

Which of the following is an opportunity for threats to gain access to​ assets?

vulnerability

A company needing a network to connect its offices in​ Montana, Idaho, and Utah would require a​ ________.

wide area network

A​ __________ is a unique type of malware that replicates itself from one computer to another.

worm


Related study sets

Archimedes', Pascal's, and Bernoulli's Principle states...

View Set

PC Pro 4.6.7 Device Driver Installation Facts

View Set

Physics Module 4: Section 1 - Resistance, Resistivity and Ohm's Law

View Set

Unit 2 Test STA 2023 McGraw Hill

View Set

PEDS-Nursing Care of Children ATI (Dynamics test bank):

View Set