Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
150 Cards in this Set
- Front
- Back
Data becomes _____ when it is presented in a context so that it can answer a question or support decision making. 1) knowledge 2) information 3) a database 4) wisdom 5) a relational language |
information |
|
Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as: 1) market basket analysis. 2) expert systems. 3) customer churn. 4) customer segmentation. 5) vertical integration. |
market basket analysis. |
|
Why do firms need to create separate data repositories for their reporting and analytics work? 1) Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters. 2) Maintaining huge databases in-house can be a cost-sink for most firms. 3) Most organizations need to differentiate data derived in-house and from data aggregators. 4) Running analytics against transactional data can bog down a system. 5) Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team. |
Running analytics against transactional data can bog down a system. |
|
Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results. 1) True 2) False |
True |
|
_____ refers to software for creating, maintaining, and manipulating data. 1) Extranet 2) ROM 3) RAM 4) DBMS 5) Internet 2 |
DBMS |
|
_____ systems are often used to empower employees to track and record data at nearly every point of customer contact |
.Answer:Customer relationship management |
|
In database systems, a _____ defines the data that a table can hold. 1) row 2) key 3) record 4) file 5) field |
field |
|
The acronym_____ refers to a technology that is often used to tag objects and inventory items so that they can 'announce their presence' as they make their way along an organization's value chain. |
RFID |
|
_____ is by far the most popular language for creating and manipulating databases. 1) XML 2) HTML 3) PHP 4) Java 5) SQL |
SQL |
|
Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return are referred to as _____. |
Answer:transaction processing systems |
|
Knowledge is defined as: 1) raw facts and figures. 2) the data presented in a context so that it can answer a question or support decision making. 3) the insight derived from experience and expertise. 4) a listing of primary data. 5) the process of breaking a complex topic into smaller parts. |
the insight derived from experience and expertise. |
|
Turning data into useable information is hindered by transactional databases set up to be simultaneously accessed for reporting and analysis. 1) True 2) False |
False |
|
OLAP technology is primarily used for transaction processing. 1) True 2) False |
False |
|
Data obtained from outside sources, when combined with a firm's proprietary internal data assets, can give the firm a competitive edge. 1) True 2) False |
True |
|
In database systems, a _____ refers to a list of data. 1) file 2) column 3) field 4) row 5) record |
file |
|
In database terminology, a record represents: 1) a list of data, arranged in columns and rows. 2) all of the data in a given column. 3) a single instance of whatever the table keeps track of. 4) a field or combination of fields used to uniquely identify a file. 5) one or more keys that relate separate tables in a database. |
a single instance of whatever the table keeps track of. |
|
Skittish and untrusting managers should realize that the first findings of analytics always reveal an optimal course of action. 1) True 2) False |
False |
|
_____ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters. 1) Canned reports 2) Ad hoc reporting tools 3) Dashboards 4) Data cubes 5) Online analytical processing |
Ad hoc reporting tools |
|
_____ refers to a job title focused on directing, performing, or overseeing activities associated with a database or set of databases. |
(Database administrator, Database administrator (DBA), DBA) |
|
In many organizations, the majority of available data is not exploited to advantage. 1) True 2) False |
True |
|
Enterprise software tends to be less integrated and standardized than the prior era of proprietary systems that many firms developed themselves. 1) True 2) False |
False |
|
Any data-centric effort should involve input not only from business and technical staff, but from the firm's legal team, as well. 1) True 2) False |
True |
|
In database systems, a row is also known as a _____. 1) table 2) column 3) key 4) record 5) field |
record |
|
_____ is the general term used to describe the massive amount of data available to today's managers. |
Big Data |
|
In data warehousing projects, it is not uncommon for spending on consulting and services to cost five times or more than the cost of the technology itself. 1) True 2) False |
True |
|
Advantages based on capabilities and data that others can acquire are long-lived. 1) True 2) False |
False |
|
_____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis. 1) Logistics 2) Queritic modeling 3) Business intelligence 4) Electronic trading 5) Big Data |
Business intelligence |
|
_____ is the term used to describe raw facts and figures. 1) Information 2) Knowledge 3) Analytics 4) Data 5) Intelligence |
Data |
|
Data can potentially be used as a strategic asset, capable of yielding sustainable competitive advantage. Which of the items below is not a characteristic of a potentially strategic asset. 1) value 2) rarity 3) imperfect imitability 4) lead time 5) non-substitutability |
lead time |
|
A study by Gartner Research claims that the amount of data on corporate hard drives doubles every three years. 1) True 2) False |
False |
|
If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use _____. 1) transaction processing systems 2) point-of-sale terminals 3) data cubes 4) dashboards 5) loyalty cards |
loyalty cards |
|
All SQL databases are relational databases. 1) True 2) False |
True |
|
Logistics is the term that describes the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions. 1) True 2) False |
False |
|
Which of the following conditions is essential for data mining to work? 1) The data must be collected from proprietary sources and not from data aggregators. 2) The organization must leverage standard relational databases as opposed to inferior hierarchical and analytical databases. 3) The events in the data should reflect current and future trends. 4) The data mining software must necessarily incorporate ad hoc reporting tools and dashboards. 5) The data should have passed the Diehard suite of stringent tests for randomness. |
The events in the data should reflect current and future trends. |
|
Data are raw facts that must be turned into information in order to be useful and valuable. 1) True 2) False |
True |
|
In database systems, a column is also known as a key. 1) True 2) False |
False |
|
Data warehouses are composed entirely of proprietary corporate data, while data marts take advantage of data purchased from third-party firms. 1) True 2) False |
False |
|
_____ is the term used to describe some form of business exchange. |
Transaction |
|
_____ refer to databases focused on addressing the concerns of a specific problem or business unit. 1) Data marts 2) Dashboards 3) Hadoop 4) Data aggregators 5) Data analytics |
Data marts |
|
_____ are the most common standard for expressing databases, whereby tables (files) are related based on common keys. |
Relational databases |
|
One of the factors that accelerated the development of the Internet during the 1990s was: 1) the introduction of the personal computer into households. 2) the government's taking over of the Internet's operating structure from private players. 3) Intel's invention of low power processors used in portable computers. 4) the creation of the Windows and Mac OS operating systems. 5) the invention of graphical Web browsing. |
the invention of graphical Web browsing. |
|
DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas. 1) True 2) False |
True |
|
The acronym HFT refers to: 1) High Finance Telecommunications 2) High Fidelity Transmissions 3) Hedge Fund Transfers 4) High Frequency Trading 5) Hypertext File Transfer |
High Frequency Trading |
|
The phrase ________ is used by technologists to refer to delay. |
latency |
|
The language "http" is used to create and format Web pages. 1) True 2) False |
False |
|
A unit of data forwarded by a network is called a _____. |
packet, datagram |
|
One of the functions of the IP is to: 1) route message packets to the final destination. 2) slice up the message into smaller chunks of data called packets, to be sent over the network. 3) check for damaged or corrupt message packets and request for replacements, if needed. 4) label message packets with source and destination addresses. 5) rearrange message packets in the same sequence as they were sent. |
route message packets to the final destination. |
|
_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance. |
Load balancing |
|
The protocol used for exchange of mail between e-mail servers across the world is called _____. |
simple mail transfer protocol |
|
Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications. 1) True 2) False |
False |
|
The Internet has no center and no one owns it. 1) True 2) False |
True |
|
Circuit-switched networks provide connection between two parties that: 1) uses a single router for each individual on either end of the connection. 2) is dedicated for use by the parties for the duration of a connection. 3) repeatedly switches between an open and closed state depending on whether someone is speaking or other noise is being transmitted during a call. 4) slices up the conversation into smaller chunks and transmitting them over a shared circuit that mixes content with other callers but routes and reassembles a call to the correct recipient. 5) prioritizes voice calls over other connections on IP networks. |
is dedicated for use by the parties for the duration of a connection. |
|
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: 1) assigning IP addresses to different domain names. 2) mapping host names to domain names. 3) creating IP addresses that are unique to servers. 4) assigning domain names to different IP addresses. 5) mapping host and domain names to IP addresses of computers. |
mapping host and domain names to IP addresses of computers. |
|
Which of the following is true of the term Internet backbone? 1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. 2) It refers to broadband service provided direct to a home or business using light-transmitting fiber-optic cables. 3) It refers to the collection of standards used to support all Internet services. 4) It refers to government-provided open spectrum that enables Internet use for all. 5) It refers to a government-run system supported by telecommunication taxes, which connects end users to the Internet. |
It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. |
|
The address one types into a Web browser is also known as a: 1) universal redirection link. 2) uniform resource locator. 3) unique resource locator. 4) universal redirection locator. 5) uniform resource link. |
uniform resource locator. |
|
Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors. 1) True 2) False |
True |
|
The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request. 1) cybersquatting 2) phishing 3) an online imposture 4) cache poisoning 5) a distributed denial of request |
cache poisoning |
|
_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference. 1) Optical fiber cable 2) Coaxial cable 3) Ribbon cable 4) FTTH cable 5) Amdahl cable |
Coaxial cable |
|
A firm that provides hardware and services to run Web sites of others is known as a(n) _____. 1) Web site incubator 2) Internet service facilitator 3) Web domain name registrar 4) Web hosting service 5) Internet Web fab |
Web hosting service |
|
Routers don't have perfect, end-to-end information on all points in the Internet. 1) True 2) False |
True |
|
TCP and IP operate above http and the other application transfer protocols. 1) True 2) False |
False |
|
The Internet Protocol Suite consists of the Internet Protocol and _____. 1) File Transfer Protocol 2) Simple Mail Transfer Protocol 3) Session Initiation Protocol 4) Datagram Congestion Control Protocol 5) Transmission Control Protocol |
Transmission Control Protocol |
|
In the URL, the host name is the name of the network a user tries to connect to. 1) True 2) False |
False |
|
The fault-tolerant nature of the DNS ensures that: 1) if users can't reach a host computer, they are redirected back to the previous page. 2) mistyped or misspelled Web addresses are automatically corrected. 3) if a document or file can't be accessed, it won't result in a 404 error. 4) the service continues functioning even if one nameserver goes down. 5) mismatched host names and domain names are still assigned with the correct IP address. |
the service continues functioning even if one nameserver goes down. |
|
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received? 1) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets 2) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order 3) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets 4) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets 5) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets |
Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order |
|
One of the disadvantages of cable technology is that: 1) it is more expensive than other signal-carrying systems. 2) while it works well for television signals, it is ineffective for data transmissions required by the Internet. 3) systems used by many providers require customers to share bandwidth with neighbors. 4) it is incompatible with most modern communication systems. 5) the speed of the connection rises in conjunction with the distance between the end customers from the central hub. |
systems used by many providers require customers to share bandwidth with neighbors. |
|
IP addresses can oftentimes be used to identify a user's geographic location. 1) True 2) False |
True |
|
Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name. 1) True 2) False |
False |
|
Popular sites like Google and Yahoo! have several computers assigned to their host names because: 1) they have operations in different countries. 2) they are registered under several generic top-level domain names. 3) of the different devices used to access these web sites. 4) hoarding all information in one server is expensive. 5) it ensures that the load of requests to their sites do not overwhelm a single computer. |
it ensures that the load of requests to their sites do not overwhelm a single computer. |
|
A Web address without a file name will load content from a default page. 1) True 2) False |
True |
|
Computer programs making decisions without any human intervention conduct most U.S. stock trading. 1) True 2) False |
True |
|
Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. 1) True 2) False |
True |
|
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name. 1) True 2) False |
True |
|
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. 1) True 2) False |
False |
|
"Html" is used to: 1) load content from a default page. 2) create and format Web pages. 3) generate custom content for users. 4) exchange mail with other e-mail servers. 5) transfer files from flash drives. |
create and format Web pages. |
|
A device gets its IP address from whichever organization is currently connecting it to the Internet. 1) True 2) False |
True |
|
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail. 1) Voice precedence 2) Data rationing 3) Right-of-way for voice 4) Information queuing 5) Packet prioritization |
Packet prioritization |
|
A(n) _____ is a temporary storage space used to speed computing tasks. 1) cache 2) IP address 3) Protocol 4) domain name service 5) hypertext markup language |
cache |
|
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. 1) True 2) False |
False |
|
_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems. |
Internet Corporation for Assigned Names and Numbers (ICANN) |
|
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks. |
Answer:distributed denial of service |
|
Which of the following statements holds true for the term encryption? 1) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. 2) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. 3) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. 4) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. 5) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner. |
It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. |
|
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures. 1) True 2) False |
True |
|
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach? 1) Target had security software, but the notification alerts from the software were ignored. 2) Target had properly installed and configured its security software, but hackers got in, anyway. 3) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection. 4) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected. 5) All of the above |
Target had security software, but the notification alerts from the software were ignored. |
|
Viruses are programs that infect other software or files and require: 1) a large file size to spread. 2) the computer to be shutdown to spread. 3) Windows as an operating system to spread. 4) a disk-based operating system to spread. 5) an executable program to spread. |
an executable program to spread. |
|
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts. 1) True 2) False |
False |
|
One of the major problems with the Heartbleed bug in OpenSSL software is that: 1) the software was embedded in many hardware products that could not be easily patched with automatic software updates. 2) any password typed into a CAPTCHa could be monitored by a Van Eck device. 3) social engineers could exploit the bug through SQL injection. 4) all social media profile data was exposed, giving hackers access to the potential answers many firms ask as part of password security questions. 5) it eliminated the ability to expose a URL's desitination by hovering the cursor over an address. |
the software was embedded in many hardware products that could not be easily patched with automatic software updates. |
|
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution? 1) Lack of technology to identify the origin of a security attack 2) Non-recognition of commission of a security-related crime 3) Unwillingness of developed countries to share technical know-how with lesser-developed countries 4) Non-existent extradition agreements between two countries 5) Technological incompatibility between the two countries |
Non-existent extradition agreements between two countries |
|
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? 1) Cyber-fraud 2) Corporate espionage 3) Carrying out technology disruptions 4) Extortion 5) Illegal funds transfer |
Corporate espionage |
|
A vast majority of security breaches are not preventable and happen despite the best security practices. 1) True 2) False |
False |
|
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here? 1) Spyware 2) Malware 3) Social engineering 4) Phishing 5) Virus infections |
Phishing |
|
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC. 1) Shadow-keyboards 2) Bootloggers 3) KitRoots 4) Keyloggers 5) Adwares |
Keyloggers |
|
The information systems of several firms have been compromised by insiders that can include contract employees,cleaning staff, and temporary staffers. 1) True 2) False |
True |
|
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: 1) honeypots. 2) zombots. 3) botnets. 4) blacklists. 5) megabots. |
botnets |
|
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____. 1) novel attacks 2) first mover attacks 3) non-precedent breaches 4) zero-day exploits 5) brute force attacks |
zero-day exploits |
|
Which of these would be an example of a DDoS attack? 1) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases 2) Overloading a popular social networking site with inbound messages in order to shut down access to the site 3) Launching a targeted phishing campaign on a department of defense or other surveillance network 4) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services 5) Launching tough-to-track click-fraud efforts |
Overloading a popular social networking site with inbound messages in order to shut down access to the site |
|
Which of the following statements holds true for the term spoof? 1) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. 2) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. 3) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. 4) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. 5) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner. |
It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. |
|
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. 1) True 2) False |
True |
|
The example presented in the textbook involving Vonage and the New York Times illustrates the importance that managers: 1) instruct employees to use encryption on public wireless networks 2) train staff to select difficult-to-guess passwords 3) audit all partners and suppliers to make sure they are legitimate 4) lock employee doors to minimize the likelihood that criminals could install keyboard monitoring software or hardware 5) keep shades drawn so that Van Eck techniques cannot be used |
audit all partners and suppliers to make sure they are legitimate |
|
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network. |
VPN, virtual private networks |
|
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers. 1) True 2) False |
False |
|
The term _____ originally referred to a particularly skilled programmer. 1) data harvester 2) cracke 3) hacker 4) black hat 5) hacktivist |
hacker |
|
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated. 1) DDos 2) Rootkit 3) Keylogging 4) CAPTCHa 5) VPN |
VPN |
|
Some of the most common guidelines issued by Web sites when designing a secure password include: 1) The password should be at least eight characters long and include at least one number and other nonalphabet character. 2) The password should be short and straightforward. 3) The password should include names of family members or pets, so as to be easily remembered. 4) Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability. 5) The password should be the same as your name so as to trick the hacker. |
The password should be at least eight characters long and include at least one number and other nonalphabet character. |
|
It's bad when a firm's e-mail and password file is stolen, however the impact is mimized because user passwords set up for one system cannot be used on others. 1) True 2) False |
False |
|
_____ refers to a term that either means breaking into a computer system or a particularly clever solution. |
Hack |
|
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists. 1) True 2) False |
True |
|
Which weakness of Web sites to launch attacks does an SQL injection technique exploit? 1) Sloppy programming practices where software developers do not validate user input 2) Lack of in-built anti-virus features 3) Irregular auditing of Web site content 4) Ease of infiltrating the Web site 5) Non-employment of encryption techniques |
Sloppy programming practices where software developers do not validate user input |
|
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____. 1) activist 2) cyber agitator 3) hacktivist 4) ethical hacker 5) cybersquatter |
hacktivist |
|
Which of the following is a valid statement on information security? 1) Security breaches cannot be prevented despite the adoption of the best security policies. 2) Technology lapses are solely responsible for almost all security breaches. 3) Information security is everybody's responsibility. 4) Greater expenditure on security products is the only way to contain security breaches. 5) A reactive, rather than proactive, approach is better suited for dealing with security breaches. |
Information security is everybody's responsibility. |
|
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges. |
Stuxnet |
|
Which of the following are considered sources of information that can potentially be used by social engineers? 1) LinkedIn 2) Corporate directories 3) Social media posts 4) Contests or surveys 5) All of the above |
All of the above |
|
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on. 1) True 2) False |
2) False |
|
In public-key encryption systems, the functions of the public and private keys are interchangeable. 1) True 2) False |
False |
|
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____. |
biometrics |
|
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called: 1) rootkits. 2) trojans. 3) viruses. 4) worms. 5) honeypots. |
trojans |
|
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of: 1) keylogging. 2) shoulder surfing. 3) dumpster diving. 4) screen capture. 5) spyware. |
shoulder surfing. |
|
_____ refers to confidence scams executed through technology. |
Phishing |
|
The market for stolen data is stagnant and most hackers use stolen data like credit card numbers for personal use. 1) True 2) False |
False |
|
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination. 1) True 2) False |
True |
|
_____ refers to software for creating, maintaining, and manipulating data. 1) Extranet 2) ROM 3) RAM 4) DBMS 5) Internet 2 |
DBMS |
|
Skittish and untrusting managers should realize that the first findings of analytics always reveal an optimal course of action. 1) True 2) False |
False |
|
Knowledge is defined as: 1) raw facts and figures. 2) the data presented in a context so that it can answer a question or support decision making. 3) the insight derived from experience and expertise. 4) a listing of primary data. 5) the process of breaking a complex topic into smaller parts. |
the insight derived from experience and expertise. |
|
Firms that collect and resell data are known as: 1) data barons. 2) data mongers. 3) knowledge consultancies. 4) data miners. 5) data aggregators. |
data aggregators. |
|
_____ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business. 1) Data aggregator systems 2) Loyalty card systems 3) Legacy systems 4) Transaction systems 5) Mnemonic systems |
Legacy systems |
|
In database systems, a column is also known as a key. 1) True 2) False |
False |
|
If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use _____. 1) transaction processing systems 2) point-of-sale terminals 3) data cubes 4) dashboards 5) loyalty cards |
loyalty cards |
|
_____ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters. 1) Canned reports 2) Ad hoc reporting tools 3) Dashboards 4) Data cubes 5) Online analytical processing |
Ad hoc reporting tools |
|
_____ is the general term used to describe the massive amount of data available to today's managers. |
Big data |
|
_____ is a language used to create and manipulate databases. |
SQL |
|
Peering usually takes place at neutral sites called _____. 1) https 2) IPs 3) ISPs 4) IXPs 5) STPs |
IXPs |
|
Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. 1) True 2) False |
True |
|
A technique known as _____ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses. |
Network Address Translation (NAT) |
|
Peering refers to: 1) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. 2) the broadband service provided via light-transmitting fiber-optic cables. 3) the language used to compose Web pages. 4) a situation when separate ISPs connect their networking equipment together to share traffic. 5) a system that connects end users to the Internet. |
a situation when separate ISPs connect their networking equipment together to share traffic. |
|
Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications. 1) True 2) False |
False |
|
A(n) _____ is a temporary storage space used to speed computing tasks. 1) cache 2) IP address 3) Protocol 4) domain name service 5) hypertext markup language |
cache |
|
The Internet Protocol Suite consists of the Internet Protocol and _____. 1) File Transfer Protocol 2) Simple Mail Transfer Protocol 3) Session Initiation Protocol 4) Datagram Congestion Control Protoco 5) Transmission Control Protocol |
Transmission Control Protocol |
|
One of the functions of the IP is to: 1) route message packets to the final destination. 2) slice up the message into smaller chunks of data called packets, to be sent over the network. 3) check for damaged or corrupt message packets and request for replacements, if needed. 4) label message packets with source and destination addresses. 5) rearrange message packets in the same sequence as they were sent. |
route message packets to the final destination. |
|
A(n) _____ is a computing device that connects networks and exchanges data between them. |
router |
|
One of the factors that accelerated the development of the Internet during the 1990s was: 1) the introduction of the personal computer into households. 2) the government's taking over of the Internet's operating structure from private players. 3) Intel's invention of low power processors used in portable computers. 4) the creation of the Windows and Mac OS operating systems. 5) the invention of graphical Web browsing. |
the invention of graphical Web browsing. |
|
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists. 1) True 2) False |
True |
|
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. 1) overlamination processes 2) biometrics 3) smart tags 4) bio-embedded systems 5) holographs |
biometrics |
|
Which of these would be an example of a DDoS attack? 1) An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases 2) Overloading a popular social networking site with inbound messages in order to shut down access to the site 3) Launching a targeted phishing campaign on a department of defense or other surveillance network 4) Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services 5) Launching tough-to-track click-fraud efforts |
Overloading a popular social networking site with inbound messages in order to shut down access to the site |
|
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs. 1) True 2) False |
False |
|
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because: 1) some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities. 2) the cost to include government surveillance technology inside their products is expensive and lowers profits compared to rivals. 3) the government-required installations of software, such as Stuxnet, that U.S. tech firms must comply with inevitably take up valuable storage space, adding cost to industrial and commercial products. 4) the cost to house government workers on-site is a burden private corporations should not have to shoulder. 5) firms in foreign governments are directly contracted to perform surveillance, and are compensated for their efforts with perks and tax breaks, while U.S. firms receive no such compensation. |
some customers have begun seeking alternative products and services untarnished by the perception of having (complicity or unwittingly) provided private information to authorities. |
|
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? 1) Cyber-fraud 2) Corporate espionage 3) Carrying out technology disruptions 4) Extortion 5) Illegal funds transfer |
Corporate espionage |
|
In public-key encryption systems, the functions of the public and private keys are interchangeable. 1) True 2) False |
False |
|
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____. |
biometrics |
|
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in. 1) True 2) False |
False |
|
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach? 1) Target had security software, but the notification alerts from the software were ignored. 2) Target had properly installed and configured its security software, but hackers got in, anyway. 3) Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection. 4) Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected. 5) All of the above |
Target had security software, but the notification alerts from the software were ignored. |