• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/184

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

184 Cards in this Set

  • Front
  • Back
SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.
Answer: TRUE
Page Ref: 187
Autonomic computing is implemented primarily with enterprise or ISP servers.
Answer: FALSE
Page Ref: 181
Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.
Answer: TRUE Page Ref: 186
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
Answer: TRUE Page Ref: 187
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
Answer: TRUE Page Ref: 187
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
Answer: TRUE Page Ref: 194
TCO refers to the original cost of purchased technology: both hardware and software.
Answer: FALSE
Page Ref: 196
Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers?
A) networking
B) telephone
C) VOIP
D) telecommunications
Answer: D Page Ref: 164
Which of the following is NOT an IT infrastructure service component?
A) operating system software
B) computing platforms to provide a coherent digital environment
C) physical facility management to manage the facilities housing physical components
D) IT management services to plan and develop the infrastructure and provide project management
Answer: A
Page Ref: 163-164
In a multi-tiered network:
A) the work of the entire network is centralized.
B) the work of the entire network is balanced over several levels of servers.
1
Information Systems I – 90.477-001
C) processing is split between clients and servers.
D) processing is handled by multiple, geographically remote clients.
Answer: B Page Ref: 167
Interpretations of Moore's law assert that:
A) computing power doubles every 18 months.
B) transistors decrease in size 50% every two years.
C) data storage costs decrease by 50% every 18 months. D) none of the above.
Answer: A
Page Ref: 168-170
Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades?
A) network economics
B) law of mass digital storage and Moore's law
C) declining communications costs, universal standards, and the Internet D) all of the above
Answer: D
Page Ref: 168-174
Specifications that establish the compatibility of products and the ability to communicate in a network are called
A) network standards.
B) telecommunications standards.
C) technology standards. D) Internet standards.
Answer: C Page Ref: 174
A SAN is a ________ network. A) server area
B) storage area
C) scalable architecture
D) service-oriented architecture
Answer: B
Page Ref: 177
Legacy systems are still used because they
A) can only be run on the older mainframe computers.
B) are too expensive to redesign.
C) integrate well using new Web services technologies.
D) contain valuable data that would be lost during redesign.
Answer: B Page Ref: 179
39) Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called
A) co-location.
B) edge computing.
C) grid computing. D) utility computing.
Answer: C page Ref: 179
The business case for using grid computing involves all of the following EXCEPT A) cost savings.
B) increased accuracy.
C) speed of computation.
D) agility.
Answer: B
Page Ref: 179-180
Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?
A) on-demand
B) grid
C) edge
D) autonomic
Answer: A Page Ref: 181
Which of the following does grid computing utilize to create enormous supercomputing power? A) massive unused data centers
B) underutilized mainframe computers
C) networked computers with idle resources
D) networks with low usage
Answer: C
Page Ref: 181
An example of autonomic computing is
A) spyware protection software that runs and updates itself automatically.
B) software programmed to run on any hardware platform.
C) cell phones taking on the functions of handheld computers.
D) programming languages that allow non-programmers to create custom applications.
Answer: A Page Ref: 181
Which of the following is a technique used to allow users to interact with a Web page without having to wait for the Web server to reload the Web page?
A) UDDI
B) widgets
C) Ajax
D) Java
Answer: C Page Ref: 186
A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a:
A) JVM.
B) Web browser.
C) FTP client.
D) All of the above.
Answer: B Page Ref: 186
Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as
A) Web services.
B) EAI software.
C) SOA.
D) SOAP.
Answer: A
Page Ref: 186
unning a Java program on a computer requires
A) a Java Virtual Machine to be installed on the computer.
B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) a miniature program to be downloaded to the user's computer.
D) no specialized software, as Java is platform-independent.
Answer: A Page Ref: 186
Which of the following is an example of an SOA environment?
A) Amazon.com's operation of hundreds of services, such as billing or customer interface, delivered by different application servers
B) E*Trade's use of lower-cost Linux servers that delivered increased computer performance
C) Thermos's use of hosted Oracle systems software running on Oracle's computers
D) None of the above
Answer: A
Page Ref: 187-188
Software applications that are based on combining different online software applications are called A) integrated software.
B) Ajax.
C) mashups.
D) virtual software.
Answer: C
Page Ref: 189
Your firm needs to implement electronic timesheet software and needs to keep within a small budget. Which of the following would be the most costly method of implementing this new software?
A) purchasing a software package
B) programming the new software in-house
C) leasing the software over the Internet
D) outsourcing the software programming
Answer: B
Page Ref: 189-191
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as
A) software packages.
B) mashups.
C) outsourced software. D) open source software.
Answer: A Page Ref: 190
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n)
A) SOA
B) SLA
C) TCO D) RFQ
Answer: B Page Ref: 191
SaaS refers to
A) supplying online access over networks to storage devices and storage area network technology.
B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet.
C) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
D) none of the above.
Answer: C Page Ref: 191
The practice of contracting custom software development to an outside firm is commonly referred to as A) outsourcing.
B) scaling.
C) service-oriented architecture.
D) application integration.
Answer: A
Page Ref: 191
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
A) modality
B) scalability
C) expandability
D) disintermediation
Answer: B Page Ref: 194
How would you determine the market demand for your firm's IT services? A) Perform a TCO analysis.
B) Benchmark your services.
C) Hold focus groups to assess your services.
D) Analyze sales returns on key investments.
Answer: C
Page Ref: 194
Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?
A) your firm's business strategy
B) the IT investments made by competitor firms
C) market demand for your firm's services D) your firm's organizational culture
Answer: D Page Ref: 195
Your firm, an auto parts manufacturer, has just merged with an automobile engine manufacturer, and the two companies have different SCM systems. Which of the following strategies would be the most likely course to help to reduce the TCO of the merged firms' technology investments?
A) Use Web services to join the two systems.
B) Move one firm into using the other's system in order to centralize management and support services. C) Develop single ERP system that encompasses the information needs and business processes of both firms.
D) Purchase a hosted, on-demand ERP system that encompasses the needs and processes of both firms.
Answer: B
Page Ref: 196-197
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
A) total cost of ownership
B) return on investment
C) breakeven point
D) cost benefit analysis
Answer: A Page Ref: 196
Hardware and software acquisition costs account for about ________ percent of TCO. A) 20
B) 40
C) 60
D) 80
Answer: A
Page Ref: 196
(blank) is the ability of the computer, product, or system to expand to survey larger numbers of users without breaking down.
Scalability Page Ref: 194
Program-data dependence refers to the coupling of data stored in files and software programs that use this data such that changes in programs require changes to the data.
Answer: TRUE Page Ref: 211
Many applications today require databases that can store and retrieve multimedia.
Answer: TRUE
Page Ref: 215
In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to- many relationships.
Answer: TRUE Page Ref: 219
A data warehouse is typically comprised of several smaller data marts.
Answer: FALSE
Page Ref: 225
Predictive analysis is synonymous with data mining.
Answer: FALSE
Page 229
Data cleansing is the same process as data scrubbing.
Answer: TRUE
Page Ref: 234
Which of the following is NOT one of the main problems with a traditional file environment? A) data inconsistency
B) program-data independence
C) lack of flexibility in creating ad-hoc reports
D) poor security
Answer: B
Page Ref: 211-212
A DBMS reduces data redundancy and inconsistency by A) enforcing referential integrity.
B) uncoupling program and data.
C) utilizing a data dictionary.
D) minimizing isolated files with repeated data.
Answer: D
Page Ref: 213
Which of the following best illustrates the relationship between entities and attributes? A) the entity CUSTOMER with the attribute PRODUCT
B) the entity CUSTOMER with the attribute PURCHASE
C) the entity PRODUCT with the attribute PURCHASE
D) the entity PRODUCT with the attribute CUSTOMER
Answer: B
Page Ref: 210
A characteristic or quality describing an entity is called a(n) A) field.
B) tuple.
C) key field.
D) attribute.
Answer: D
Page Ref: 210
Which of the following non-digital data storage items is most similar to a database? A) library card catalog.
B) cash register receipt.
C) doctor's office invoice.
D) list of sales totals on a spreadsheet.
Answer: A
Page Ref: 210-211
The confusion created by ________ makes it difficult for companies to create customer relationship
management, supply chain management, or enterprise systems that integrate data from different sources
Answer: B
Page Ref: 211
Duplicate data in multiple data files is called data ________. A) redundancy
B) repetition
C) independence
D) partitions
Answer: A
Page Ref: 211
The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) OODBMS.
B) pre-digital DBMS.
C) relational DBMS.
D) hierarchical DBMS.
Answer: C
Page Ref: 213
In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where.
B) select, join, and where.
C) select, project, and join.
D) select, from, and join.
Answer: C
Page Ref: 215
The project operation
A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table.
C) organizes elements into segments.
D) identifies the table from which the columns will be selected.
Answer: B Page Ref: 215
Which of the following database types is useful for storing java applets as well as processing large numbers of transactions?
A) relational DBMS
B) hierarchical DBMS
C) object-relational DBMS D) OODBMS
Answer: C Page Ref: 215
The type of database management approach that can handle multimedia is the A) hierarchical DBMS.
B) relational DBMS.
C) network DBMS.
D) object-oriented DBMS.
Answer: D
Page Ref: 215
The data dictionary serves as an important data management tool by
A) assigning attributes to the data.
B) creating an inventory of data contained in the database.
C) presenting data as end users or business specialists would perceive them.
D) maintaining data in updated form.
Answer: B Page Ref: 217
The specialized language programmers use to add and change data in the database is called A) a data access language.
B) a data manipulation language.
C) structured Query language.
D) a data definition language.
Answer: B
Page Ref: 217
DBMSs typically include report-generating tools in order to A) retrieve and display data.
B) display data in an easier-to-read format.
C) display data in graphs.
D) perform predictive analysis.
Answer: B
Page Ref: 219
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called
A) normalization.
B) data scrubbing.
C) data cleansing.
D) data defining.
Answer: A Page Ref: 219
A schematic of the entire database that describes the relationships in a database is called a(n) A) data dictionary.
B) intersection relationship diagram.
C) entity-relationship diagram.
D) data definition diagram.
Answer: C
Page Ref: 220
In what type of a database system is the entire central database duplicated at all remote locations? A) partitioned
B) normalized
C) replicated
D) networked
Answer: C
Page Ref: 221
Which of the following is a main disadvantage to a distributed database system? A) lack of flexibility
B) susceptibility to data inconsistency
C) poor responsiveness to local users
D) requires more expensive computers
Answer: B
Page Ref 222
A data warehouse is composed of
A) historical data from legacy systems. B) current data.
C) internal and external data sources. D) historic and current internal data.
Answer: D Page Ref: 223
A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because A) a data mart typically focuses on a single subject area or line of business.
B) all the information is historical.
C) a data mart uses a Web interface.
D) all of the information belongs to a single company.
Answer: A
Page Ref: 225
Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as
A) DSS.
B) business intelligence.
C) OLAP.
D) data mining.
Answer: B Page Ref: 226
The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis.
B) SQL.
C) OLAP.
D) data mining
Answer: C
Page Ref: 226
Data mining is a tool for allowing users to
A) quickly compare transaction data gathered over many years.
B) find hidden relationships in data.
C) obtain online answers to ad hoc questions in a rapid amount of time.
D) summarize massive amounts of data into much smaller, tradition
Answer: B Page Ref: 228
The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n)
A) information policy.
B) data definition file.
C) data quality audit.
D) data governance policy.
Answer: A Page Ref: 231
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called
A) data auditing.
B) defragmentation.
C) data scrubbing.
D) data optimization.
Answer: C Page Ref: 234
Data cleansing not only corrects errors but also
A) establishes logical relationships between data.
B) structures data.
C) normalizes data.
D) enforces consistency among different sets of data.
Answer: D Page Ref: 234
Which of the following is NOT a method for performing a data quality audit?
A) surveying entire data files
B) surveying samples from data files
C) surveying data definition and query files
D) surveying end users about their perceptions of data quality
Answer: C
Page Ref: 234
Increasingly, voice, video, and data communications are all based on Internet technology.
Answer: TRUE
Page Ref: 249
A protocol is a standard set of rules and procedures for the control of communications in a network.
Answer: TRUE
Page Ref: 253
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
Answer: TRUE Page Ref: 254
Wi-Fi enables users to freely roam from hotspot to hotspot even if the hotspot is using different Wi-Fi network services.
Answer: FALSE Page Ref: 281
RFID has been exceptionally popular because of its low implementation costs.
Answer: FALSE
Page Ref: 283
A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a
A) hub.
B) switch.
C) router.
D) NIC.
Answer: B Page Ref: 250
The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
D) Client/server computing, packet switching, and HTTP
Answer: C Page Ref: 252
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
A) multiplexing.
B) packet switching.
C) packet routing.
D) ATM.
Answer: B Page Ref: 252
The telephone system is an example of a ________ network. A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
Answer: D
Page Ref: 252
In TCP/IP, IP is responsible for
A) disassembling and reassembling of packets during transmission.
B) establishing an Internet connection between two computers.
C) moving packets over the network.
D) sequencing the transfer of packets.
Answer: A Page Ref: 253
The four layers of the TCP/IP reference model are
A) physical layer, application layer, transport layer, and the network interface layer.
B) physical layer, application layer, Internet layer, and the network interface layer.
C) application layer, transport layer, Internet layer, and the network interface layer.
D) application layer, hardware layer, Internet layer, and the network interface layer.
Answer: C
Page Ref: 253-254
Bandwidth is the
A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
D) total number of bytes that can be sent through a medium per second.
Answer: C Page Ref: 259
Which protocol is the Internet based on?
A) TCP/IP
B) FTP
C) packet-switching
D) HTTP
Answer: A
Page Ref: 260
What service converts IP addresses into more recognizable alphanumeric names? A) HTML
B) DNS
C) IP
D) HTTP
Answer: B
Page Ref: 260
IPv6 is being developed in order to
A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
Answer: B Page Ref: 265
Instant messaging is a type of ________ service. A) chat
B) cellular
C) Web
D) wireless
Answer: A
Page Ref: 267
The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies
A) cannot restrict Internet use.
B) need specialized software to determine which types of material are acceptable.
C) may need to maintain a database of acceptable Web sites.
D) need to base their Internet use policies on the needs of the organization and culture.
Answer: D
Page Ref: 268-269
________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Unified communications
Answer: D Page Ref: 270
A VPN
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
Answer: A Page Ref: 270
Web browser software requests Web pages from the Internet using which protocol? A) URL
B) HTTP
C) DNS
D) HTML
Answer: B Page Ref: 271
To keep internal data secure, a company employing an extranet must be sure to put a ________ in place
A) router
B) server
C) firewall
D) switch
Answer: C
Page Ref: 277
The business advantages of using voice over IP (VoIP) technology include all the following except?
A) Business can lower costs by using the Internet to deliver voice information
B)VOIP is faster and more secure
C) VOIP enables communication by supporting Internet conference calls using video.
D)VOIP also provides flexibility - phones can be added or moved to different offices without ewiring or reconfiguring the network.
Answer: B
Page Ref: 267-270
The potential for unauthorized access is usually limited to the communications lines of a network.
Answer: FALSE
Page Ref: 295
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Answer: TRUE
Page Ref: 297
The range of Wi-Fi networks can be extended up to two miles by using external antennae.
Answer: FALSE
Page Ref: 297
The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.
Answer: TRUE Page Ref: 300
Viruses can be spread through e-mail.
Answer: TRUE
Page Ref: 300
omputer worms spread much more rapidly than computer viruses.
Answer: TRUE Page Ref: 300
The potential for unauthorized access is usually limited to the communications lines of a network.
Answer: FALSE
Page Ref: 295
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Answer: TRUE
Page Ref: 297
The range of Wi-Fi networks can be extended up to two miles by using external antennae.
Answer: FALSE
Page Ref: 297
The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.
Answer: TRUE Page Ref: 300
Viruses can be spread through e-mail.
Answer: TRUE
Page Ref: 300
Computer worms spread much more rapidly than computer viruses.
Answer: TRUE Page Ref: 300
Answer: TRUE Page Ref: 300
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Answer: TRUE Page Ref: 302
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Answer: TRUE Page Ref: 302
oS attacks are used to destroy information and access restricted areas of a company's information system
Answer: FALSE Page Ref: 302-303
The most economically damaging kinds of computer crime are e-mail viruses.
Answer: FALSE
Page Ref: 303
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Answer: TRUE
Page Ref: 307
An acceptable use policy defines the acceptable level of access to information assets for different users.
Answer: FALSE Page Ref: 312
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
Answer: FALSE Page Ref: 316
Packet filtering catches most types of network attacks.
Answer: FALSE
Page Ref: 318
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
Answer: TRUE
Page Ref: 318
SSL is a protocol used to establish a secure connection between two computers.
Answer: TRUE
Page Ref: 319
Public key encryption uses two keys.
Answer: TRUE
Page Ref: 320
ault-tolerant computers contain redundant hardware, software, and power supply components.
Answer: TRUE
Page Ref: 321
High-availability computing is also referred to as fault tolerance.
Answer: FALSE
Page Ref: 321
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A
Page Ref: 295
________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operationaladherence to management standards. A) "Legacy systems"
B) "SSID standards"
C) "Vulnerabilities"
D) "Controls"
Answer: D
Page Ref: 295
Large amounts of data stored in electronic form are ________ than the same data in manual form. A) less vulnerable to damage
B) more secure
C) vulnerable to many more kinds of threats
D) more critical to most businesses
Answer: C
Page Ref: 295
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.
B) are not secure because the technology to secure them did not exist at the time the files were created. C) have the potential to be accessed by large numbers of people and by groups outside of the organization.
D) are frequently available on the Internet.
Answer: C
Page Ref: 295-296
Specific security challenges that threaten the communications lines in a client/server environment include A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or software failure.
D) unauthorized access; errors; spyware.
Answer: A
Page Ref: 295
Specific security challenges that threaten clients in a client/server environment include A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or software failure.
D) unauthorized access; errors; spyware.
Answer: D
Page Ref: 295
Specific security challenges that threaten corporate servers in a client/server environment include
A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or software failure.
D) unauthorized access; errors; spyware.
Answer: B
Page Ref: 295
The Internet poses specific security problems because A) it was designed to be easily accessible.
B) everyone uses the Internet.
C) Internet standards are universal.
D) it changes so rapidly.
Answer: A Page Ref: 296
The main security problem on the Internet is A) radiation.
B) bandwidth theft.
C) hackers.
D) natural disasters, such as floods and fires.
Answer: C
Page Ref: 296-297
An independent computer program that copies itself from one computer to another over a network is called a
A) worm.
B) Trojan horse.
C) bug.
D) pest.
Answer: A Page Ref: 300
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
A) Trojan horse
B) virus
C) worm
D) spyware
1
Answer: A Page Ref: 301
Redirecting a Web link to a different address is a form of A) snooping.
B) spoofing.
C) sniffing.
D) war driving.
Answer: B
Page Ref: 302
A key logger is a type of A) worm.
B) Trojan horse.
C) virus.
D) spyware.
Answer: D
Page Ref: 302
How do hackers create a botnet?
A) by infecting Web search bots with malware
B) by using Web search bots to infect other computers
C) by causing other people's computers to become "zombie" PCs following a master computer
D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door
Answer: C Page Ref: 303
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack
A) DDoS
B) DoS
C) pharming
D) phishing
A) DDoS
B) DoS
C) pharming
D) phishing
Which of the following is NOT an example of a computer used as a target of crime? A) knowingly accessing a protected computer to commit fraud
B) accessing a computer system without authority
C) illegally accessing stored electronic communication
D) threatening to cause damage to a protected computer
Answer: C
Which of the following is NOT an example of a computer used as an instrument of crime? A) theft of trade secrets
B) intentionally attempting to intercept electronic communication
C) unauthorized copying of software
D) breaching the confidentiality of protected computerized data
Answer: D
Page Ref: 304
Phishing is a form of A) spoofing.
B) spinning.
C) snooping.
D) sniffing.
Answer: A
Page Ref: 304
Phishing involves
A) setting up bogus Wi-Fi hot spots.
B) setting up fake Web sites to ask users for confidential information.
C) pretending to be a legitimate business's representative in order to garner information about a security system.
D) using e-mails for threats or harassment.
Answer: B Page Ref: 304
Pharming involves
A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake Web sites to ask users for confidential information.
D) using e-mails for threats or harassment.
Answer: A Page Ref: 305
You have been hired as a security consultant for a legal firm. Which of the following constitutes the greatest threat, in terms of security, to the firm?
A) wireless network
B) employees
C) authentication procedures
D) lack of data encryption
Answer: B
Page Ref: 306
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
A) sniffing
B) social engineering
C) phishing
D) pharming
Answer: B Page Ref: 306
How do software vendors correct flaws in their software after it has been distributed? A) issue bug fixes
B) issue patches
C) re-release software
D) issue updated versions
Answer: B
Page Ref: 307
The Sarbanes-Oxley Act
A) requires financial institutions to ensure the security of customer data.
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information.
D) outlines medical security and privacy rules.
answer: C Page Ref: 309
The most common type of electronic evidence is
A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.
Answer: D
Page Ref: 309
Electronic evidence on computer storage media that is not visible to the average user is called ________ data.
A) defragmented
B) ambient
C) forensic
D) recovery
Answer: B Page Ref: 310
Application controls
A) can be classified as input controls, processing controls, and output controls.
B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
D) include software controls, computer operations controls, and implementation controls.
Answer: A Page Ref: 310
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
A) Software
B) Administrative
C) Data security
D) Implementation
Answer: C Page Ref: 311
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
Answer: C Page Ref: 311
Statements ranking information risks and identifying security goals are included in a(n) A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
Answer: A
Page Ref: 311
An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n)
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
Answer: D Page Ref: 314
Statements ranking information risks and identifying security goals are included in a(n) A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
Answer: A
Page Ref: 311
An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n)
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
Answer: D Page Ref: 314
Rigorous password systems
A) are one of the most effective security tools. B) may hinder employee productivity.
C) are costly to implement.
D) are often disregarded by employees.
Answer: B Page Ref: 316
An authentication token is a(n)
A) device the size of a credit card that contains access permission data.
B) type of smart card.
C) gadget that displays passcodes.
D) electronic marker attached to a digital authorization file.
Answer: C Page Ref: 316
Biometric authentication
A) is inexpensive.
B) is used widely in Europe for security applications.
C) can use a person's face as a unique, measurable trait.
D) only uses physical traits as a measurement.
Answer: C
Page Ref: 316
A firewall allows the organization to
A) enforce a security policy on traffic between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing e-mail messages.
nswer: A Page Ref: 317
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
A) stateful inspection
B) intrusion detection system
C) application proxy filtering
D) packet filtering
Answer: A Page Ref: 318
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
Answer: B Page Ref: 318
Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) SSL, TLS, and S-HTTP.
Answer: D
Page Ref: 319
Most antivirus software is effective against
A) only those viruses active on the Internet and through e-mail.
B) any virus.
C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written.
Answer: D Page Ref: 319
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
A) SSL
B) symmetric key encryption
C) public key encryption
D) private key encryption
Answer: B Page Ref: 320
A digital certificate systemA) uses third-party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) are used primarily by individuals for personal correspondence.
Answer: A Page Ref: 320
Downtime refers to periods of time in which a
A) computer system is malfunctioning.
B) computer system is not operational.
C) corporation or organization is not operational.
D) computer is not online.
Answer: B Page Ref: 321
Online transaction processing requires A) more processing time.
B) a large server network.
C) fault-tolerant computer systems.
D) dedicated phone lines.
Answer: C
Page Ref: 321
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
A) high availability computing
B) deep-packet inspection
C) application proxy filtering
D) stateful inspection
Answer: B Page Ref: 322
The development and use of methods to make computer systems recover more quickly after mishaps is called
A) high availability computing.
B) recovery oriented computing.
C) fault tolerant computing.
D) disaster recovery planning.
Answer: B Page Ref: 322
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as ________.
Answer: war driving Page Ref: 297
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Answer: Identity theft Page Ref: 304
_______ refers to the ability to know that a person is who he or she claims to be.
Answer: Authentication
Page Ref: 316
Which if the following is not an issue of security challenges on the Internet as that issue applies to aglobal enterprise?

A: More vulnerable because they are virtually open to anyone

B: Computers that are constantly connected to the Internet via cable modem or DSL line are more open to penetration by outsiders because they use a fixed Internet address where they can be more easily identified.

C: Cable Modems are faster so hackers can get in more quickly

D:Corporate systems must be extended outside the organization so that employees working with wireless and other mobile computing devices can access them.
Answer: C
Page Ref: 295-300
Whichof the flowing is not one of the components of IT infrastructure that firms need to manage.
A:) Internet Platforms and Computer Hardware Platforms
B:) Operating Systems Platforms and Enterprise Software Applications
C:) Networking/Telecommunications and Data Management and Storage
D:)Project Management and Application Development
Answer: D (Question refers to Infrastrcture)
The ________________________________ states that the amount of digital information is roughly doubling every year.
Answer: D (Question refers to Infrastrcture)
Which of the following is not one of the management challenges posed by IT infrastructure.
A) Using Best of Breed technology
B) Coordinating infrastructure components
C) Dealing with scalability and technology change
D) Management and governance
Answer: Law of Mass Digital Storage
________________________ is the process of creating small stable data structures from complex groups of data when designing a relational database.
Answer: A
_________________________ enables Internet technology to be used for telephone voice transmission over the Internet or private networks.
Answer: Normalization
____________________ are secure, encrypted, private networks that have been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet.
Answer: Voice over Internet Protocol (VoIP)
All of the following are the common threats against contemporary information systems except: A) Technical factors
B) Organizational factors
C) Poor management decisions.
D) Government Factors
Answer: Virtual private networks
Growing use of Linux and open-source software. Open-source software is produced and maintained by a global community of programmers and is downloadable for free. Linux is a powerful, resilient open-source operating system that can run on multiple hardware platforms and is used widely to run Web servers.
Identify and describe five or more of the current trends in contemporary software platforms.
Java is an operating-system and hardware-independent programming language that is the leading interactive programming environment for the Web.
Identify and describe five or more of the current trends in contemporary software platforms.
Web services and service-oriented architecture. Software for enterprise integration includes enterprise applications and middleware such as enterprise application integration (EAI) software and Web services. Unlike EAI software, Web services are loosely coupled software components based on open Web standards that are not product-specific and can work with any application software and operating system. They can be used as components of Web-based applications linking the systems of two different organizations or to link disparate systems of a single company.
Identify and describe five or more of the current trends in contemporary software platforms.
Ajax, a new software techniques for enabling Web applications.
Identify and describe five or more of the current trends in contemporary software platforms.
Mashups, or combining Web applications to create new products.
Identify and describe five or more of the current trends in contemporary software platforms.
Widgets, small software programs that can be added to Web pages or placed on the desktop to provide additional functionality
Identify and describe five or more of the current trends in contemporary software platforms.
outside sources, including application software packages, by outsourcing custom application development to an external vendor (that may be offshore), or by renting software services from an application service provider.
Identify and describe five or more of the current trends in contemporary software platforms.