For DennisWright

31

Chapter Chapter 5 – Corporate and IT Governance

5 Quiz


Question 1

5 / 5 points

Which of the following act creates international standards that strengthen global capital and liquidity rules?

1) 

Foreign corrupt practices Act

2) 

Gramm-Leach-Bliley Act

3) 

California Senate Bill 1386

4) 

Basel II Accord

Question 2

5 / 5 points

Which act identifies the U.S. taxpayers who hold financial assets in non-U.S. financial institutions and offshore accounts?

1) 

Foreign Account Tax Compliance Act

2) 

Foreign Corrupt Practices Act

3) 

U.S. Senate Bill Act

4) 

Basel II Tax Accord

Question 3

5 / 5 points

Which of the following frameworks provides information technology (IT) services based on a synthesis of the best ideas from international practitioners?

1) 

IT Infrastructure Library (ITIL)

2) 

Committee of Sponsoring Organizations (COSO) 2013

3) 

Control Objectives for Information and Related Technology (COBIT)

4) 

International Standards Organization (ISO) 27002

Question 4

5 / 5 points

Which of the following provides a framework for information technology (IT) management and governance consisting of process descriptions, management guidelines, and models to assess maturity and capability for each process?

1) 

Committee of Sponsoring Organizations (COSO) 2013

2) 

Information Infrastructure Library (ITIL)

3) 

Control Objectives for Information and Related Technology (COBIT)

4) 

International Standards Organization (ISO) 27002

Question 5

5 / 5 points

Which of the following is a method used to achieve the goals of information technology (IT) governance?

1) 

Strategic alignment

2) 

IT value delivery

3) 

Risk management

4) 

Operations management

Question 6

5 / 5 points

Which of the following is a goal of effective information technology (IT) governance?

1) 

Resource management

2) 

Risk management

3) 

Operations alignment

4) 

Strategic alignment

Question 7

5 / 5 points

Which of the following is an inexpensive yet safe way to backup vital data?

1) 

Allow employees to take backup copies of vital data home at the end of the work day.

2) 

Copy online databases to magnetic storage devices and ship them off-site.

3) 

Store the backup data in a building located near the company.

4) 

Use online databases to update and backup the data.

Question 8

0 / 5 points

Which of the following factors influences information technology (IT) related initiatives?

1) 

A company’s internal control system

2) 

A company’s balance sheet

3) 

Career growth of employees

4) 

The values of IT stakeholders

Question 9

5 / 5 points

In the Plan-Do-Check-Act (PDCA) model, identify the step that requires the improvement team to identify its target improvement area.

1) 

The Do step

2) 

The Check step

3) 

The Plan step

4) 

The Act step

Question 10

5 / 5 points

Interest in corporate governance has grown due to _____ scandals.

1) 

accounting

2) 

espionage

3) 

journalistic

4) 

plagiarism

Question 11

5 / 5 points

Which of the following is true of European Union Data Protection Directive?

1) 

It strengthens computer and network security within the European federal government and affiliated parties (such as government contractors) by mandating yearly audits.

2) 

It protects the privacy of European Union citizens’ personal information by placing limitations on sending such data outside of the European Union to areas that are deemed to have less than adequate standards for data security.

3) 

It identifies European taxpayers who hold financial assets in non-European financial institutions and offshore accounts so that they cannot avoid their tax obligations.

4) 

It protects against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches that might put the personal information of European residents at risk.

Question 12

5 / 5 points

Which of the following is an intent of the Bank Secrecy Act?

1) 

To create international standards that strengthen global capital and liquidity rules with the goal of promoting a more resilient banking sector

2) 

To strengthen computer and network security within the U.S. federal government and affiliated parties by mandating yearly audits

3) 

To detect and prevent money laundering by requiring financial institutions to report certain transactions to government agencies.

4) 

To protect against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches that might put the personal information of California residents at risk

Question 13

0 / 5 points

Which of the following best describes the service transition phase of the Information Technology Infrastructure Library (ITIL)?

1) 

It involves understanding who the IT customers are, the service offerings required to meet their needs, and the IT capabilities and resources required to develop and successfully execute these offerings.

2) 

It involves following the design to build, test, and move into production the services that will meet customer expectations.

3) 

It ensures that the new and/or changed services are designed effectively to meet customer expectations.

4) 

It provides a means for an IT organization to measure and improve the service levels, the technology, and the efficiency and effectiveness of processes used in the overall management of services.

Question 14

5 / 5 points

Which act strengthens computer and network security within the U.S. federal government?

1) 

Federal Union Data Protection Act

2) 

Federal Information Security Management Act

3) 

Federal Corrupt Practices Act

4) 

Federal-Bliley Act

Question 15

5 / 5 points

Identify the process that helps successful managers achieve high value from their investments in information technology (IT).

1) 

IT governance

2) 

IT collaboration

3) 

Corporate collaboration

4) 

Collaborative governance

Question 16

5 / 5 points

Identify the objective of the Gramm-Leach-Bliley Act.

1) 

To identify the U.S. taxpayers who hold financial assets in non-U.S. financial institutions and ensure that they agree to the U.S. tax obligations

2) 

To protect cardholder data and ensure that merchant and service providers maintain strict information security standards

3) 

To protect the privacy and security of individually identifiable financial information collected and processed by financial institutions

4) 

To prevent certain classes of persons and entities from making payments to foreign government officials in an attempt to obtain or retain business

Question 17

5 / 5 points

Which of the following is true of the Personal Information Protection and Electronic Documents Act (Canada)?

1) 

It governs the collection, use, and disclosure of personally identifiable information in the course of commercial transactions.

2) 

It protects against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches.

3) 

It protects cardholder data and ensures that merchant and service providers maintains strict information security standards.

4) 

It strengthens computer and network security by mandating yearly audits.

Question 18

5 / 5 points

An organization’s _____ and board of directors are responsible for governance.

1) 

executives

2) 

customers

3) 

retailers

4) 

clients

Question 19

5 / 5 points

_____ is a set of guidelines whose goal is to align information technology resources and processes with business objectives, quality standards, monetary controls, and security needs.

1) 

International Standards Organization (ISO) 27002

2) 

Control Objectives for Information and Related Technology (COBIT)

3) 

Committee of Sponsoring Organizations (COSO) 2013

4) 

Information Infrastructure Library (ITIL)

Question 20

5 / 5 points

In the context of Information Technology Infrastructure Library, _____ provides a means for an information technology (IT) organization to measure and improve the service levels.

1) 

continual transition improvement

2) 

continual process improvement

3) 

service strategy

4) 

service operation

Chapter 7 – E-Commerce

Chapter 7 Quiz


Question 1

5 / 5 points

Web sites provide a simple search tool that returns search results with thumbnails of actual products. This is a strategy to provide a(n):

1) 

easy and safe payment method.

2) 

efficient order fulfillment.

3) 

smooth return policy.

4) 

good customer online experience.

Question 2

5 / 5 points

Customers fear the misuse of their personal data due to the:

1) 

nature of the payment gateway.

2) 

sticky Web site.

3) 

global exposure of products sold on the web.

4) 

publicity of consumer data breaches.

Question 3

0 / 5 points

Which of the following features of a website ensures that visitors return to the site?

1) 

Sticky

2) 

Navigation

3) 

Bookmark

4) 

Cookie

Question 4

5 / 5 points

Creating, reviewing, and approving purchase orders are features of:

1) 

private company market places.

2) 

e-procurement softwares.

3) 

customer portals.

4) 

private stores.

Question 5

5 / 5 points

Which of the following is a tool used by search engines to score Web sites?

1) 

Parser

2) 

Crawler

3) 

Cookie

4) 

Sticker

Question 6

5 / 5 points

The buying and selling of goods and services using a mobile device is called:

1) 

mobile computing.

2) 

m-commerce.

3) 

e-commerce.

4) 

cloud computing.

Question 7

0 / 5 points

One of the key decisions in running an e-commerce Web site is to decide:

1) 

who will operate the host site.

2) 

where to create a backup.

3) 

how to make it user-friendly.

4) 

how to allow guest users to buy a product.

Question 8

5 / 5 points

Which of the following methods of financial transactions is considered the most secure?

1) 

Europay MasterCard Visa transaction

2) 

Magnetic stripe transaction

3) 

Near Field Communication transaction

4) 

payWave transaction

Question 9

5 / 5 points

Which of the following is used by Europay MasterCard Visa (EMV) transactions to confirm the identity of a card holder?

1) 

Signature

2) 

Photo

3) 

Telephone number

4) 

Personal identification number

Question 10

5 / 5 points

Identify the component present in a smart card that can process instructions and store data for use in various applications.

1) 

Macrochip

2) 

Microchip

3) 

Magnetic tape

4) 

Magnetic stripe

Question 11

0 / 5 points

An online tool designed to facilitate the submission of requests for quotations for a wide range of commercial products and services is _____.

1) 

eMod

2) 

GSA Advantage!

3) 

GSA eLibrary

4) 

eBuy

Question 12

0 / 5 points

Identify a factor that enables management to minimize inventory levels and provide a high rate of order fulfillment.

1) 

Sales forecasting

2) 

Customer review

3) 

Web site popularity

4) 

Easy payment method

Question 13

5 / 5 points

Identify the term that describes the change in technology and Web site design to enhance information sharing, collaboration, and functionality on the Web.

1) 

Podcast

2) 

Mashup

3) 

Forum

4) 

Web 2.0

Question 14

5 / 5 points

Which of the following is a top-level domain that provides fast and efficient internet access to mobile devices?

1) 

.Link

2) 

.Net

3) 

.Info

4) 

.Mobi

Question 15

5 / 5 points

Which of the following allows a company to create an electronic catalog with search capability?

1) 

Omnichannel software

2) 

Private company marketplace software

3) 

Industry consortia–sponsored marketplace software

4) 

E-procurement software

Question 16

5 / 5 points

_____ are private stores that offer additional customer services beyond simply placing an order.

1) 

Customer portals

2) 

Private company marketplaces

3) 

Industry consortia-sponsored marketplaces

4) 

Omnichannel portals

Question 17

5 / 5 points

The technology to obtain and validate tickets from mobile devices is called:

1) 

eTicketing.

2) 

iTicketing.

3) 

mobile ticketing.

4) 

integrated ticketing.

Question 18

5 / 5 points

A microchip in a smart card stores the same data as the _____ on a payment card.

1) 

magnetic tape

2) 

magnetic recorder

3) 

magnetic coil

4) 

magnetic stripe

Question 19

5 / 5 points

Companies that sell products from both physical locations and e-commerce Web sites are known as:

1) 

click-and-mortar retailers.

2) 

brick-and-mortar retailers.

3) 

click-and-pack retailers.

4) 

brick-and-pack retailers.

Question 20

5 / 5 points

Which of the following is a type of Business-to-business (B2B) Web site?

1) 

Omnichannel retailing

2) 

The long tail

3) 

A private company marketplace

4) 

Multichannel retailing

Chapter 8 – Enterprise Resource Planning

_____ software supports the simulation, validation, and optimization of products and manufacturing tools.

1) 

E-procurement

2) 

Computer-aided manufacturing

3) 

Computer-aided engineering

4) 

Enterprise application integration

Question 2

5 / 5 points

A space shuttle manufacturing firm was awarded a contract to build a spaceship for NASA. The firm used various tools to build the spaceship. It required a software to analyze the robustness and performance of the shuttle. It also required a software to simulate the spaceship’s performance. Which of the following tools would have helped the firm with its requirements?

1) 

The Nielsen rating system

2) 

An electronic bulletin board

3) 

Computer-aided design

4) 

Computer-aided engineering

Question 3

5 / 5 points

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

1) 

Computer-aided evaluation

2) 

Computer-aided design

3) 

Computer-aided engineering

4) 

Computer-aided manufacturing

Question 4

5 / 5 points

A(n) _____ software automates and integrates the functions of sales, marketing, and service in an organization.

1) 

decision support system

2) 

customer relationship management

3) 

search engine optimization

4) 

executive resource planning

Question 5

5 / 5 points

A large multinational firm with facilities in the United States and Mexico City has an annual revenue of $3 billion. This firm will be targeted by _____ enterprise resource planning (ERP) vendors.

1) 

tier IV

2) 

tier III

3) 

tier II

4) 

tier I

Question 6

5 / 5 points

How does an enterprise resource planning (ERP) system achieve its goal of enabling easy access to business data and creating efficient, streamlined work processes?

1) 

By building several databases that are accessed by a single software module

2) 

By building a single database that is accessed by multiple software modules

3) 

By conducting collaborative live meetings or presentations over the Internet

4) 

By broadcasting video and audio using streaming media and Webcasts

Question 7

5 / 5 points

Which of the following enables global organizations to work as a single team to design, produce, support, and retire products, while capturing best practices learned along the way?

1) 

An effective yield management system

2) 

An effective product life cycle management system

3) 

An enterprise resource planning system

4) 

A risk and threat management system

Question 8

5 / 5 points

Which of the following provides improved access to quality data for operational decision making, elimination of costly and inflexible legacy systems, and simplified consolidation of financial data?

1) 

An enterprise resource planning system

2) 

A customer relationship management system

3) 

A risk and threat management system

4) 

A disaster and safety management system

Question 9

5 / 5 points

_____ is a key feature of a customer relationship management (CRM) system that provides the ability to track data on individual customers and sales leads and then access that data from any part of the organization.

1) 

Desktop sharing

2) 

Asset management

3) 

Contact management

4) 

Unified communication

Question 10

5 / 5 points

Which of the following manages materials, information, and financial resources during the transition from manufacturer to wholesaler to retailer to consumer?

1) 

Risk and hazard management

2) 

Enterprise resource management

3) 

Supply chain management

4) 

Disaster and safety management

Question 11

5 / 5 points

Identify the supply chain management process that produces, tests, packages, and prepares products for delivery.

1) 

Advertising

2) 

Forecasting

3) 

Sourcing

4) 

Manufacturing

Question 12

5 / 5 points

Which of the following is true of the hosted software model?

1) 

It aims to help customers benefit from new technology while avoiding much of the associated complexity and high start-up costs.

2) 

It defines metrics to assess project progress and to identify project-related risks.

3) 

It keeps the scope of a project well defined and restricted to essential business processes.

4) 

It is applicable only to multinational corporations (MNCs) and not to small and medium-sized enterprises (SMEs).

Question 13

5 / 5 points

_____ eliminates the problems of missing and inconsistent information caused by multiple transaction processing systems that support only one business function or one department in an organization.

1) 

Dynamic programming

2) 

An enterprise system

3) 

The Hawthorne effect

4) 

Execution fulfillment

Question 14

5 / 5 points

Identify a disadvantage of the hosted software model.

1) 

Decreased total cost of ownership

2) 

Potential availability and reliability issues

3) 

Lower implementation risk

4) 

Management of systems outsourced to experts

Question 15

5 / 5 points

_____ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished products to customers.

1) 

Risk factor management

2) 

Supply chain management

3) 

Operations management

4) 

Customer relationship management

Question 16

5 / 5 points

_____ is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information.

1) 

Supply chain management

2) 

Risk management

3) 

Product life cycle management

4) 

Accounting management

Question 17

5 / 5 points

_____ software provides support for the key functions of configuration management, document management, engineering change management, release management, and collaboration with suppliers and original equipment manufacturers (OEMs).

1) 

Design support system

2) 

Planning and design management

3) 

Enterprise resource planning

4) 

Product life cycle management

Question 18

5 / 5 points

Which of the following is true of tier I enterprise resource planning vendors?

1) 

They target large multinational firms with facilities in multiple locations.

2) 

They target medium-sized firms based out of a single location.

3) 

They target small-sized firms with facilities in multiple locations.

4) 

They target medium-sized firms with facilities in multiple locations.

Question 19

5 / 5 points

_____, a key feature of a customer relationship management (CRM) system, has the ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns.

1) 

Contact management

2) 

Sales forecasting

3) 

Marketing automation

4) 

Customer attrition

Question 20

5 / 5 points

Ezibay is a medium-sized firm with an annual revenue of $75 million. This firm will be targeted by _____ enterprise resource planning (ERP) vendors.

1) 

tier I

2) 

tier II

3) 

tier III

4) 

tier IV

Chapter 9 – Business Intelligence

Chapter 9 Quiz


Question 1

5 / 5 points

Identify a drawback of a NoSQL database.

1) 

It lacks strong data consistency.

2) 

It deteriorates the system uptime.

3) 

It is less scalable.

4) 

It is not efficient in dealing with extremely large databases.

Question 2

5 / 5 points

Which of the following data mining techniques uses a specialized set of algorithms that sorts through data and forms statistical rules about relationships among the items?

1) 

Neural computing

2) 

Association analysis

3) 

Case-based reasoning

4) 

Drill-down analysis

Question 3

0 / 5 points

Which of the following represents an entity in a relational database model?

1) 

A column

2) 

A row

3) 

An attribute

4) 

A degree

Question 4

5 / 5 points

Which of the following best describes the relational database model?

1) 

It helps organize unstructured data into collections of three-dimensional tables.

2) 

It helps organize unstructured data into collections of two-dimensional tables.

3) 

It helps organize structured data into collections of three-dimensional tables.

4) 

It helps organize structured data into collections of two-dimensional tables.

Question 5

5 / 5 points

Which of the following is a method to analyze multidimensional data from different perspectives?

1) 

Spreadsheet reporting

2) 

Data mining

3) 

Online analytical processing (OLAP)

4) 

Drill-down analysis

Question 6

0 / 5 points

The columns in a relational database model such as customer name and address represent _____.

1) 

attributes

2) 

entities

3) 

keys

4) 

tuples

Question 7

5 / 5 points

_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analysis, interpretation, and presentation of data to support improved decision making.

1) 

Business intelligence

2) 

Artificial intelligence

3) 

Prescriptive analytics

4) 

Artificial analytics

Question 8

5 / 5 points

Which of the following is a minor version of a data warehouse that is scaled down to meet the specific needs of a business unit?

1) 

Data cart

2) 

Data mart

3) 

Data wallet

4) 

Data set

Question 9

0 / 5 points

Metrics that consist of a direction, measure, target, and time frame are known as _____.

1) 

online analytical processors

2) 

key association indicators

3) 

drill-down analysis indicators

4) 

key performance indicators

Question 10

5 / 5 points

Which of the following is a term used to describe data collections that are so enormous and complex that traditional data management software and analysis processes are incapable of dealing with them?

1) 

Big data

2) 

Data mart

3) 

Data warehouse

4) 

Big cell

Question 11

5 / 5 points

Identify the industry that implements data governance.

1) 

Insurance industry

2) 

Agricultural industry

3) 

Construction industry

4) 

Automobile industry

Question 12

0 / 5 points

Which of the following databases should be used by a company that has over 50,000 employees in several locations to efficiently manage its database even when a couple of servers are down?

1) 

Hadoop

2) 

SQL

3) 

COBOL

4) 

NoSQL

Question 13

0 / 5 points

In-memory databases (IMDBs) have become feasible because of the decrease in _____ capacities.

1) 

random access memory (RAM)

2) 

read-only memory (ROM)

3) 

random access memory (RAM)

4) 

read-only memory (ROM)

Question 14

5 / 5 points

Which of the following is true of dashboards?

1) 

They provide rapid access to information in an easy-to-interpret manner.

2) 

They provide rapid access to information in a verbose manner.

3) 

They match a user’s query to many sources of information in an attempt to identify the most important content and the most reliable and relevant source.

4) 

They index documents from a variety of sources such as corporate databases, departmental files, email, corporate wikis, and document repositories.

Question 15

5 / 5 points

Identify a true statement about drill-down analysis.

1) 

It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements.

2) 

It involves pre-aggregation of detailed data into useful data summaries in anticipation of questions that might be raised.

3) 

It performs operation on data based on user-defined formulas.

4) 

It is used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making.

Question 16

5 / 5 points

Which of the following represents the attribute of an entity in a relational database model?

1) 

A column

2) 

A row

3) 

A Cardinality

4) 

A tuple

Question 17

5 / 5 points

Which layer of Hadoop is responsible for data storage?

1) 

The application layer

2) 

The Hadoop Distributed File system layer (HDFS)

3) 

The workload management layer

4) 

The Hadoop resource layer (HRL)

Question 18

0 / 5 points

PindCart, a garment retailer, is not sure of the demand for its products during the festive seasons and ends up with very little profit. Which of the following business intelligence tools can help PindCart to predict the demand and maximize its sales?

1) 

Drill-down analysis

2) 

Online analytical processing

3) 

Spreadsheets

4) 

Dashboards

Question 19

5 / 5 points

Which of the following is true of the neural computing technique in data mining?

1) 

Historical data is examined for patterns that are then used to make predictions.

2) 

A set of algorithms sorts through data and forms statistical rules about relationships among the items.

3) 

Historical if-then-else cases are used to recognize patterns.

4) 

Operations are performed on given data based on formulas created by the end user.

Question 20

5 / 5 points

A NoSQL database stores data as highly optimized key-value pairs with the data stored in a _____ table.

1) 

simple two-column

2) 

contemporary four-column

3) 

simple three-column

4) 

contemporary nine-column

Chapter 10 – Knowledge Management

Chapter 10 Quiz


Question 1

5 / 5 points

Bob, a medical graduate, works as an apprentice under a chief orthopedist and gains knowledge on various orthopedic disorders and the ways to cure them. This is an example of _____.

1) 

shadowing

2) 

overriding

3) 

mirroring

4) 

outsourcing

Question 2

5 / 5 points

Inessa works as a software engineer in Everett Corp., which develops cloud-based applications. She is an expert in coding and debugging. Cecilia, who recently joined the firm, is assigned to work side-by-side with Inessa on a debugging project so that she can observe and learn Inessa’s approaches and methods. This is an example of _____.

1) 

offshoring

2) 

outsourcing

3) 

joint problem solving

4) 

shadowing

Question 3

5 / 5 points

Seisms Inc., a locomotive engine manufacturing company, has forty-two branches across North America. The company’s manpower exceeds 1800 and it plans to expand the geographic distribution of its sales force and product lines to Asia. Maintaining the rules needed for effective and efficient territory assignment and sales-lead distribution is a significant challenge for the company. Which of the following would be the best solution for Seisms to undertake faster implementation of the changes to its sales division?

1) 

Using an enterprise resource planning system

2) 

Using a business rule management system

3) 

Using a supply chain management system

4) 

Using a customer relationship management system

Question 4

5 / 5 points

Which of the following is true of metadata?

1) 

Metadata enables analysts to make judgments about how to interpret and value the content of a message.

2) 

Metadata plans quality control activities such as product inspections and material certifications.

3) 

Metadata contains records of all financial transactions in the general ledger accounts of a company and generates financial statements for external reporting.

4) 

Metadata schedules production and monitors actual production activities.

Question 5

5 / 5 points

Participation in a _____ is a means of developing new knowledge, stimulating innovation, or sharing existing tacit knowledge within an organization.

1) 

zero-based budgeting practice

2) 

meta-analysis

3) 

social network analysis

4) 

community of practice

Question 6

5 / 5 points

In order to evolve, grow, and prosper, an organization must _____.

1) 

foster innovation by encouraging the free flow of ideas

2) 

refrain from employing young people

3) 

adhere to time-tested methods and concepts

4) 

avoid collaboration with contractors during the planning stage

Question 7

5 / 5 points

A(n) _____ can become a repository of important knowledge and decision-making processes that includes the learnings and experiences of experts in a field.

1) 

enterprise resource planning system

2) 

risk and hazard management system

3) 

customer relationship management system

4) 

business rule management system

Question 8

5 / 5 points

Encouraging the free flow of ideas among employees, contractors, suppliers, and other business partners can lead to a(n) _____.

1) 

increase in revenue

2) 

decrease in revenue

3) 

increase in production costs

4) 

decrease in employee innovation

Question 9

5 / 5 points

_____ knowledge is the know-how that someone has developed as a result of personal experience and it involves intangible factors such as beliefs, perspective, and a value system.

1) 

Tacit knowledge

2) 

Explicit knowledge

3) 

Rootkit knowledge

4) 

Lucent knowledge

Question 10

5 / 5 points

A group of people, who have been informed about the knowledge management involved in an upcoming project, is enthusiastic about the project’s potential. Which of the following can improve the odds of the project’s success?

1) 

Defining a pilot project to address the business needs

2) 

Following time-tested methods and concepts

3) 

Preventing the dissemination of explicit knowledge

4) 

Avoiding collaboration among contractors, suppliers, and other business partners

Question 11

5 / 5 points

_____ refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.

1) 

Electronic discovery

2) 

Electronic banking

3) 

Electronic packaging

4) 

Electronic trading

Question 12

0 / 5 points

Which of the following is a technique to document and measure flows of information among individuals, workgroups, organizations, computers, Web sites, and other information sources?

1) 

Decision consequence analysis

2) 

Horizontal integration

3) 

Social network analysis

4) 

Vertical integration

Question 13

0 / 5 points

Identify a true statement about an informal community of practice.

1) 

It’s members meet with little advanced planning.

2) 

It’s members meet on a regularly scheduled basis.

3) 

It’s members have a planned agenda.

4) 

It’s members have identified speakers.

Question 14

5 / 5 points

Which of the following processes can be used to capture tacit knowledge?

1) 

Proportionate problem solving

2) 

Offshoring

3) 

Shadowing

4) 

Outsourcing

Question 15

5 / 5 points

Leveraging the expertise of people across an organization can help _____.

1) 

prevent new employees from innovating

2) 

prevent new employees from repeating some of the mistakes of others

3) 

avoid collaborations with contractors and suppliers

4) 

avoid the dissemination of tacit knowledge

Question 16

5 / 5 points

Which of the following can result in a significant damage to productivity and a decrease in the quality of service in an organization?

1) 

Fostering innovation by encouraging the free flow of ideas

2) 

Collaborating with contractors during the planning stage

3) 

Permanent loss of expertise related to core operations

4) 

Leveraging the expertise of people across the organization

Question 17

5 / 5 points

Which of the following is true of social network analysis (SNA)?

1) 

SNA provides the quality control objectives to be achieved by several organizational units.

2) 

SNA provides a clear picture of how geographically dispersed employees and organizational units collaborate.

3) 

SNA provides the accounts of a company and generates financial statements for external reporting.

4) 

SNA provides plans for changes in new government and industry rules and regulations.

Question 18

5 / 5 points

Which of the following is true of knowledge management?

1) 

Organizations implement knowledge management projects to foster innovation by encouraging the free flow of ideas.

2) 

Knowledge management enables users to gain administrator-level access to a computer without the end user’s consent or knowledge.

3) 

Knowledge management prevents computers from being controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.

4) 

Organizations implement knowledge management to prevent fraudulent activities associated with computers and networks.

Question 19

5 / 5 points

_____ involves a novice observing an expert executing his or her job to learn how he or she performs.

1) 

Joint problem solving

2) 

Shadowing

3) 

Overriding

4) 

Social network analysis

Question 20

0 / 5 points

In analyzing social media communications from sources such as text, video, and chat, which of the following is considered the most significant data?

1) 

The content itself

2) 

Metadata

3) 

Schema

4) 

Macrodata

Chapter 11 – Enterprise Architecture

Chapter 11 Quiz


Question 1

5 / 5 points

Which of the following is true of white hat hackers?

1) 

They are hired by an organization to test the security of its information systems.

2) 

They disrupt a company’s information systems and business operations.

3) 

They capture trade secrets and attempt to gain an unfair competitive advantage in a company.

4) 

They destroy the infrastructure components of governments, financial institutions, and emergency response units.

Question 2

5 / 5 points

Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?

1) 

Camware

2) 

Spyware

3) 

Scareware

4) 

Ransomware

Question 3

5 / 5 points

Which of the following best describes malicious insiders?

1) 

They hack computers in an attempt to promote a political ideology.

2) 

They disrupt a company’s information systems and business operations.

3) 

They are hired by an organization to test the security of its information systems.

4) 

They are hired by an organization to test the security of another organization’s information systems.

Question 4

5 / 5 points

Which of the following is a drawback of the bring your own device (BYOD) business policy?

1) 

It affects the productivity of the employees of a company.

2) 

It inhibits the privacy of the employees of a company.

3) 

It exposes a company’s data to malware.

4) 

It creates the image of a company as not being flexible.

Question 5

5 / 5 points

Identify the primary security threat for mobile devices.

1) 

Distributed denial-of-service attack

2) 

Cyberterrorism

3) 

Cyberespionage

4) 

Theft of device

Question 6

5 / 5 points

Jack was shocked to witness the sudden drop in performance of his laptop. He also found that the screen saver constant changed and that the taskbar had disappeared. The given problems are symptoms of _____ infections.

1) 

rootkit

2) 

smishing

3) 

phishing

4) 

bootkit

Question 7

5 / 5 points

Which of the following statements is true about worms?

1) 

They abuse email systems to send unsolicited email to large numbers of people.

2) 

They allow hackers to destroy hard drives, corrupt files, and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.

3) 

They insert unwanted words, numbers, or phrases into documents or alter command functions in an infected document.

4) 

They propagate without human intervention, often sending copies of themselves to other computers by email.

Question 8

5 / 5 points

Which of the following defines computer forensics?

1) 

It is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices.

2) 

It evaluates an organization’s security policy.

3) 

It detects viruses in a computer system and quarantines them.

4) 

It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

Question 9

5 / 5 points

Which of the following is created and issued by software engineers to remove a system vulnerability?

1) 

A patch

2) 

A key

3) 

A license

4) 

A constraint

Question 10

5 / 5 points

Which phase of an advanced persistent threat enables an intruder to gain useful information about the target?

1) 

The discovery phase

2) 

The capture phase

3) 

The reconnaissance phase

4) 

The incursion phase

Question 11

5 / 5 points

_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

1) 

Spoofing

2) 

Vishing

3) 

Phishing

4) 

Smishing

Question 12

0 / 5 points

Identify a true statement about Trojan horses.

1) 

They lead consumers to counterfeit Web sites designed to trick them into divulging personal data.

2) 

They are used by organizations to test the security of information systems.

3) 

They involve the use of Short Message Service (SMS) texting for phishing.

4) 

They spy on users by recording keystrokes and transmitting them to a server operated by a third party.

Question 13

5 / 5 points

Identify the mode of message transmission used in smishing.

1) 

Multimedia Messaging Service

2) 

Short Message Service

3) 

Email

4) 

Voice mail

Question 14

5 / 5 points

Identify the mode of message transmission used in vishing.

1) 

Multimedia Messaging Service

2) 

Short Message Service

3) 

Email

4) 

Voice mail

Question 15

0 / 5 points

Which of the following statements is true of the discovery phase of an advanced persistent threat?

1) 

An intruder gains useful information about the target.

2) 

An intruder establishes a computer program that bypasses security mechanisms.

3) 

An intruder is ready to access compromised systems and capture information.

4) 

An intruder gathers valid user credentials and installs backdoors for distributing malware.

Question 16

5 / 5 points

Which of the following is true of spam?

1) 

Spam is a type of attack with which a hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

2) 

Spam is a program in which malicious code is hidden inside a seemingly harmless program.

3) 

Spam is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.

4) 

Spam is an extremely inexpensive method of marketing used by many legitimate organizations.

Question 17

5 / 5 points

The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.

1) 

dropper

2) 

loader

3) 

linker

4) 

adapter

Question 18

5 / 5 points

In the context of an advanced persistent threat, identify the phase during which an intruder is ready to access unprotected or compromised systems.

1) 

The reconnaissance phase

2) 

The discovery phase

3) 

The capture phase

4) 

The export phase

Question 19

5 / 5 points

_____ is a three-digit number above the signature panel on the back of a credit card.

1) 

Personal identification number

2) 

Card verification value

3) 

Automated teller machine

4) 

Know your customer digits

Question 20

5 / 5 points

Which of the following best describes spear-phishing?

1) 

The phisher sends a survey to the employees of several organizations to obtain details of the configuration of their computing devices.

2) 

The phisher sends a voice mail message to a number of people to call a phone number or access a Web site.

3) 

The phisher sends legitimate-looking text messages through his or her phone to advertise a certain organization.

4) 

The phisher sends fraudulent emails to a certain organization’s employees disguising them as mails from high-level executives from within the 

Chapter 12 – Ethical, Privacy, and Security Issues

Chapter 12 Quiz


Question 1

5 / 5 points

When does the support for open access to Internet grow in a country?

1) 

When only private-sector organizations gain online access

2) 

When only government officials gain online access

3) 

When more people gain online access

4) 

When online access is limited to schools and colleges

Question 2

5 / 5 points

Fly thermostat, an automatic temperature controller for homes, learns the patterns for raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of _____.

1) 

the Internet of Things

2) 

Net neutrality

3) 

the Education Rate (E-Rate) program

4) 

Net censorship

Question 3

5 / 5 points

Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?

1) 

Terms of Trade policy

2) 

Terms of Use policy

3) 

Terms of Endearment policy

4) 

Terms of Retention policy

Question 4

5 / 5 points

Which of the following is a small file that is placed on the computer hard drive of visitors to an organization’s site?

1) 

A wiki

2) 

A cookie

3) 

An antivirus

4) 

A bookmark

Question 5

5 / 5 points

_____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices.

1) 

The Internet of Digital divide

2) 

The Internet of Things

3) 

The Internet of Data

4) 

The Internet of Regulations

Question 6

5 / 5 points

The Fourth Amendment to the U.S. Constitution was adopted to _____.

1) 

guarantee fair trial and other rights of an accused

2) 

prohibit excessive bail as well as cruel and unusual punishment

3) 

protect people from unreasonable searches and seizures of properties

4) 

guarantee the rights to freedom of religion, freedom of expression, and freedom to assemble

Question 7

5 / 5 points

Which of the following is true of the First Amendment to the U.S. Constitution?

1) 

It was adopted to protect Americans from unreasonable searches and seizures of properties.

2) 

It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.

3) 

It was adopted to guarantee fair trial and other rights of the accused.

4) 

It was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble.

Question 8

0 / 5 points

The digital divide must be bridged to _____.

1) 

solve emergency issues

2) 

support net neutrality

3) 

prevent online threats

4) 

promote Internet censorship

Question 9

5 / 5 points

PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a _____.

1) 

cookie

2) 

metadata

3) 

data dictionary

4) 

popup

Question 10

5 / 5 points

Linc Corp., a software firm, decides to ban social networking sites for its employees at the workplace. However, the employees are able to access other Web sites. Identify the strategy adopted by the firm.

1) 

Cyberespionage

2) 

Internet censorship

3) 

Internet rootkit

4) 

Spear phishing

Question 11

5 / 5 points

Identify the objective of the Communications Act of 1934.

1) 

To provide dial-up Internet services to schools and libraries

2) 

To protect users from online threats such as cracking and identity theft

3) 

To restrict the use of social networking Web sites

4) 

To ensure broad access to affordable communications services

Question 12

5 / 5 points

_____ is the control of the publishing of information on the Internet.

1) 

Internet graying

2) 

Internet flagship

3) 

Internet catalysis

4) 

Internet censorship

Question 13

5 / 5 points

Which of the following is a feature of Internet censorship?

1) 

Monitoring the Internet activity of individuals

2) 

Storing user credentials such as name and address

3) 

Selling user data to third parties

4) 

Pilfering credit card information from online shoppers

Question 14

5 / 5 points

Which of the following is true of a cookie?

1) 

It saves shortcuts to Web sites and navigates to them within a few seconds.

2) 

It helps users to browse incognito by hiding their browsing data.

3) 

It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request.

4) 

It captures browsing history for Web site customization and personalization purposes.

Question 15

5 / 5 points

A company based in Houston wants to expand its business to Rome. The human resources department will run background checks from Houston. Identify the condition that must be satisfied to make this possible.

1) 

A “safe harbor” framework must be developed.

2) 

The US Patriot Act must be implemented.

3) 

A doxing framework must be developed.

4) 

The Digital Millennium Copyright Act must be implemented.

Question 16

5 / 5 points

_____ create profiles on people based on aggregated data from public records such as business directories and social media networks.

1) 

Data brokers

2) 

Yellow pagers

3) 

Data miners

4) 

Drill-down analysts

Question 17

5 / 5 points

Which of the following is a reason for the rapid growth of the Internet of Everything?

1) 

Limited availability of network services

2) 

Increased availability of expensive smart devices

3) 

Increased availability of network access

4) 

Limited availability of inexpensive smart devices

Question 18

5 / 5 points

Which of the following is true of a code of ethics?

1) 

It is an individual’s beliefs about right and wrong.

2) 

It is a set of beliefs about right and wrong behavior that are universally accepted.

3) 

It states the principles and core values that are essential to any professional’s work and that govern their behavior.

4) 

It is a system of rules enforced by a set of institutions that states what a person can and cannot do .

Question 19

5 / 5 points

Which program was designed to eliminate the digital divide in the United States?

1) 

The Internet traffic program

2) 

Net neutrality program

3) 

Workplace monitoring program

4) 

The Education Rate program

Question 20

5 / 5 points

Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim’s personal details unless a ransom is paid.

1) 

Hacking

2) 

Spamming

3) 

Doxing

4) 

Cracking


31