For DennisWright
31
Chapter Chapter 5 – Corporate and IT Governance 5 Quiz |
Which of the following act creates international standards that strengthen global capital and liquidity rules?
| | 1) | Foreign corrupt practices Act | |
| | 2) | Gramm-Leach-Bliley Act | |
| | 3) | California Senate Bill 1386 | |
| | |
Question 2 | | 5 / 5 points |
Which act identifies the U.S. taxpayers who hold financial assets in non-U.S. financial institutions and offshore accounts?
| | 1) | Foreign Account Tax Compliance Act | |
| | 2) | Foreign Corrupt Practices Act | |
| | |
| | |
Question 3 | | 5 / 5 points |
Which of the following frameworks provides information technology (IT) services based on a synthesis of the best ideas from international practitioners?
| | 1) | IT Infrastructure Library (ITIL) | |
| | 2) | Committee of Sponsoring Organizations (COSO) 2013 | |
| | 3) | Control Objectives for Information and Related Technology (COBIT) | |
| | 4) | International Standards Organization (ISO) 27002 | |
Question 4 | | 5 / 5 points |
Which of the following provides a framework for information technology (IT) management and governance consisting of process descriptions, management guidelines, and models to assess maturity and capability for each process?
| | 1) | Committee of Sponsoring Organizations (COSO) 2013 | |
| | 2) | Information Infrastructure Library (ITIL) | |
| | 3) | Control Objectives for Information and Related Technology (COBIT) | |
| | 4) | International Standards Organization (ISO) 27002 | |
Question 5 | | 5 / 5 points |
Which of the following is a method used to achieve the goals of information technology (IT) governance?
Which of the following is a goal of effective information technology (IT) governance?
Which of the following is an inexpensive yet safe way to backup vital data?
| | 1) | Allow employees to take backup copies of vital data home at the end of the work day. | |
| | 2) | Copy online databases to magnetic storage devices and ship them off-site. | |
| | 3) | Store the backup data in a building located near the company. | |
| | 4) | Use online databases to update and backup the data. | |
Question 8 | | 0 / 5 points |
Which of the following factors influences information technology (IT) related initiatives?
| | 1) | A company’s internal control system | |
| | 2) | A company’s balance sheet | |
| | 3) | Career growth of employees | |
| | 4) | The values of IT stakeholders | |
Question 9 | | 5 / 5 points |
In the Plan-Do-Check-Act (PDCA) model, identify the step that requires the improvement team to identify its target improvement area.
Interest in corporate governance has grown due to _____ scandals.
Which of the following is true of European Union Data Protection Directive?
| | 1) | It strengthens computer and network security within the European federal government and affiliated parties (such as government contractors) by mandating yearly audits. | |
| | 2) | It protects the privacy of European Union citizens’ personal information by placing limitations on sending such data outside of the European Union to areas that are deemed to have less than adequate standards for data security. | |
| | 3) | It identifies European taxpayers who hold financial assets in non-European financial institutions and offshore accounts so that they cannot avoid their tax obligations. | |
| | 4) | It protects against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches that might put the personal information of European residents at risk. | |
Question 12 | | 5 / 5 points |
Which of the following is an intent of the Bank Secrecy Act?
| | 1) | To create international standards that strengthen global capital and liquidity rules with the goal of promoting a more resilient banking sector | |
| | 2) | To strengthen computer and network security within the U.S. federal government and affiliated parties by mandating yearly audits | |
| | 3) | To detect and prevent money laundering by requiring financial institutions to report certain transactions to government agencies. | |
| | 4) | To protect against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches that might put the personal information of California residents at risk | |
Question 13 | | 0 / 5 points |
Which of the following best describes the service transition phase of the Information Technology Infrastructure Library (ITIL)?
| | 1) | It involves understanding who the IT customers are, the service offerings required to meet their needs, and the IT capabilities and resources required to develop and successfully execute these offerings. | |
| | 2) | It involves following the design to build, test, and move into production the services that will meet customer expectations. | |
| | 3) | It ensures that the new and/or changed services are designed effectively to meet customer expectations. | |
| | 4) | It provides a means for an IT organization to measure and improve the service levels, the technology, and the efficiency and effectiveness of processes used in the overall management of services. | |
Question 14 | | 5 / 5 points |
Which act strengthens computer and network security within the U.S. federal government?
| | 1) | Federal Union Data Protection Act | |
| | 2) | Federal Information Security Management Act | |
| | 3) | Federal Corrupt Practices Act | |
| | |
Question 15 | | 5 / 5 points |
Identify the process that helps successful managers achieve high value from their investments in information technology (IT).
| | |
| | |
| | 3) | Corporate collaboration | |
| | 4) | Collaborative governance | |
Question 16 | | 5 / 5 points |
Identify the objective of the Gramm-Leach-Bliley Act.
| | 1) | To identify the U.S. taxpayers who hold financial assets in non-U.S. financial institutions and ensure that they agree to the U.S. tax obligations | |
| | 2) | To protect cardholder data and ensure that merchant and service providers maintain strict information security standards | |
| | 3) | To protect the privacy and security of individually identifiable financial information collected and processed by financial institutions | |
| | 4) | To prevent certain classes of persons and entities from making payments to foreign government officials in an attempt to obtain or retain business | |
Question 17 | | 5 / 5 points |
Which of the following is true of the Personal Information Protection and Electronic Documents Act (Canada)?
| | 1) | It governs the collection, use, and disclosure of personally identifiable information in the course of commercial transactions. | |
| | 2) | It protects against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches. | |
| | 3) | It protects cardholder data and ensures that merchant and service providers maintains strict information security standards. | |
| | 4) | It strengthens computer and network security by mandating yearly audits. | |
Question 18 | | 5 / 5 points |
An organization’s _____ and board of directors are responsible for governance.
_____ is a set of guidelines whose goal is to align information technology resources and processes with business objectives, quality standards, monetary controls, and security needs.
| | 1) | International Standards Organization (ISO) 27002 | |
| | 2) | Control Objectives for Information and Related Technology (COBIT) | |
| | 3) | Committee of Sponsoring Organizations (COSO) 2013 | |
| | 4) | Information Infrastructure Library (ITIL) | |
Question 20 | | 5 / 5 points |
In the context of Information Technology Infrastructure Library, _____ provides a means for an information technology (IT) organization to measure and improve the service levels.
| | 1) | continual transition improvement | |
| | 2) | continual process improvement | |
| | |
| | |
Chapter 7 – E-Commerce
Web sites provide a simple search tool that returns search results with thumbnails of actual products. This is a strategy to provide a(n):
| | 1) | easy and safe payment method. | |
| | 2) | efficient order fulfillment. | |
| | |
| | 4) | good customer online experience. | |
Question 2 | | 5 / 5 points |
Customers fear the misuse of their personal data due to the:
| | 1) | nature of the payment gateway. | |
| | |
| | 3) | global exposure of products sold on the web. | |
| | 4) | publicity of consumer data breaches. | |
Question 3 | | 0 / 5 points |
Which of the following features of a website ensures that visitors return to the site?
Creating, reviewing, and approving purchase orders are features of:
| | 1) | private company market places. | |
| | 2) | e-procurement softwares. | |
| | |
| | |
Question 5 | | 5 / 5 points |
Which of the following is a tool used by search engines to score Web sites?
The buying and selling of goods and services using a mobile device is called:
One of the key decisions in running an e-commerce Web site is to decide:
| | 1) | who will operate the host site. | |
| | 2) | where to create a backup. | |
| | 3) | how to make it user-friendly. | |
| | 4) | how to allow guest users to buy a product. | |
Question 8 | | 5 / 5 points |
Which of the following methods of financial transactions is considered the most secure?
| | 1) | Europay MasterCard Visa transaction | |
| | 2) | Magnetic stripe transaction | |
| | 3) | Near Field Communication transaction | |
| | |
Question 9 | | 5 / 5 points |
Which of the following is used by Europay MasterCard Visa (EMV) transactions to confirm the identity of a card holder?
| | |
| | |
| | |
| | 4) | Personal identification number | |
Question 10 | | 5 / 5 points |
Identify the component present in a smart card that can process instructions and store data for use in various applications.
An online tool designed to facilitate the submission of requests for quotations for a wide range of commercial products and services is _____.
Identify a factor that enables management to minimize inventory levels and provide a high rate of order fulfillment.
Identify the term that describes the change in technology and Web site design to enhance information sharing, collaboration, and functionality on the Web.
Which of the following is a top-level domain that provides fast and efficient internet access to mobile devices?
Which of the following allows a company to create an electronic catalog with search capability?
| | |
| | 2) | Private company marketplace software | |
| | 3) | Industry consortia–sponsored marketplace software | |
| | 4) | E-procurement software | |
Question 16 | | 5 / 5 points |
_____ are private stores that offer additional customer services beyond simply placing an order.
| | |
| | 2) | Private company marketplaces | |
| | 3) | Industry consortia-sponsored marketplaces | |
| | |
Question 17 | | 5 / 5 points |
The technology to obtain and validate tickets from mobile devices is called:
A microchip in a smart card stores the same data as the _____ on a payment card.
Companies that sell products from both physical locations and e-commerce Web sites are known as:
| | 1) | click-and-mortar retailers. | |
| | 2) | brick-and-mortar retailers. | |
| | 3) | click-and-pack retailers. | |
| | 4) | brick-and-pack retailers. | |
Question 20 | | 5 / 5 points |
Which of the following is a type of Business-to-business (B2B) Web site?
| | |
| | |
| | 3) | A private company marketplace | |
| | 4) | Multichannel retailing | |
Chapter 8 – Enterprise Resource Planning
_____ software supports the simulation, validation, and optimization of products and manufacturing tools.
| | |
| | 2) | Computer-aided manufacturing | |
| | 3) | Computer-aided engineering | |
| | 4) | Enterprise application integration | |
Question 2 | | 5 / 5 points |
A space shuttle manufacturing firm was awarded a contract to build a spaceship for NASA. The firm used various tools to build the spaceship. It required a software to analyze the robustness and performance of the shuttle. It also required a software to simulate the spaceship’s performance. Which of the following tools would have helped the firm with its requirements?
| | 1) | The Nielsen rating system | |
| | 2) | An electronic bulletin board | |
| | |
| | 4) | Computer-aided engineering | |
Question 3 | | 5 / 5 points |
_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
| | 1) | Computer-aided evaluation | |
| | |
| | 3) | Computer-aided engineering | |
| | 4) | Computer-aided manufacturing | |
Question 4 | | 5 / 5 points |
A(n) _____ software automates and integrates the functions of sales, marketing, and service in an organization.
| | 1) | decision support system | |
| | 2) | customer relationship management | |
| | 3) | search engine optimization | |
| | 4) | executive resource planning | |
Question 5 | | 5 / 5 points |
A large multinational firm with facilities in the United States and Mexico City has an annual revenue of $3 billion. This firm will be targeted by _____ enterprise resource planning (ERP) vendors.
How does an enterprise resource planning (ERP) system achieve its goal of enabling easy access to business data and creating efficient, streamlined work processes?
| | 1) | By building several databases that are accessed by a single software module | |
| | 2) | By building a single database that is accessed by multiple software modules | |
| | 3) | By conducting collaborative live meetings or presentations over the Internet | |
| | 4) | By broadcasting video and audio using streaming media and Webcasts | |
Question 7 | | 5 / 5 points |
Which of the following enables global organizations to work as a single team to design, produce, support, and retire products, while capturing best practices learned along the way?
| | 1) | An effective yield management system | |
| | 2) | An effective product life cycle management system | |
| | 3) | An enterprise resource planning system | |
| | 4) | A risk and threat management system | |
Question 8 | | 5 / 5 points |
Which of the following provides improved access to quality data for operational decision making, elimination of costly and inflexible legacy systems, and simplified consolidation of financial data?
| | 1) | An enterprise resource planning system | |
| | 2) | A customer relationship management system | |
| | 3) | A risk and threat management system | |
| | 4) | A disaster and safety management system | |
Question 9 | | 5 / 5 points |
_____ is a key feature of a customer relationship management (CRM) system that provides the ability to track data on individual customers and sales leads and then access that data from any part of the organization.
Which of the following manages materials, information, and financial resources during the transition from manufacturer to wholesaler to retailer to consumer?
| | 1) | Risk and hazard management | |
| | 2) | Enterprise resource management | |
| | 3) | Supply chain management | |
| | 4) | Disaster and safety management | |
Question 11 | | 5 / 5 points |
Identify the supply chain management process that produces, tests, packages, and prepares products for delivery.
Which of the following is true of the hosted software model?
| | 1) | It aims to help customers benefit from new technology while avoiding much of the associated complexity and high start-up costs. | |
| | 2) | It defines metrics to assess project progress and to identify project-related risks. | |
| | 3) | It keeps the scope of a project well defined and restricted to essential business processes. | |
| | 4) | It is applicable only to multinational corporations (MNCs) and not to small and medium-sized enterprises (SMEs). | |
Question 13 | | 5 / 5 points |
_____ eliminates the problems of missing and inconsistent information caused by multiple transaction processing systems that support only one business function or one department in an organization.
Identify a disadvantage of the hosted software model.
| | 1) | Decreased total cost of ownership | |
| | 2) | Potential availability and reliability issues | |
| | 3) | Lower implementation risk | |
| | 4) | Management of systems outsourced to experts | |
Question 15 | | 5 / 5 points |
_____ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished products to customers.
| | 1) | Risk factor management | |
| | 2) | Supply chain management | |
| | |
| | 4) | Customer relationship management | |
Question 16 | | 5 / 5 points |
_____ is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information.
| | 1) | Supply chain management | |
| | |
| | 3) | Product life cycle management | |
| | |
Question 17 | | 5 / 5 points |
_____ software provides support for the key functions of configuration management, document management, engineering change management, release management, and collaboration with suppliers and original equipment manufacturers (OEMs).
| | |
| | 2) | Planning and design management | |
| | 3) | Enterprise resource planning | |
| | 4) | Product life cycle management | |
Question 18 | | 5 / 5 points |
Which of the following is true of tier I enterprise resource planning vendors?
| | 1) | They target large multinational firms with facilities in multiple locations. | |
| | 2) | They target medium-sized firms based out of a single location. | |
| | 3) | They target small-sized firms with facilities in multiple locations. | |
| | 4) | They target medium-sized firms with facilities in multiple locations. | |
Question 19 | | 5 / 5 points |
_____, a key feature of a customer relationship management (CRM) system, has the ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns.
Ezibay is a medium-sized firm with an annual revenue of $75 million. This firm will be targeted by _____ enterprise resource planning (ERP) vendors.
Chapter 9 – Business Intelligence
Identify a drawback of a NoSQL database.
| | 1) | It lacks strong data consistency. | |
| | 2) | It deteriorates the system uptime. | |
| | |
| | 4) | It is not efficient in dealing with extremely large databases. | |
Question 2 | | 5 / 5 points |
Which of the following data mining techniques uses a specialized set of algorithms that sorts through data and forms statistical rules about relationships among the items?
Which of the following represents an entity in a relational database model?
Which of the following best describes the relational database model?
| | 1) | It helps organize unstructured data into collections of three-dimensional tables. | |
| | 2) | It helps organize unstructured data into collections of two-dimensional tables. | |
| | 3) | It helps organize structured data into collections of three-dimensional tables. | |
| | 4) | It helps organize structured data into collections of two-dimensional tables. | |
Question 5 | | 5 / 5 points |
Which of the following is a method to analyze multidimensional data from different perspectives?
| | |
| | |
| | 3) | Online analytical processing (OLAP) | |
| | |
Question 6 | | 0 / 5 points |
The columns in a relational database model such as customer name and address represent _____.
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analysis, interpretation, and presentation of data to support improved decision making.
| | |
| | 2) | Artificial intelligence | |
| | 3) | Prescriptive analytics | |
| | |
Question 8 | | 5 / 5 points |
Which of the following is a minor version of a data warehouse that is scaled down to meet the specific needs of a business unit?
Metrics that consist of a direction, measure, target, and time frame are known as _____.
| | 1) | online analytical processors | |
| | 2) | key association indicators | |
| | 3) | drill-down analysis indicators | |
| | 4) | key performance indicators | |
Question 10 | | 5 / 5 points |
Which of the following is a term used to describe data collections that are so enormous and complex that traditional data management software and analysis processes are incapable of dealing with them?
Identify the industry that implements data governance.
Which of the following databases should be used by a company that has over 50,000 employees in several locations to efficiently manage its database even when a couple of servers are down?
In-memory databases (IMDBs) have become feasible because of the decrease in _____ capacities.
| | 1) | random access memory (RAM) | |
| | 2) | read-only memory (ROM) | |
| | 3) | random access memory (RAM) | |
| | 4) | read-only memory (ROM) | |
Question 14 | | 5 / 5 points |
Which of the following is true of dashboards?
| | 1) | They provide rapid access to information in an easy-to-interpret manner. | |
| | 2) | They provide rapid access to information in a verbose manner. | |
| | 3) | They match a user’s query to many sources of information in an attempt to identify the most important content and the most reliable and relevant source. | |
| | 4) | They index documents from a variety of sources such as corporate databases, departmental files, email, corporate wikis, and document repositories. | |
Question 15 | | 5 / 5 points |
Identify a true statement about drill-down analysis.
| | 1) | It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements. | |
| | 2) | It involves pre-aggregation of detailed data into useful data summaries in anticipation of questions that might be raised. | |
| | 3) | It performs operation on data based on user-defined formulas. | |
| | 4) | It is used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. | |
Question 16 | | 5 / 5 points |
Which of the following represents the attribute of an entity in a relational database model?
Which layer of Hadoop is responsible for data storage?
| | |
| | 2) | The Hadoop Distributed File system layer (HDFS) | |
| | 3) | The workload management layer | |
| | 4) | The Hadoop resource layer (HRL) | |
Question 18 | | 0 / 5 points |
PindCart, a garment retailer, is not sure of the demand for its products during the festive seasons and ends up with very little profit. Which of the following business intelligence tools can help PindCart to predict the demand and maximize its sales?
| | |
| | 2) | Online analytical processing | |
| | |
| | |
Question 19 | | 5 / 5 points |
Which of the following is true of the neural computing technique in data mining?
| | 1) | Historical data is examined for patterns that are then used to make predictions. | |
| | 2) | A set of algorithms sorts through data and forms statistical rules about relationships among the items. | |
| | 3) | Historical if-then-else cases are used to recognize patterns. | |
| | 4) | Operations are performed on given data based on formulas created by the end user. | |
Question 20 | | 5 / 5 points |
A NoSQL database stores data as highly optimized key-value pairs with the data stored in a _____ table.
| | |
| | 2) | contemporary four-column | |
| | |
| | 4) | contemporary nine-column | |
Chapter 10 – Knowledge Management
Bob, a medical graduate, works as an apprentice under a chief orthopedist and gains knowledge on various orthopedic disorders and the ways to cure them. This is an example of _____.
Inessa works as a software engineer in Everett Corp., which develops cloud-based applications. She is an expert in coding and debugging. Cecilia, who recently joined the firm, is assigned to work side-by-side with Inessa on a debugging project so that she can observe and learn Inessa’s approaches and methods. This is an example of _____.
Seisms Inc., a locomotive engine manufacturing company, has forty-two branches across North America. The company’s manpower exceeds 1800 and it plans to expand the geographic distribution of its sales force and product lines to Asia. Maintaining the rules needed for effective and efficient territory assignment and sales-lead distribution is a significant challenge for the company. Which of the following would be the best solution for Seisms to undertake faster implementation of the changes to its sales division?
| | 1) | Using an enterprise resource planning system | |
| | 2) | Using a business rule management system | |
| | 3) | Using a supply chain management system | |
| | 4) | Using a customer relationship management system | |
Question 4 | | 5 / 5 points |
Which of the following is true of metadata?
| | 1) | Metadata enables analysts to make judgments about how to interpret and value the content of a message. | |
| | 2) | Metadata plans quality control activities such as product inspections and material certifications. | |
| | 3) | Metadata contains records of all financial transactions in the general ledger accounts of a company and generates financial statements for external reporting. | |
| | 4) | Metadata schedules production and monitors actual production activities. | |
Question 5 | | 5 / 5 points |
Participation in a _____ is a means of developing new knowledge, stimulating innovation, or sharing existing tacit knowledge within an organization.
| | 1) | zero-based budgeting practice | |
| | |
| | 3) | social network analysis | |
| | |
Question 6 | | 5 / 5 points |
In order to evolve, grow, and prosper, an organization must _____.
| | 1) | foster innovation by encouraging the free flow of ideas | |
| | 2) | refrain from employing young people | |
| | 3) | adhere to time-tested methods and concepts | |
| | 4) | avoid collaboration with contractors during the planning stage | |
Question 7 | | 5 / 5 points |
A(n) _____ can become a repository of important knowledge and decision-making processes that includes the learnings and experiences of experts in a field.
| | 1) | enterprise resource planning system | |
| | 2) | risk and hazard management system | |
| | 3) | customer relationship management system | |
| | 4) | business rule management system | |
Question 8 | | 5 / 5 points |
Encouraging the free flow of ideas among employees, contractors, suppliers, and other business partners can lead to a(n) _____.
| | |
| | |
| | 3) | increase in production costs | |
| | 4) | decrease in employee innovation | |
Question 9 | | 5 / 5 points |
_____ knowledge is the know-how that someone has developed as a result of personal experience and it involves intangible factors such as beliefs, perspective, and a value system.
A group of people, who have been informed about the knowledge management involved in an upcoming project, is enthusiastic about the project’s potential. Which of the following can improve the odds of the project’s success?
| | 1) | Defining a pilot project to address the business needs | |
| | 2) | Following time-tested methods and concepts | |
| | 3) | Preventing the dissemination of explicit knowledge | |
| | 4) | Avoiding collaboration among contractors, suppliers, and other business partners | |
Question 11 | | 5 / 5 points |
_____ refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
Which of the following is a technique to document and measure flows of information among individuals, workgroups, organizations, computers, Web sites, and other information sources?
| | 1) | Decision consequence analysis | |
| | 2) | Horizontal integration | |
| | 3) | Social network analysis | |
| | |
Question 13 | | 0 / 5 points |
Identify a true statement about an informal community of practice.
| | 1) | It’s members meet with little advanced planning. | |
| | 2) | It’s members meet on a regularly scheduled basis. | |
| | 3) | It’s members have a planned agenda. | |
| | 4) | It’s members have identified speakers. | |
Question 14 | | 5 / 5 points |
Which of the following processes can be used to capture tacit knowledge?
| | 1) | Proportionate problem solving | |
| | |
| | |
| | |
Question 15 | | 5 / 5 points |
Leveraging the expertise of people across an organization can help _____.
| | 1) | prevent new employees from innovating | |
| | 2) | prevent new employees from repeating some of the mistakes of others | |
| | 3) | avoid collaborations with contractors and suppliers | |
| | 4) | avoid the dissemination of tacit knowledge | |
Question 16 | | 5 / 5 points |
Which of the following can result in a significant damage to productivity and a decrease in the quality of service in an organization?
| | 1) | Fostering innovation by encouraging the free flow of ideas | |
| | 2) | Collaborating with contractors during the planning stage | |
| | 3) | Permanent loss of expertise related to core operations | |
| | 4) | Leveraging the expertise of people across the organization | |
Question 17 | | 5 / 5 points |
Which of the following is true of social network analysis (SNA)?
| | 1) | SNA provides the quality control objectives to be achieved by several organizational units. | |
| | 2) | SNA provides a clear picture of how geographically dispersed employees and organizational units collaborate. | |
| | 3) | SNA provides the accounts of a company and generates financial statements for external reporting. | |
| | 4) | SNA provides plans for changes in new government and industry rules and regulations. | |
Question 18 | | 5 / 5 points |
Which of the following is true of knowledge management?
| | 1) | Organizations implement knowledge management projects to foster innovation by encouraging the free flow of ideas. | |
| | 2) | Knowledge management enables users to gain administrator-level access to a computer without the end user’s consent or knowledge. | |
| | 3) | Knowledge management prevents computers from being controlled from one or more remote locations by hackers, without the knowledge or consent of their owners. | |
| | 4) | Organizations implement knowledge management to prevent fraudulent activities associated with computers and networks. | |
Question 19 | | 5 / 5 points |
_____ involves a novice observing an expert executing his or her job to learn how he or she performs.
| | |
| | |
| | |
| | 4) | Social network analysis | |
Question 20 | | 0 / 5 points |
In analyzing social media communications from sources such as text, video, and chat, which of the following is considered the most significant data?
Chapter 11 – Enterprise Architecture
Which of the following is true of white hat hackers?
| | 1) | They are hired by an organization to test the security of its information systems. | |
| | 2) | They disrupt a company’s information systems and business operations. | |
| | 3) | They capture trade secrets and attempt to gain an unfair competitive advantage in a company. | |
| | 4) | They destroy the infrastructure components of governments, financial institutions, and emergency response units. | |
Question 2 | | 5 / 5 points |
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?
Which of the following best describes malicious insiders?
| | 1) | They hack computers in an attempt to promote a political ideology. | |
| | 2) | They disrupt a company’s information systems and business operations. | |
| | 3) | They are hired by an organization to test the security of its information systems. | |
| | 4) | They are hired by an organization to test the security of another organization’s information systems. | |
Question 4 | | 5 / 5 points |
Which of the following is a drawback of the bring your own device (BYOD) business policy?
| | 1) | It affects the productivity of the employees of a company. | |
| | 2) | It inhibits the privacy of the employees of a company. | |
| | 3) | It exposes a company’s data to malware. | |
| | 4) | It creates the image of a company as not being flexible. | |
Question 5 | | 5 / 5 points |
Identify the primary security threat for mobile devices.
| | 1) | Distributed denial-of-service attack | |
| | |
| | |
| | |
Question 6 | | 5 / 5 points |
Jack was shocked to witness the sudden drop in performance of his laptop. He also found that the screen saver constant changed and that the taskbar had disappeared. The given problems are symptoms of _____ infections.
Which of the following statements is true about worms?
| | 1) | They abuse email systems to send unsolicited email to large numbers of people. | |
| | 2) | They allow hackers to destroy hard drives, corrupt files, and steal passwords by recording keystrokes and transmitting them to a server operated by a third party. | |
| | 3) | They insert unwanted words, numbers, or phrases into documents or alter command functions in an infected document. | |
| | 4) | They propagate without human intervention, often sending copies of themselves to other computers by email. | |
Question 8 | | 5 / 5 points |
Which of the following defines computer forensics?
| | 1) | It is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices. | |
| | 2) | It evaluates an organization’s security policy. | |
| | 3) | It detects viruses in a computer system and quarantines them. | |
| | 4) | It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment. | |
Question 9 | | 5 / 5 points |
Which of the following is created and issued by software engineers to remove a system vulnerability?
Which phase of an advanced persistent threat enables an intruder to gain useful information about the target?
| | |
| | |
| | 3) | The reconnaissance phase | |
| | |
Question 11 | | 5 / 5 points |
_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.
Identify a true statement about Trojan horses.
| | 1) | They lead consumers to counterfeit Web sites designed to trick them into divulging personal data. | |
| | 2) | They are used by organizations to test the security of information systems. | |
| | 3) | They involve the use of Short Message Service (SMS) texting for phishing. | |
| | 4) | They spy on users by recording keystrokes and transmitting them to a server operated by a third party. | |
Question 13 | | 5 / 5 points |
Identify the mode of message transmission used in smishing.
| | 1) | Multimedia Messaging Service | |
| | |
| | |
| | |
Question 14 | | 5 / 5 points |
Identify the mode of message transmission used in vishing.
| | 1) | Multimedia Messaging Service | |
| | |
| | |
| | |
Question 15 | | 0 / 5 points |
Which of the following statements is true of the discovery phase of an advanced persistent threat?
| | 1) | An intruder gains useful information about the target. | |
| | 2) | An intruder establishes a computer program that bypasses security mechanisms. | |
| | 3) | An intruder is ready to access compromised systems and capture information. | |
| | 4) | An intruder gathers valid user credentials and installs backdoors for distributing malware. | |
Question 16 | | 5 / 5 points |
Which of the following is true of spam?
| | 1) | Spam is a type of attack with which a hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. | |
| | 2) | Spam is a program in which malicious code is hidden inside a seemingly harmless program. | |
| | 3) | Spam is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. | |
| | 4) | Spam is an extremely inexpensive method of marketing used by many legitimate organizations. | |
Question 17 | | 5 / 5 points |
The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
In the context of an advanced persistent threat, identify the phase during which an intruder is ready to access unprotected or compromised systems.
| | 1) | The reconnaissance phase | |
| | |
| | |
| | |
Question 19 | | 5 / 5 points |
_____ is a three-digit number above the signature panel on the back of a credit card.
| | 1) | Personal identification number | |
| | 2) | Card verification value | |
| | 3) | Automated teller machine | |
| | 4) | Know your customer digits | |
Question 20 | | 5 / 5 points |
Which of the following best describes spear-phishing?
| | 1) | The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices. | |
| | 2) | The phisher sends a voice mail message to a number of people to call a phone number or access a Web site. | |
| | 3) | The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization. | |
| | 4) | The phisher sends fraudulent emails to a certain organization’s employees disguising them as mails from high-level executives from within the | |
Chapter 12 – Ethical, Privacy, and Security Issues
When does the support for open access to Internet grow in a country?
| | 1) | When only private-sector organizations gain online access | |
| | 2) | When only government officials gain online access | |
| | 3) | When more people gain online access | |
| | 4) | When online access is limited to schools and colleges | |
Question 2 | | 5 / 5 points |
Fly thermostat, an automatic temperature controller for homes, learns the patterns for raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of _____.
| | 1) | the Internet of Things | |
| | |
| | 3) | the Education Rate (E-Rate) program | |
| | |
Question 3 | | 5 / 5 points |
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?
| | |
| | |
| | 3) | Terms of Endearment policy | |
| | 4) | Terms of Retention policy | |
Question 4 | | 5 / 5 points |
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization’s site?
_____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices.
| | 1) | The Internet of Digital divide | |
| | 2) | The Internet of Things | |
| | |
| | 4) | The Internet of Regulations | |
Question 6 | | 5 / 5 points |
The Fourth Amendment to the U.S. Constitution was adopted to _____.
| | 1) | guarantee fair trial and other rights of an accused | |
| | 2) | prohibit excessive bail as well as cruel and unusual punishment | |
| | 3) | protect people from unreasonable searches and seizures of properties | |
| | 4) | guarantee the rights to freedom of religion, freedom of expression, and freedom to assemble | |
Question 7 | | 5 / 5 points |
Which of the following is true of the First Amendment to the U.S. Constitution?
| | 1) | It was adopted to protect Americans from unreasonable searches and seizures of properties. | |
| | 2) | It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment. | |
| | 3) | It was adopted to guarantee fair trial and other rights of the accused. | |
| | 4) | It was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble. | |
Question 8 | | 0 / 5 points |
The digital divide must be bridged to _____.
| | 1) | solve emergency issues | |
| | 2) | support net neutrality | |
| | 3) | prevent online threats | |
| | 4) | promote Internet censorship | |
Question 9 | | 5 / 5 points |
PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a _____.
Linc Corp., a software firm, decides to ban social networking sites for its employees at the workplace. However, the employees are able to access other Web sites. Identify the strategy adopted by the firm.
Identify the objective of the Communications Act of 1934.
| | 1) | To provide dial-up Internet services to schools and libraries | |
| | 2) | To protect users from online threats such as cracking and identity theft | |
| | 3) | To restrict the use of social networking Web sites | |
| | 4) | To ensure broad access to affordable communications services | |
Question 12 | | 5 / 5 points |
_____ is the control of the publishing of information on the Internet.
Which of the following is a feature of Internet censorship?
| | 1) | Monitoring the Internet activity of individuals | |
| | 2) | Storing user credentials such as name and address | |
| | 3) | Selling user data to third parties | |
| | 4) | Pilfering credit card information from online shoppers | |
Question 14 | | 5 / 5 points |
Which of the following is true of a cookie?
| | 1) | It saves shortcuts to Web sites and navigates to them within a few seconds. | |
| | 2) | It helps users to browse incognito by hiding their browsing data. | |
| | 3) | It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request. | |
| | 4) | It captures browsing history for Web site customization and personalization purposes. | |
Question 15 | | 5 / 5 points |
A company based in Houston wants to expand its business to Rome. The human resources department will run background checks from Houston. Identify the condition that must be satisfied to make this possible.
| | 1) | A “safe harbor” framework must be developed. | |
| | 2) | The US Patriot Act must be implemented. | |
| | 3) | A doxing framework must be developed. | |
| | 4) | The Digital Millennium Copyright Act must be implemented. | |
Question 16 | | 5 / 5 points |
_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.
Which of the following is a reason for the rapid growth of the Internet of Everything?
| | 1) | Limited availability of network services | |
| | 2) | Increased availability of expensive smart devices | |
| | 3) | Increased availability of network access | |
| | 4) | Limited availability of inexpensive smart devices | |
Question 18 | | 5 / 5 points |
Which of the following is true of a code of ethics?
| | 1) | It is an individual’s beliefs about right and wrong. | |
| | 2) | It is a set of beliefs about right and wrong behavior that are universally accepted. | |
| | 3) | It states the principles and core values that are essential to any professional’s work and that govern their behavior. | |
| | 4) | It is a system of rules enforced by a set of institutions that states what a person can and cannot do . | |
Question 19 | | 5 / 5 points |
Which program was designed to eliminate the digital divide in the United States?
| | 1) | The Internet traffic program | |
| | 2) | Net neutrality program | |
| | 3) | Workplace monitoring program | |
| | 4) | The Education Rate program | |
Question 20 | | 5 / 5 points |
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim’s personal details unless a ransom is paid.
31