Exam 3

Question 1 of 20
5.0 Points
______is the operating system of choice for Web servers, embedded system, and supercomputers alike.
A. Tux
B. Pengu-ware
C. Linux
D. Unix Reset Selection
Mark for Review What's This?
Question 2 of 20
5.0 Points
When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use?
A. Pause transaction processing while analytical processing is occurring.
B. Only allow transaction processing during off-peak hours.
C. Replicate all transactions on a second database server and run analytical processing off of the second server.
D. None of the above Reset Selection
Mark for Review What's This?
Question 3 of 20
5.0 Points
Which of the following is NOT considered a core business process?
A. Manufacture goods
B. Hire employees
C. Sell products
D. Provide service Reset Selection
Mark for Review What's This?
Question 4 of 20
5.0 Points
Software asset management includes all of the following EXCEPT:
A. performing a software inventory.
B. matching installed software with licenses.
C. creating a software asset management plan.
D. All of these are part of software asset management. Reset Selection
Mark for Review What's This?
Question 5 of 20
5.0 Points
The Windows Update Service is an example of a ______system.
A. bug-fixing
B. patch management
C. software asset management
D. online help and repair Reset Selection
Mark for Review What's This?
Question 6 of 20
5.0 Points
______is a set of best practices that help organizations maximize the benefits from their information systems infrastructure while at the same time establishing appropriate controls.
A. CMMS
B. CAAT
C. S-OX
D. COBIT Reset Selection
Mark for Review What's This?
Question 7 of 20
5.0 Points
Systems for gaining business intelligence ______data in order to better manage the organization.
A. gather
B. process and analyze
C. store
D. All of the above Reset Selection
Mark for Review What's This?
Question 8 of 20
5.0 Points
______can increase the reliability of an organization’s information systems infrastructure.
A. On-demand computing
B. Grid computing
C. Autonomic computing
D. Pay-per-use computing Reset Selection
Mark for Review What's This?
Question 9 of 20
5.0 Points
Graphical software tools that provide complex analysis of stored data are:
A. OLTP.
B. OLAP.
C. OLST.
D. OLIP. Reset Selection
Mark for Review What's This?
Question 10 of 20
5.0 Points
______is the use of the Internet Protocol for transporting voice, video, fax, and data traffic.
A. IP conveyance
B. IP integration
C. IP communication
D. IP convergence Reset Selection
Mark for Review What's This?
Question 11 of 20
5.0 Points
Systems designed to perform specific, predefined tasks such as a digital video recorder (TiVo) or a network router are referred to as ______systems.
A. integrated
B. specific
C. embedded
D. special-purpose Reset Selection
Mark for Review What's This?
Question 12 of 20
5.0 Points
A ______backup site is a backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else.
A. hot
B. cold
C. empty
D. dormant Reset Selection
Mark for Review What's This?
Question 13 of 20
5.0 Points
Application service providers offer:
A. on-demand computing.
B. on-demand software.
C. utility computing.
D. utility software. Reset Selection

Mark for Review What's This?
Question 14 of 20
5.0 Points
In a ______grid, the computers are just there to perform the grid’s computing tasks.
A. homogeneous
B. dedicated
C. pure
D. uniform Reset Selection
Mark for Review What's This?
Question 15 of 20
5.0 Points
A(n) ______ASP offers services for small businesses within a limited geographical area.
A. specialist or functional
B. vertical market
C. enterprise
D. local Reset Selection
Mark for Review What's This?
Question 16 of 20
5.0 Points
An autonomic computing system must know its:
A. configuration.
B. capacity.
C. current status.
D. All of the above Reset Selection
Mark for Review What's This?
Question 17 of 20
5.0 Points
The Linux operating system is an example of:
A. public domain software.
B. nonprotective open source software.
C. protective open source software.
D. proprietary software. Reset Selection
Mark for Review What's This?
Question 18 of 20
5.0 Points
A ______is a facility in which businesses can rent space for servers or other information systems equipment.
A. collocation facility
B. server room
C. data warehouse
D. server warehouse Reset Selection
Mark for Review What's This?
Question 19 of 20
5.0 Points
______refers to the use of Internet technologies for placing telephone calls.
A. VoIP
B. IPT
C. IPP
D. PoIP Reset Selection
Mark for Review What's This?
Question 20 of 20
5.0 Points
______are controls helping to ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.
A. Information systems controls
B. Audit controls
C. Infrastructure controls
D. Access controls Reset Selection

Exam 5

1. Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are ______viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command
2. According to the CSI/FBI Cyber Crime Survey, ______of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
3. ______invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
4. Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
5. One common way to gain access to a password-protected system is to use a ______approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
6. Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
7. A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
8. The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
9. ______is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
10. Encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
11. The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
12. ______are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
13. The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
14. A(n) ______is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
15. Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
16. ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
17. To execute denial of service attacks, intruders often use ______computers.
A. zombie
B. monster
C. robot
D. android
18. Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
19. Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
20. Some spam e-mail includes ______, which are attempts to trick financial account and credit card holders into giving away their authorization information.
A. freaking
B. tricking
C. phishing
D. luring