KSU IS 2200 Final

Ace your homework & exams now with Quizwiz!

Anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

"Cybersecurity threat mitigation" includes all the policies, procedures, and tools that help organizations

Interests of your audience

A business message should show that you have _____ _ __ ______ in mind.

(10-8)/8*100

A friend asks if you want to go see the New Avengers movie but you say it's too expensive. "No it's not, tickets have only gone up $2 since last year," says your friend. You reply, "tickets went from $8 to $10 for a matinee. That is a large percentage increase. What formula would provide the percentage increase?

Clarify the company's brand.

A public relations team's first steps is to

Personal Brand

A unique set of professional skills and attributes that others associate with you

Slanting the facts.

Adish is analyzing the benefits and feasibility of implementing a stress-reduction program on a fixed budget. Through research, Adish learns that the cost of a stress reduction program exceeds the proposed budget. He also learns that such programs are linked to increased employee health and morale. Adish then advises the company leadership to implement the program because it will be effective at improving the well-being of employees. Adish is guilty of

Lay out the supporting reasons in careful order; state the primary message.

Ali is the marketing manager at QLM. In his market survey, he finds that customers are not happy with QLM's inefficient customer service. How will Ali structure his message if he wants to use the inductive, or indirect, approach?

Social Persona

Although younger people are often expert at developing an online _____ _____, they are less skilled at developing an online professional presence.

Cybersecurity threat

An event or condition that can lead to IT asset loss and the negative consequences of such loss

Period

Each loan payment is referred to as a(n)

Freeze

If you wish to keep a column visible while you scroll through the rest of a spreadsheet file, you can use the _____ options.

Inverted pyramid

In a press-release style message, the "story" is written in third person in a style often referred to as _____ style.

Row

In a spreadsheet, a horizontal line of cells is called a

Avoid any form of self-centeredness.

In content and form, a business message should typically

Collaboration tools

In most companies, participation on enterprise social platforms with related _____ _____ is fairly low.

Challenging the team's hard-earned consensus and damaging morale.

Latecomers to forum discussions are most likely to cause problems by

Direct or deductive approach

Most business arguments employ a _____ _ ______ ______. In other words, they begin by stating the primary message, which is typically a position or recommendation.

Stating their opinion but failing to take part as the conversation evolves.

One major threat to productive discussions is inconsistency. First -comers to a forum discussion are most likely to cause problems by

Press-release style

The _____-_____ _____ accounts for most written PR messages.

Short, memorable

The art of creating effective frames involves capturing your primary message in a _____, ______ statement of 15 words of less.

Interest

The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's

Access Control, Authentication

The deactivation of access to corporate systems and documents after an employee leaves a company are examples of which tool that ensures confidentiality?

Planning

The most important stage of creating effective business messages is

Professional reputation

The profiles you post on personal and work- related social media accounts will affect your _____ ______.

Display ads to users based on their browsing behaviors. Redirect your search requests to advertising websites. Collect marketing-type data about you.

The purpose of adware is to _____.

Diplomatic, constructive

The term "argument" unnecessarily implies contention and difference of opinion. Use _____, ______ terms.

Social Media

The use of ____ _____, even for private use, complicates your relationship with your employer.

Either/Or Logic

To build well-reasoned business positions, you should avoid _____/_____ _____, which tends to close off important alternative ways of problem solving.

PMT

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the _____ function.

Use the internet for social connection.

User 2.0 is most likely to

Viruses, Spyware, Impersonation, Distributed Denial of Service (DDOS)

What are examples of different cybersecurity breaches?

Bar Graphs, Line Graphs

What are the two common spreadsheet charts?

To ensure EU companies protect the privacy and personal data of EU citizens.

What does General Data Protection Regulation (GDPR) strive to achieve?

COUNT

What function would you use to display how many entries are made in Column A above Cell A37?

Respect the autonomy of the reader.

What is most likely to show that the writer of a business message has concern for the audience?

Ensure critical infrastructure services can be delivered without interruption, Reduce the impact of an adverse cybersecurity event

What is the goal of the protect stage in the plan-protect-respond cycle?

Code-created malware that, when executed, damages programs and performance.

Which of the following is the clearest definition of a computer virus?

Barras uses a variety of sources such as journal articles and colleagues' expertise.

Which person illustrates a characteristic of an excellent business thinker?

A personal brand built through an online presence can help business professionals gain opportunities.

Which statement about online presence is true?

You are responsible for your actions.

Which statement is one of Coca-Cola's social media guidelines?

Spyware harvests private information by monitoring how users interact online. Downloads from unvetted websites can be a vector for spyware.

Which statements apply to spyware?

Present Value (PV), Principal, Balance

Which three of the following refer the amount of money owed on a loan when it is first borrowed (excluding any origination fees).

This is not an error. The cell needs to be expanded in order to display the entire value.

You see ###### in a cell. This means that

Strong analogies

_____ _____ bolster arguments, but to build a well-reasoned business positions you should avoid weak analogies. Weak analogies lead to inaccurate conclusions and recommendations.

Cybersecurity risk analysis

_____ ______ ______ weighs the costs versus the benefits of instituting countermeasures to cybersecurity events.

Audience Analysis

during which step in the AIM planning process should you consider the constraints your readers face?

Present Value (PV)

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

Spreadsheet

Because they make it easy to arrange, display, and calculate numerical data, _______ programs are often used in budgeting, accounting, finance, grading, gambling houses, and even sports analysis.

Identify problems that prevent employees from making healthy choices.

Charlier has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during information gathering stage?

Mitmo

Currently, one of the biggest vector opportunities for the cybercriminals is _____.

1. Identification and Valuation of an organization's information assets. 2. Eliminate potential costs and losses per security incident, including costs of malware attacks, fees, and penalties associated with data breaches, and lost revenue. 3. Estimate the likelihood of occurrence of threats.

Describe steps in cybersecurity risk analysis.

Identify a company's assets, Calculate potential loss due to security threats, Determine how to respond a potential loss

Describe the purpose of a cybersecurity risk analysis.

Social Age

Due to the many communication tools available in the emerging ____ _____, the division between professional and private lives is becoming increasingly blurred.

= ((4.25-3.20)/(3.20)*100

Every time you go to the gas station you're amazed by how much prices have increased. At this time last year the price was $3.20/gallon and now the price is $4.25/gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?

Online communities

Excellent places to network and participate with professionals in your organization and those with shared professional interests outside your organization.

Fails to focus on the interests of the audience.

Extensive use of the 1-voice in a business message

State the primary message; lay out supporting reasons; conclude with a call to action.

For the past few months, Denver Framing has experienced high employee turnover. After investigating, human resource manager Kyle discovered that most employees are unhappy with their salaries and there unmotivated to work. Kyle plans to craft a message using the direct approach. How should he structure it?

17

If you type =8/2*4+1 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

Average

If you want to find the mean of the values in cells above A37 in the above spreadsheet, what function would you place in A37?

Authentication, Encryption, Access Control

Most organizations require employees to login in to view files that are posted to a shared drive, allowing different access to the files based on employee or other people from accessing all files. What are examples of the following tools that ensure confidentiality?

Meta

Overall and underlying messages that others decode from your online communications are referred to as ____ messages.

Insert

Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the _____ tab to create a pivot table.

Spreadsheets

Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called

Cell Values

Saving a spreadsheet file in .csv format only saves the

Protect Phase

Scheduling monthly and annual maintenance activities for hardware and software systems are activities that occur during the _____ _____ of the plan-protect-respond cycle.

Budgeting, Finance

Select two common uses of spreadsheets.

1. Select the first cell in the range and drag down to the last cell. 2. Select the first cell in the range then hold down the shift key and select the last cell in the range.

Select two methods of selecting a range of adjoining cells in Excel.

Microblogs

Shorter blogs that contain just a few sentences, are part of the most enterprise social networking platforms. They are tools for broadcasting announcements and urgent information.

Are not cautious about giving out confidential or sensitive information.

Social engineering is used to target people whom

A malicious email or link opened by an unsuspecting user.

Software-based keyloggers often infect a system through

Future Value (FV)

The Rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ______ of the investment.

Setting a positive and other-oriented tone.

What is typically included in the writing stage of developing an effective business message?

An employee blogs about an embarrassing incident involving his or her boss, who sees the post.

What situation is an example of how social media can complicate professional relationships?

1. When looking up information on the Dallas Cowboys, you notice an ad for a Dallas COwboys jersey. 2. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. 3. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology.

What situations lead you to suspect the presence of adware?

Help others find your information.

When creating a blog, you should use naming, labeling, indexing, and tagging to

Red

When displaying financial information, the accepted practice is that _____ indicates negative values.

Discuss protocols for co-editing files.

When using a shared file platform, it is important to

Protect (PR) Funtion

Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?

Determine security weaknesses, Determine existing vulnerabilities by having an employee attempt to hack into a system, Figure out where vulnerabilities within your systems currently exist

Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle?

Making conclusions based on facts.

Analyzing a business problem typically involves

Decide how to frame her primary message.

Aria, an executive at American Hustle, Inc., wants to introduce a profit-sharing program. She needs to convince the other executives that it is a good idea for their company. She has considered her audience and gathered information. Next, she should

It is held in the device's RAM until it can be processed by the CPU or GPU.

How are data in process different from data at rest or data in storage?

This malware steals confidential information from the user.

How does spyware potentially harm the individual user?

Data integrity is more easily preserved if users must be authorized to access and make changes.

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Unsupported generalization

Howard, a manager at ABN, has to prepare a report about the advantages of introducing a counseling program would reduce voluntary turnover because employees would be happier with their pay packages, but he offers no evidence linking counseling with pay. This report failed to effectively deliver the message that Howard has intended. What is the most likely reason for its failure?

An Equal Sign (=)

In spreadsheets, all functions and calculations begin with

Answer basic questions

In the PR story, what does the first paragraph do?

Identifying the business problem

In the context of dealing with business problems, which of the following should ideally be the first step?

Identifying reader benefits and constraints

In the context of the AIM planning process, what tends to be the single most important planning step for many messages?

Make well-reasoned conclusions and solutions.

In the course of creating an effective business message, excellent business thinkers are most likely to

Black

In the financial world, which color represents credits or profits?

Value

Wanda, the marketing manager at Royal Theatres, believes that employees should always act ethically and should also report instances of unethical behavior that they encounter. This belief held by Wanda is an example of a

Communication tools

Web 2.0 ____ _____ include social networks, like Twitter, blogs, wikis, gaming, podcasts, and information tagging.

On a cellular network

Where are data in transit found?

A discussion forum that allows users to post questions and answers

Which element is a typical Web 2.0. communication?

It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm

Which is the best definition of a cybersecurity exploit?

Team blog

Which medium is most likely to hold all of a work group's communications, such as updates, progress reports, and discussions?

I am committed to my industry.

Which meta message would most likely be communicated through a professional networking site such as LinkedIn?

Priorities

_____ involve ranking or assigning importance to things, such as projects, goals, and tasks.


Related study sets

Chemical/Physical Changes 7th grade Salome

View Set

dermatologic disorders and wounds PREPU

View Set

SMELTZER 61-B Neurological Dysfunction

View Set

Health assessment Jarvis Chapter 21: Abdomen w/exp

View Set

UNRS 107 Quiz 2_Rationale - ATI Quiz #2A

View Set

MULTIPLE CHOICE QUESTIONS- CHAPTER 4 (THE JUDICIAL SYSTEM)

View Set

Modules 14 - 16: Routing Concepts and Configuration Exam

View Set

Domain 4 - Communications and Network Security

View Set

"Škola Za Anđele" - Isidora Bjelica

View Set

Psychology of Personality Final Exam Review

View Set