• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/150

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

150 Cards in this Set

  • Front
  • Back

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.


1) knowledge


2) information


3) a database


4) wisdom


5) a relational language

information

Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as:


1) market basket analysis.


2) expert systems.


3) customer churn.


4) customer segmentation.


5) vertical integration.

market basket analysis.

Why do firms need to create separate data repositories for their reporting and analytics work?


1) Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters.


2) Maintaining huge databases in-house can be a cost-sink for most firms.


3) Most organizations need to differentiate data derived in-house and from data aggregators.


4) Running analytics against transactional data can bog down a system.


5) Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team.

Running analytics against transactional data can bog down a system.

Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results.


1) True


2) False

True

_____ refers to software for creating, maintaining, and manipulating data.


1) Extranet


2) ROM


3) RAM


4) DBMS


5) Internet 2

DBMS

_____ systems are often used to empower employees to track and record data at nearly every point of customer contact

.Answer:Customer relationship management

In database systems, a _____ defines the data that a table can hold.


1) row


2) key


3) record


4) file


5) field

field

The acronym_____ refers to a technology that is often used to tag objects and inventory items so that they can 'announce their presence' as they make their way along an organization's value chain.

RFID

_____ is by far the most popular language for creating and manipulating databases.


1) XML


2) HTML


3) PHP


4) Java


5) SQL

SQL

Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return are referred to as _____.

Answer:transaction processing systems

Knowledge is defined as:


1) raw facts and figures.


2) the data presented in a context so that it can answer a question or support decision making.


3) the insight derived from experience and expertise.


4) a listing of primary data.


5) the process of breaking a complex topic into smaller parts.

the insight derived from experience and expertise.

Turning data into useable information is hindered by transactional databases set up to be simultaneously accessed for reporting and analysis.


1) True


2) False

False

OLAP technology is primarily used for transaction processing.


1) True


2) False

False

Data obtained from outside sources, when combined with a firm's proprietary internal data assets, can give the firm a competitive edge.


1) True


2) False

True

In database systems, a _____ refers to a list of data.


1) file


2) column


3) field


4) row


5) record

file

In database terminology, a record represents:




1) a list of data, arranged in columns and rows.


2) all of the data in a given column.


3) a single instance of whatever the table keeps track of.


4) a field or combination of fields used to uniquely identify a file.


5) one or more keys that relate separate tables in a database.

a single instance of whatever the table keeps track of.

Skittish and untrusting managers should realize that the first findings of analytics always reveal an optimal course of action.


1) True


2) False

False

_____ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.


1) Canned reports


2) Ad hoc reporting tools


3) Dashboards


4) Data cubes


5) Online analytical processing

Ad hoc reporting tools

_____ refers to a job title focused on directing, performing, or overseeing activities associated with a database or set of databases.

(Database administrator, Database administrator (DBA), DBA)

In many organizations, the majority of available data is not exploited to advantage.


1) True


2) False

True

Enterprise software tends to be less integrated and standardized than the prior era of proprietary systems that many firms developed themselves.


1) True


2) False

False

Any data-centric effort should involve input not only from business and technical staff, but from the firm's legal team, as well.


1) True


2) False

True

In database systems, a row is also known as a _____.


1) table


2) column


3) key


4) record


5) field

record

_____ is the general term used to describe the massive amount of data available to today's managers.

Big Data

In data warehousing projects, it is not uncommon for spending on consulting and services to cost five times or more than the cost of the technology itself.


1) True


2) False

True

Advantages based on capabilities and data that others can acquire are long-lived.


1) True


2) False

False

_____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis.


1) Logistics


2) Queritic modeling


3) Business intelligence


4) Electronic trading


5) Big Data

Business intelligence

_____ is the term used to describe raw facts and figures.


1) Information


2) Knowledge


3) Analytics


4) Data


5) Intelligence

Data

Data can potentially be used as a strategic asset, capable of yielding sustainable competitive advantage. Which of the items below is not a characteristic of a potentially strategic asset.


1) value


2) rarity


3) imperfect imitability


4) lead time


5) non-substitutability

lead time

A study by Gartner Research claims that the amount of data on corporate hard drives doubles every three years.


1) True


2) False

False

If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use _____.




1) transaction processing systems


2) point-of-sale terminals


3) data cubes


4) dashboards


5) loyalty cards

loyalty cards

All SQL databases are relational databases.


1) True


2) False

True

Logistics is the term that describes the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.


1) True


2) False

False

Which of the following conditions is essential for data mining to work?


1) The data must be collected from proprietary sources and not from data aggregators.


2) The organization must leverage standard relational databases as opposed to inferior hierarchical and analytical databases.


3) The events in the data should reflect current and future trends.


4) The data mining software must necessarily incorporate ad hoc reporting tools and dashboards.


5) The data should have passed the Diehard suite of stringent tests for randomness.

The events in the data should reflect current and future trends.

Data are raw facts that must be turned into information in order to be useful and valuable.


1) True


2) False

True

In database systems, a column is also known as a key.


1) True


2) False

False

Data warehouses are composed entirely of proprietary corporate data, while data marts take advantage of data purchased from third-party firms.


1) True


2) False

False

_____ is the term used to describe some form of business exchange.

Transaction

_____ refer to databases focused on addressing the concerns of a specific problem or business unit.


1) Data marts


2) Dashboards


3) Hadoop


4) Data aggregators


5) Data analytics

Data marts

_____ are the most common standard for expressing databases, whereby tables (files) are related based on common keys.

Relational databases

One of the factors that accelerated the development of the Internet during the 1990s was:


1) the introduction of the personal computer into households.


2) the government's taking over of the Internet's operating structure from private players.


3) Intel's invention of low power processors used in portable computers.


4) the creation of the Windows and Mac OS operating systems.


5) the invention of graphical Web browsing.

the invention of graphical Web browsing.

DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas.


1) True


2) False

True

The acronym HFT refers to:


1) High Finance Telecommunications


2) High Fidelity Transmissions


3) Hedge Fund Transfers


4) High Frequency Trading


5) Hypertext File Transfer

High Frequency Trading

The phrase ________ is used by technologists to refer to delay.

latency

The language "http" is used to create and format Web pages.


1) True


2) False

False

A unit of data forwarded by a network is called a _____.

packet, datagram

One of the functions of the IP is to:




1) route message packets to the final destination.


2) slice up the message into smaller chunks of data called packets, to be sent over the network.


3) check for damaged or corrupt message packets and request for replacements, if needed.


4) label message packets with source and destination addresses.


5) rearrange message packets in the same sequence as they were sent.

route message packets to the final destination.

_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.

Load balancing

The protocol used for exchange of mail between e-mail servers across the world is called _____.

simple mail transfer protocol

Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications.


1) True


2) False

False

The Internet has no center and no one owns it.


1) True


2) False

True

Circuit-switched networks provide connection between two parties that:


1) uses a single router for each individual on either end of the connection.


2) is dedicated for use by the parties for the duration of a connection.


3) repeatedly switches between an open and closed state depending on whether someone is speaking or other noise is being transmitted during a call.


4) slices up the conversation into smaller chunks and transmitting them over a shared circuit that mixes content with other callers but routes and reassembles a call to the correct recipient.


5) prioritizes voice calls over other connections on IP networks.

is dedicated for use by the parties for the duration of a connection.

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:




1) assigning IP addresses to different domain names.


2) mapping host names to domain names.


3) creating IP addresses that are unique to servers.


4) assigning domain names to different IP addresses.


5) mapping host and domain names to IP addresses of computers.

mapping host and domain names to IP addresses of computers.

Which of the following is true of the term Internet backbone?




1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.


2) It refers to broadband service provided direct to a home or business using light-transmitting fiber-optic cables.


3) It refers to the collection of standards used to support all Internet services.


4) It refers to government-provided open spectrum that enables Internet use for all.


5) It refers to a government-run system supported by telecommunication taxes, which connects end users to the Internet.

It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.

The address one types into a Web browser is also known as a:


1) universal redirection link.


2) uniform resource locator.


3) unique resource locator.


4) universal redirection locator.


5) uniform resource link.

uniform resource locator.

Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.


1) True


2) False

True

The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.


1) cybersquatting


2) phishing


3) an online imposture


4) cache poisoning


5) a distributed denial of request

cache poisoning

_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.


1) Optical fiber cable


2) Coaxial cable


3) Ribbon cable


4) FTTH cable


5) Amdahl cable

Coaxial cable

A firm that provides hardware and services to run Web sites of others is known as a(n) _____.




1) Web site incubator


2) Internet service facilitator


3) Web domain name registrar


4) Web hosting service


5) Internet Web fab

Web hosting service

Routers don't have perfect, end-to-end information on all points in the Internet.


1) True


2) False

True

TCP and IP operate above http and the other application transfer protocols.


1) True


2) False

False

The Internet Protocol Suite consists of the Internet Protocol and _____.




1) File Transfer Protocol


2) Simple Mail Transfer Protocol


3) Session Initiation Protocol


4) Datagram Congestion Control Protocol


5) Transmission Control Protocol

Transmission Control Protocol

In the URL, the host name is the name of the network a user tries to connect to.


1) True


2) False

False

The fault-tolerant nature of the DNS ensures that:


1) if users can't reach a host computer, they are redirected back to the previous page.


2) mistyped or misspelled Web addresses are automatically corrected.


3) if a document or file can't be accessed, it won't result in a 404 error.


4) the service continues functioning even if one nameserver goes down.


5) mismatched host names and domain names are still assigned with the correct IP address.

the service continues functioning even if one nameserver goes down.

Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?




1) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets


2) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order


3) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets


4) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets


5) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets

Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order

One of the disadvantages of cable technology is that:


1) it is more expensive than other signal-carrying systems.


2) while it works well for television signals, it is ineffective for data transmissions required by the Internet.


3) systems used by many providers require customers to share bandwidth with neighbors.


4) it is incompatible with most modern communication systems.


5) the speed of the connection rises in conjunction with the distance between the end customers from the central hub.

systems used by many providers require customers to share bandwidth with neighbors.

IP addresses can oftentimes be used to identify a user's geographic location.


1) True


2) False

True

Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.


1) True


2) False

False

Popular sites like Google and Yahoo! have several computers assigned to their host names because:


1) they have operations in different countries.


2) they are registered under several generic top-level domain names.


3) of the different devices used to access these web sites.


4) hoarding all information in one server is expensive.


5) it ensures that the load of requests to their sites do not overwhelm a single computer.

it ensures that the load of requests to their sites do not overwhelm a single computer.

A Web address without a file name will load content from a default page.


1) True


2) False

True

Computer programs making decisions without any human intervention conduct most U.S. stock trading.


1) True


2) False

True

Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination.


1) True


2) False

True

Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.


1) True


2) False

True

ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution.


1) True


2) False

False

"Html" is used to:


1) load content from a default page.


2) create and format Web pages.


3) generate custom content for users.


4) exchange mail with other e-mail servers.


5) transfer files from flash drives.

create and format Web pages.

A device gets its IP address from whichever organization is currently connecting it to the Internet.


1) True


2) False

True

_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.


1) Voice precedence


2) Data rationing


3) Right-of-way for voice


4) Information queuing


5) Packet prioritization

Packet prioritization

A(n) _____ is a temporary storage space used to speed computing tasks.


1) cache


2) IP address


3) Protocol


4) domain name service


5) hypertext markup language

cache

Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.


1) True


2) False

False

_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.

Internet Corporation for Assigned Names and Numbers (ICANN)

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

Answer:distributed denial of service

Which of the following statements holds true for the term encryption?


1) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.


2) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.


3) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.


4) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.


5) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.


1) True


2) False

True

Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?


1) Target had security software, but the notification alerts from the software were ignored.


2) Target had properly installed and configured its security software, but hackers got in, anyway.


3) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.


4) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected.


5) All of the above

Target had security software, but the notification alerts from the software were ignored.

Viruses are programs that infect other software or files and require:


1) a large file size to spread.


2) the computer to be shutdown to spread.


3) Windows as an operating system to spread.


4) a disk-based operating system to spread.


5) an executable program to spread.

an executable program to spread.

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.


1) True


2) False

False

One of the major problems with the Heartbleed bug in OpenSSL software is that:




1) the software was embedded in many hardware products that could not be easily patched with automatic software updates.


2) any password typed into a CAPTCHa could be monitored by a Van Eck device.


3) social engineers could exploit the bug through SQL injection.


4) all social media profile data was exposed, giving hackers access to the potential answers many firms ask as part of password security questions.


5) it eliminated the ability to expose a URL's desitination by hovering the cursor over an address.

the software was embedded in many hardware products that could not be easily patched with automatic software updates.

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?


1) Lack of technology to identify the origin of a security attack


2) Non-recognition of commission of a security-related crime


3) Unwillingness of developed countries to share technical know-how with lesser-developed countries


4) Non-existent extradition agreements between two countries


5) Technological incompatibility between the two countries

Non-existent extradition agreements between two countries

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?


1) Cyber-fraud


2) Corporate espionage


3) Carrying out technology disruptions


4) Extortion


5) Illegal funds transfer

Corporate espionage

A vast majority of security breaches are not preventable and happen despite the best security practices.


1) True


2) False

False

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?


1) Spyware


2) Malware


3) Social engineering


4) Phishing


5) Virus infections

Phishing

_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.


1) Shadow-keyboards


2) Bootloggers


3) KitRoots


4) Keyloggers


5) Adwares

Keyloggers

The information systems of several firms have been compromised by insiders that can include contract employees,cleaning staff, and temporary staffers.


1) True


2) False

True

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:


1) honeypots.


2) zombots.


3) botnets.


4) blacklists.


5) megabots.

botnets

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.




1) novel attacks


2) first mover attacks


3) non-precedent breaches


4) zero-day exploits


5) brute force attacks

zero-day exploits

Which of these would be an example of a DDoS attack?


1) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases


2) Overloading a popular social networking site with inbound messages in order to shut down access to the site


3) Launching a targeted phishing campaign on a department of defense or other surveillance network


4) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services


5) Launching tough-to-track click-fraud efforts

Overloading a popular social networking site with inbound messages in order to shut down access to the site

Which of the following statements holds true for the term spoof?


1) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.


2) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.


3) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.


4) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.


5) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.


1) True


2) False

True

The example presented in the textbook involving Vonage and the New York Times illustrates the importance that managers:




1) instruct employees to use encryption on public wireless networks


2) train staff to select difficult-to-guess passwords


3) audit all partners and suppliers to make sure they are legitimate


4) lock employee doors to minimize the likelihood that criminals could install keyboard monitoring software or hardware


5) keep shades drawn so that Van Eck techniques cannot be used

audit all partners and suppliers to make sure they are legitimate

Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.

VPN, virtual private networks

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.


1) True


2) False

False

The term _____ originally referred to a particularly skilled programmer.


1) data harvester


2) cracke


3) hacker


4) black hat


5) hacktivist

hacker

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.


1) DDos


2) Rootkit


3) Keylogging


4) CAPTCHa


5) VPN

VPN

Some of the most common guidelines issued by Web sites when designing a secure password include:


1) The password should be at least eight characters long and include at least one number and other nonalphabet character.


2) The password should be short and straightforward.


3) The password should include names of family members or pets, so as to be easily remembered.


4) Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability.


5) The password should be the same as your name so as to trick the hacker.

The password should be at least eight characters long and include at least one number and other nonalphabet character.

It's bad when a firm's e-mail and password file is stolen, however the impact is mimized because user passwords set up for one system cannot be used on others.


1) True


2) False

False

_____ refers to a term that either means breaking into a computer system or a particularly clever solution.

Hack

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.


1) True


2) False

True

Which weakness of Web sites to launch attacks does an SQL injection technique exploit?


1) Sloppy programming practices where software developers do not validate user input


2) Lack of in-built anti-virus features


3) Irregular auditing of Web site content


4) Ease of infiltrating the Web site


5) Non-employment of encryption techniques

Sloppy programming practices where software developers do not validate user input

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.


1) activist


2) cyber agitator


3) hacktivist


4) ethical hacker


5) cybersquatter

hacktivist

Which of the following is a valid statement on information security?


1) Security breaches cannot be prevented despite the adoption of the best security policies.


2) Technology lapses are solely responsible for almost all security breaches.


3) Information security is everybody's responsibility.


4) Greater expenditure on security products is the only way to contain security breaches.


5) A reactive, rather than proactive, approach is better suited for dealing with security breaches.

Information security is everybody's responsibility.

_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

Stuxnet

Which of the following are considered sources of information that can potentially be used by social engineers?


1) LinkedIn


2) Corporate directories


3) Social media posts


4) Contests or surveys


5) All of the above

All of the above

URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.


1) True


2) False

2) False

In public-key encryption systems, the functions of the public and private keys are interchangeable.


1) True


2) False

False

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

biometrics

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:




1) rootkits.


2) trojans.


3) viruses.


4) worms.


5) honeypots.

trojans

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:




1) keylogging.


2) shoulder surfing.


3) dumpster diving.


4) screen capture.


5) spyware.

shoulder surfing.

_____ refers to confidence scams executed through technology.

Phishing

The market for stolen data is stagnant and most hackers use stolen data like credit card numbers for personal use.


1) True


2) False

False

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.


1) True


2) False

True

_____ refers to software for creating, maintaining, and manipulating data.


1) Extranet


2) ROM


3) RAM


4) DBMS


5) Internet 2

DBMS

Skittish and untrusting managers should realize that the first findings of analytics always reveal an optimal course of action.


1) True


2) False

False

Knowledge is defined as:


1) raw facts and figures.


2) the data presented in a context so that it can answer a question or support decision making.


3) the insight derived from experience and expertise.


4) a listing of primary data.


5) the process of breaking a complex topic into smaller parts.

the insight derived from experience and expertise.

Firms that collect and resell data are known as:


1) data barons.


2) data mongers.


3) knowledge consultancies.


4) data miners.


5) data aggregators.

data aggregators.

_____ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business.




1) Data aggregator systems


2) Loyalty card systems


3) Legacy systems


4) Transaction systems


5) Mnemonic systems

Legacy systems

In database systems, a column is also known as a key.


1) True


2) False

False

If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use _____.




1) transaction processing systems


2) point-of-sale terminals


3) data cubes


4) dashboards


5) loyalty cards

loyalty cards

_____ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.


1) Canned reports


2) Ad hoc reporting tools


3) Dashboards


4) Data cubes


5) Online analytical processing

Ad hoc reporting tools

_____ is the general term used to describe the massive amount of data available to today's managers.

Big data

_____ is a language used to create and manipulate databases.

SQL

Peering usually takes place at neutral sites called _____.


1) https


2) IPs


3) ISPs


4) IXPs


5) STPs

IXPs

Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination.


1) True


2) False

True

A technique known as _____ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses.

Network Address Translation (NAT)

Peering refers to:




1) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.


2) the broadband service provided via light-transmitting fiber-optic cables.


3) the language used to compose Web pages.


4) a situation when separate ISPs connect their networking equipment together to share traffic.


5) a system that connects end users to the Internet.

a situation when separate ISPs connect their networking equipment together to share traffic.

Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications.


1) True


2) False

False

A(n) _____ is a temporary storage space used to speed computing tasks.


1) cache


2) IP address


3) Protocol


4) domain name service


5) hypertext markup language

cache

The Internet Protocol Suite consists of the Internet Protocol and _____.


1) File Transfer Protocol


2) Simple Mail Transfer Protocol


3) Session Initiation Protocol


4) Datagram Congestion Control Protoco


5) Transmission Control Protocol

Transmission Control Protocol

One of the functions of the IP is to:




1) route message packets to the final destination.


2) slice up the message into smaller chunks of data called packets, to be sent over the network.


3) check for damaged or corrupt message packets and request for replacements, if needed.


4) label message packets with source and destination addresses.


5) rearrange message packets in the same sequence as they were sent.

route message packets to the final destination.

A(n) _____ is a computing device that connects networks and exchanges data between them.

router

One of the factors that accelerated the development of the Internet during the 1990s was:


1) the introduction of the personal computer into households.


2) the government's taking over of the Internet's operating structure from private players.


3) Intel's invention of low power processors used in portable computers.


4) the creation of the Windows and Mac OS operating systems.


5) the invention of graphical Web browsing.

the invention of graphical Web browsing.

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.


1) True


2) False

True

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.




1) overlamination processes


2) biometrics


3) smart tags


4) bio-embedded systems


5) holographs

biometrics

Which of these would be an example of a DDoS attack?


1) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases


2) Overloading a popular social networking site with inbound messages in order to shut down access to the site


3) Launching a targeted phishing campaign on a department of defense or other surveillance network


4) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services


5) Launching tough-to-track click-fraud efforts

Overloading a popular social networking site with inbound messages in order to shut down access to the site

According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.


1) True


2) False

False

Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:


1) some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities.


2) the cost to include government surveillance technology inside their products is expensive and lowers profits compared to rivals.


3) the government-required installations of software, such as Stuxnet, that U.S. tech firms must comply with inevitably take up valuable storage space, adding cost to industrial and commercial products.


4) the cost to house government workers on-site is a burden private corporations should not have to shoulder.


5) firms in foreign governments are directly contracted to perform surveillance, and are compensated for their efforts with perks and tax breaks, while U.S. firms receive no such compensation.

some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities.

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?




1) Cyber-fraud


2) Corporate espionage


3) Carrying out technology disruptions


4) Extortion


5) Illegal funds transfer

Corporate espionage

In public-key encryption systems, the functions of the public and private keys are interchangeable.


1) True


2) False

False

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

biometrics

Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.


1) True


2) False

False

Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?


1) Target had security software, but the notification alerts from the software were ignored.


2) Target had properly installed and configured its security software, but hackers got in, anyway.


3) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.


4) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected.


5) All of the above

Target had security software, but the notification alerts from the software were ignored.