MGMT 3300 Exam 3

Ace your homework & exams now with Quizwiz!

An incident response plan is created for the purpose of__________.

Avoiding chaos and missteps

According to Jon Ronson, what could lead to twitters downfall?

Its power to cause destruction of individuals

Sometimes the meta-data of a social media post is more important than the post itself. For example a tweet may have ______ bits of meta-data that a machine learning algorithm can analyze and use to predict behavior.

4-5

What is a blockchain?

A distributed ledger on a peer to peer network

On microblogging sites, a hashtag is used to indicate _______.

A set of posts on a similar topic

Which of the following is not an example of how room-based videoconferencing can be utilized: -Telepsychiatry -Telemedicine -Distance education -All of the above

All of the above

A zero day exploit is:

Any exploit that is unknown to the maker of the software

Why is social media so engaging?

Because most interfaces for social media provide an experience that leads to a dopamine release

The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.

Botnet

The _______ of Mizzou was involved in facilitating the switch from Blackboard to Canvas

CIO

What is a miner?

Computers that validate and process blockchain transactions

Which of the following performs functions similar to the presence awareness feature found in IM software: -A hashtag -A mashup -Context indicator -Augmented reality

Context indicator

According to the article "Kill the password", what is one major trade off that every security framework needs to make?

Convinience

Which of the following functions do wikis perform within an organization: -Creating a substantial base of knowledge -Creating interactive discussions between employees and clients -Creating telepresence between employees working across the globe -Establishing communication between members of a team through instant text messaging

Creating a substantial base of knowledge

What was Scott Gallaway's main response to his student's email?

DID NOT HAVE A RIGHT ANSWER

Which of the following is a drawback of cloud computing: -Data protection laws are not uniform across countries -Resources are difficult to share because information is maintained on a protected server -It delivers computing as a product rather than a service -It provides computation that requires end-user knowledge of the physical location and configuration of the system that delivers services

Data protection laws are not uniform across countries

In 2017, Pakistan became the first nation to sentence someone to ________ for online speech after a member of the Shia minority got in Facebook argument with a government official posting as someone else

Death

Arthur, a salesperson in a leading apparel store, is very courteous and friendly with customers who visit the store. However, while interacting with customers through emails, he tends to be rather blunt and aggressive, which has led to a couple of complaints being lodged against him. Which of the following does the scenario illustrate? -Augmented reality -Disinhibition -Telepresence -Virtual reality

Disinhibition

After leaking all the confidential files that Professor Christianson has amassed about his students, he will board the first flight to _______________ since they have no agreements to extradite with the US.

Ecuador

______ is the process which transforms data using mathematical formulas, so that no-one can read the data, unless they know the keys to unscramble it.

Encryption

What is the step involved in risk management after vulnerabilities of an organization have been examined?

Evaluation of controls that fill in security gaps

What is one difference between an incremental mindset and an exponential market?

Exponential mindset is to make something different while the incremental mindset is to make something better

According to the article "Kill the password", which of these is NOT a way that our online passwords fall: -Failed from in-person peeking -Stolen with a keylogger -Lifted from a password dump -Cracked by brute force

Failed from in-person peeking

Biometric identifiers refer to something the users know, such as user ID, password, PIN, or to answer a security question.

False

Media richness measures how well a communication medium can generate revenues.

False

Slack allows you to manage social media accounts from different platforms simultaneously.

False

The exponential mindset helps to grow input faster than output.

False

TikTock is not a good example of an application that utilizes the network effect.

False

True or False: copyrights are forever

False

True or False: copyrights can only be enforced if the work has the © symbol & states "Copyright 2014 by so and so"

False

Using fake names, nicknames, free email, and public computers ensures that one is perfectly anonymous on the internet.

False

Wiki software requires users to know HTML in order to add or edit web pages.

False

The term _______ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.

Honeypots

Which of these is not a type of threat to information security: -Ransomware -Hunting -Walware -Phising

Hunting

Which of the following is true of asynchronous discussion forums: -They help users to communicate via interactive video chat. -They do not allow users to post anonymously, thus enhancing safety for users -They are never moderated, thus enabling users to post freely -They allow users to post text messages and reply to others at any time

IDKKKKK BUT NOT THE TOP ONEEEEE

Organizations use a(n) __________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.

Incident response plan

_______ also known as "chat", consists of real-time text-based interactions over a network.

Instant messaging

Which of the following is a function of unified communication: -Integrating multiple applications and communication channels into a single interface -Enabling a company to communicate with all its customers at the same time -Collecting and storing data from multiple users and building a database -Maintaining a record of individual changes made on shared documents through version control

Integrating multiple applications and communication channels into a single interface

Which of the following are used to combat spam: -Intrusion prevention systems -Conversational programming systems -Expert systems -Executive information systems

Intrusion prevention systems

Which of the following is a primary function of wikipedia: -It allows users to add and edit interlinked web pages -It allows users to join online groups in order to buy a particular item -It allows users to communicate through instant messaging and electronic mail -It allows users to interact synchronously and make decisions together

It allows users to add and edit interlinked web pages

What is the purpose of the "presence awareness" feature on instant messaging software?

It allows users to display their current status to their contacts, colleagues, or buddy list

Which of the following is a drawback from wikipedia: -It has an open structure which allows scope for inaccuracy and bias -It has a complicated navigation system that makes it difficult for users to operate -It cannot be accessed without an ID and a password -It features an overload of ads which takes focus away from credible content

It has an open structure which allows scope for inaccuracy and bias

According to Jon Ronson, what happened to twitter over the course of its existence?

It has turned into a place where "the hunt is on for shameful secrets"

Which of the following is true of phishing? -It involves the use of several thousand computers to launch malicious attacks that can cripple websites. -It is useful in monitoring web traffic into and out of an unsecured computer network -It is the process of stealing personal data from a victim by convincing him to disclose information -It uses small pieces of code inserted into a browser that track an internet user's activity and transmit the data to third parties

It is the process of stealing personal data from a victim by convincing him to disclose information

Which of the following is true of a vCard: -It must be scanned and saved in a contact management system before use -It requires the use of optical character recognition software for accessing business card details -It is used to exchange business card information electronically -It relies on the XML family of standards to represent metadata

It is used to exchange business card information electronically

Which of the following is a feature of a public key encryption: -It uses a single point key to encrypt and decrypt data -It uses a pair of keys, one to encrypt the data and the other to decrypt data -It uses multiple number of keys accessible to all members of an organization -It uses a duplication process to replicate keys

It uses a pair of keys, one to encrypt the data and the other to decrypt the data

Which of the following is potentially a negative impact of surveillance in online communications: -Increased levels of confidentiality -Lowered productivity of employees -Increased pressure on corporate email systems -Compromised company security

Lowered productive of employees

Which of these is NOT a way to make passwords more secure: -Making it something easy to guess -Avoid real words -Mix different character types -Do not include personal info

Making it something easy to guess

Botnets function with the use of ________

Malware

What applies to communication methods: -Method matches audience -Method matches madness -Form follows fleet -Form follows audience

Method matches audience

The term _____ refers to a set of formats that rely on the XML family of standards to represent metadata in HTML code.

Microformat

According to the article "Kill the password", what is the main reason that overseas syndicates are looking to steal passwords?

Money

Which of the following is true of group dynamics in virtual teams: -One important aspect of disinhibition is the avoidance of self-disclosure -The online world creates a sense of hierarchy and inequality in status -Disinhibition refers to a situation where people express themselves less bluntly while online. -Norms regarding the sharing of workload are difficult to enforce online

Norms regarding the sharing of workload are difficult to enforce online

The goal of machine learning is to develop a _________ engine for a particular use case.

Prediction

Which of the following pairs performs similar functions in the online world: -vCards and HTML -Virtual reality and Hashtags -Microblogging and hCards -Presence awareness and Context indicators

Presence awareness and Context indicators

Which of these is NOT a key to virality according to Scott Galloway: -Recency -Authenticity -Humor -Controversy

Recency

Which one of these is not an aspect of privacy: -Right to destroy personal information -Right to anonymity -Right to be left alone -Right against intrusion

Right to destroy personal information

A(n) _________ lists out and rates the vulnerability of an organization.

Risk matrix

A _______ is an area on a server in which team members can post documents, maintain membership lists, feature news and announcements, and collaborate on edits and updates.

Shared workspace

Which of the following mail protocols is commonly used to handle outgoing mail from users: -Post office protocol -Simple mail transfer protocol -Quick mail queuing protocol -Internet message access protocol

Simple mail transfer protocol

_________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Social engineering

Which of these is NOT a synchronous method of communication (pick the best one): -Instant messaging -Telepresence -Web conferencing -Social networks

Social networks

Which of these is NOT a step in an incident response plan: -Identify the threat -Determine the cause -Recover the systems -Spread the damage

Spread the damage

Which of the following provisions does the Gramm-Leach-Bliley Act make: -Limiting the disclosure of personally identifiable information that is maintained by state departments of motor vehicles -Stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies -Prohibiting businesses from sending misleading or deceptive commercial emails but denying recipients any legal recourse on their own -Establishing provisions to protect the privacy and security of individually identifiable health information

Stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies

Which of the following stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually: -The Gramm-Leach-Bliley Act -The Privacy Act of 1974 -The CAN-SPAM Act -The State Security Breach Notification Laws

The Gramm-Leach-Bliley Act

Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies: -The CAN-SPAM Act -The Privacy Act of 1974 -The State Security Breach Notification Laws -The Gramm-Leach-Bliley Act

The Privacy Act of 1974

Which of the following is a software tool that allows synchronous collaboration and allows online meetings via the internet: -Microblogging -Emailing -Web conferencing -Instant messaging

Web conferencing

Which of the following is an example of a browser-based software tool that allows web conferences and webinars? -Excel -Tumblr -WebEx -Worldweb

WebEx

What is the function of microformats like the hCard?

The electronic exchange of business card info

Which of the following is true of public key encryption: -The private key is used for encryption and is known only to the sender, while the public key is freely distributed among everyone and is used for decryption -The public key encryption scheme uses a single key to encrypt data that can later be decrypted by using the encrypted data as the key -The encryption formulas used for creating the keys are simple in nature and identical at both ends -The encryption key is widely shared with everyone, while the decryption key is known only to the recipient

The encryption key is widely shared with everyone, while the deception key is known only to the recipient

Which of the following administrative control actions help enforce approved authorizations for access to systems in an organization: -The organization requires appropriate approvals for requests to establish accounts -The organization defines the security policy that determines what events require human review -The organization defines the information to be encrypted or stored offline in a secured location -The organization separates duties of individuals as necessary to prevent malevolent activity without collusion

The organization defines the information to be encrypted or stored offline in a secured location

Which of the following is true of microformats: -They can store all types of data, except metadata -They cannot be emailed or exchanged over Bluetooth -They can be exchanged over wired networks, but not wireless -The rely on XML standards to represent metadata in HTML

They rely on XML standards to represent metadata in HTML

Which of the following principles is consistent with the natural laws and rights ethical framework: -First, do no harm -Thou shall not kill -The greatest good for the greatest number -The needs of the many outweigh the needs of the few

Thou shall not kill

A blockchain ledger is immutable (entries can't be changed once entered).

True

A cognitive obstacle to strong passwords is the limited capacity of human memory.

True

All machine learning is AI but not all AI is machine learning.

True

Asynchronous communication methods are generally cheaper than synchronous communication methods.

True

Dopamine is the chemical in your brain that is triggered when using social media.

True

GitHub is a website, recently acquired by Microsoft, that allows its users to share strings of code.

True

Smart contacts can be build on blockchain.

True

Some teams have incorrect expectations, which can lead them to abandon the exponential path too soon.

True

The downside of using surveillance techniques at work is that it pits management against staff.

True

The online world tends to flatten out hierarchies and equalize status.

True

The virtual world is a 3D environment in which users can immerse themselves interacting with virtual objects and one another using avatars.

True

To determine if a Hash is correct, the computers on a blockchain network will vote until 51% of them agree on the correct answer

True

True or False: Tattoos can be copyrighted by the artist

True

Adversarial AI is a field devoted to:

Understanding where AI can fail or be fooled

Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches: -Evaluating controls and filling in security gaps -Recovering existing assets from damage -Predicting future risks and devising strategies to prevent them -Understanding which information assets need protection

Understanding which information assets need protection

Jennifer, a client services manager in an advertising agency, is on vacation. Her smartphone lets her clients and subordinates know that she is available for hands-free cell-phone conversations at certain times of a day, and at other times communicates that she is available for IM or videoconferencing, depending on her activities at the vacation spot. Which of the following technologies is Jennifer's system using? -Enterprise resource planning -Customer relationship management -Integrated marketing communications -Unified communications

Unified communications

_________ integrates multiple applications and interactive channels into a single interface, accessible from many different devices

Unified communications

A ______ provides quick access to context indicators, email, secure instant messaging, voice and video calling, conference calling, corporate RSS feed, and more.

Universal dashboard

During the 2016 turmoil in Turkey President Erdogan:

Used social media to jail his opposition

Microsoft's Sharepoint includes features for ________, which ensures that older copies of documents are maintained and no changes are lost.

Version control

_______ describes what people experience when some of their sensory input is not from the real world, but from a computer-generated one.

Virtual reality

A graphical, often 3D environment in which users can immerse themselves interacting with virtual objects and one another using avatars is known as a _________.

Virtual world

Which of the following is a technology that facilitates end-user contributions and allows collaborative editing by allowing users to add and edit interlinked web pages

Wiki

________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information.

Wikipedia

Which of the following applications is not utilized to form virtual teams: -Sococo -Zello -Slack -Skype

Zello

Which of the following is a file format used to exchange contact management data electronically: -.ics -icalendar -.exe -hCard

hCard

The .ics extension indicates that a plain text file contains _______ code.

iCalender


Related study sets

Science Bee Study Guide, History Bee Study Guide

View Set

AI Fundamentals with IBM SkillsBuild Machine Learning And Deep Learning

View Set

Series 7 - Suitability: Portfolio Construction / Asset Allocation

View Set