Shared Flashcard Set

Details

MIS test 3
ch. 8,9,10
202
Management
Undergraduate 2
04/16/2013

Additional Management Flashcards

 


 

Cards

Term

The term ________ is commonly used to refer to a collection of companies and processes involved in moving a product from the suppliers of raw materials to the customer.

Definition
Supply Chain
Term

Which of the following statements about just-in-time strategies is true?


Definition

Companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production

Term

Altrix Corp., an Indonesian firm, recently faced an unanticipated decline in the demand for its product. This dented the company's financial strength not only through loss of sales, but also because it ended up with a substantial inventory of raw materials that the company wasn't able to use. As a result, Altrix has been rethinking its approach to inventory management. Some of its board members are suggesting that they use the just-in-time (JIT) system to avoid such situations in the future. Which of the following, if true, could undermine the argument in favor of JIT?

Definition

A) Some of the raw materials Altrix requires are perishable in nature.

Term

________ is a business model in which the suppliers to a manufacturer manage the manufacturer's

inventory levels based on preestablished service levels.

Definition

Vendor-managed inventory

Term

5) Which of the following statements about vendor-management inventory (VMI) is true?

Definition

To make VMI possible, the manufacturer allows the supplier to monitor stock levels and ongoing sales data.

Term

One major problem affecting supply chains are ripple effects referred to as the ________.

Definition

bullwhip effect

Term

 

 Computer maker, Dell, realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of electronics components. Dell now keeps only about two hours of inventory in its factories. The company is most likely using a ________.

Definition

just-in-time inventory management system

Term

MaxSteel Inc., has been supplying steel to a well known car manufacturer, Agis Corp., for the past 3 years. Concerned employees at Max can directly access Agis Corp.'s inventory and sales information via electronic data interchange.This allows MaxSteel to monitor Agis Corp.'s inventory levels on a real-time basis. The system has worked well for both companies so far and there has never been any delay in the supply of steel. Which of the following, if true, would most strengthen Agis' supply chain strategy?

Definition

Agis Corp., is taking measures to add wholesalers and retailers into their supply chain.

Term

9) Fen-phen was an anti-obesity medication that consisted of two drugs: fenfluramine and phentermine. Fenfluramine was initially marketed by American Home Products, but was shown to cause potentially fatal pulmonary hypertension and heart valve problems. This eventually led to the withdrawal of the drug and legal damages of over $13 billion. This is an example of

Definition

a product recall

Term

La Belle Inc. introduced a new line of accessories for teenaged girls last season. Following its immense popularity with the targeted group, the company anticipated high sales this season. It ordered raw materials accordingly, and even ensured that they had sufficient inventory to meet excess demand, if any. However, the success of the new line turned out to be a fad, as the teens soon turned to other products offered by competing brands, and La Belle's sales declined. This caused a huge discrepancy in the amount of raw materials they needed and the amount of inventory they had piled up in anticipation of good sales. This is an example of ________.

Definition

the bullwhip effect

Term

Which of the following is the main objective of information systems that focus on improving supply

 chains?

Definition

accelerating product development and innovation

Term

Which of the following is the key use of distribution planning module of supply chain management?

Definition

to optimize the allocation of available supply to meet demand

Term

The key use of order promising module of supply chain management is to ________.

Definition

work with partners across the supply network to improve accuracy of demand forecasts, reduce

inventory buffers, and improve customer service

Term

The key use of manufacturing execution module of supply chain management is to ________.

Definition

support production processes taking into account capacity and material constraints

Term

________ involves the development of various resource plans to support the efficient and effective production of goods and services.

Definition

Supply chain planning

Term

Supply chain planning begins with ________.

Definition

product demand planning and forecasting

Term

Demand planning and forecasting leads to the development of the overall ________.

Definition

D) expected demand

Term

________ focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection.

Definition

Distribution planning

Term

Distribution planning leads to the development of the overall ________.

Definition

transportation schedule

Term

Production scheduling ________.

Definition

focuses on the coordination of all activities needed to create the product or service

Term

Using analytical tools to optimally utilize labor, materials, and equipment is a part of the ________ step of supply chain planning.

Definition

B) production scheduling

Term

Inventory and safety stock planning ________.

Definition

focuses on the development of inventory estimates

Term

Inventory and safety stock planning leads to the development of a(n) ________.

Definition

sourcing plan

Term

 

Supply chain execution ________.


Definition

 

involves the management of information flow

Term

Which of the following statements is true about product flow, a key element of supply chain?

Definition

It refers to the movement of goods from the supplier to production, from production to distribution, and from distribution to the consumer.

Term

Which of the following statements is true about information flow, a key element of supply chain

execution?

Definition

The key element to the information flow is the complete removal of paper documents.

Term

Which of the following key elements of a supply chain includes information related to payment schedules, consignment, and ownership of products and materials?

Definition

financial flow

Term

________ refers not only to the ability to track products as they move through the supply chain but also to foresee external events.

Definition

Supply chain visibility

Term

) ________ refers to the use of key performance indicators to monitor performance of the entire supply chain, including sourcing, planning, production, and distribution.

Definition

Supply chain analytics

Term

________ is the extent to which a company's supply chain is focusing on minimizing procurement, production, and transportation costs, sometimes by sacrificing excellent customer service.

Definition

Supply chain efficiency

Term

________ is the extent to which a company's supply chain is focusing on maximizing customer service regardless of procurement, production, and transportation costs.

Definition

Supply chain effectiveness

Term

Which of the following is an example of supply chain efficiency?

Definition

Apple sources its raw materials in a way to keep costs low.

Term

 

________ is a data presentation standard first specified by the World Wide Web Consortium, an international consortium of companies whose purpose is to develop open standards for the Web.

Definition

 

Extensible Markup Language

Term

 

________ allow(s) designers of Web documents to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations.

Definition

Extensible Markup Language

Term

Which of the following statements is true about XML?

Definition

XML instructs systems as to how information should be interpreted and used.

Term

________ is an XML-based specification for publishing financial information.

Definition

Extensible Business Reporting Language

Term

________ includes tags for data such as annual and quarterly reports, Securities and Exchange Commission filings, general ledger information, and net revenue and accounting schedules.

Definition

Extensible Business Reporting Language

Term

Lee's department store uses the every day low prices strategy. This strategy hinges upon the store's ability to obtain consumer goods at the cheapest possible price and pass these savings on to consumers. Lee's store also developed its own distribution network for supplying its retail outlets with consumer goods. This distribution network allowed them to cut out external suppliers and middlemen, further driving down business costs. This implies that the competitive strategy used by this store would most likely focus on ________.

Definition

supply chain efficiency

Term

Comptel, a world leader in computer hardware, differentiates itself from its customers by providing excellent after-sales service. This implies that the competitive strategy used by Comptel would most likely focus on ________.

Definition

supply chain effectiveness

Term

________ uses the electromagnetic energy to transmit information between a reader (transceiver) and a processing device.

Definition

Radio frequency identification

Term

________ can be used just about anywhere a unique identification system might be needed, such as on clothing, pets, cars, keys, missiles, or manufactured parts.

Definition

RFID tags

Term

Which of the following statements is true about RFID systems?

Definition

RFID scanning can be done at greater distances than bar code scanning.

Term

 Which of the following statements about an RFID passive tag is true?

Definition

They are small and inexpensive

Term

Which of the following statements about an RFID active tag is true?

Definition

They have an internal battery source.

Term

Which of the following is a main objective of customer relationship management applications focusing on downstream information flows?

Definition

to portray a positive corporate image

Term

Which of the following portrays the individualized service benefit of a CRM system?

Definition

Learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively.

Term

47) Which of the following rightly explains improved product development on using a CRM system?

Definition

Tracking customer behavior over time that helps to identify future opportunities for product and service offerings.

Term

Which of the following examples portray the 24/7/365 operation of a CRM system?

Definition

Web-based interfaces that provide product information, sales status, support information, issue

tracking, and so on.

Term

Which of the following rightly explains improved planning on using a CRM system?

Definition

Providing mechanisms for managing and scheduling sales follow-ups to assess satisfaction, repurchase probabilities, time frames, and frequencies.

Term

________ includes the systems used to enable customer interaction and service.

Definition

Operational CRM

Term

________ help create the mass e-mail marketing campaigns wherein each consumer receives an individualized e-mail based on their prior purchase history.

Definition

Operational CRM systems

Term

Which of the following is a component of the operational CRM system?

Definition

sales force automation

Term

Which of the following is a component of the analytical CRM system?

Definition

data mining and visualization

Term

Which of the following is a component of the collaborative CRM system?

Definition

technologies to facilitate communication

Term

________ is the first component of an operational customer relationship management that supports a broad range of business processes, including account and contact management, territory management, and order processing and tracking.

Definition

Customer service and support

Term

Which of the following best explains improved morale of sales personnel due to sales force management systems?

Definition

Customer contact information being recorded using e-forms that automatically provide known customer data.

Term

________ refers to systems that automate complaints, product returns, and information requests, among others.

Definition

Customer service and support

Term

Which of the following advantages accruing to sales personnel can be attributed to sales force management?

Definition

improved scheduling

Term

Which of the following best explains improved information for sales managers on account of sales force management systems?

Definition

sales performance data automatically tabulated and presented in easy-to-understand tables, charts, and graphs

Term

________ refers to using multiple communication channels to support the communication preferences of users, such as the Web, the company's Facebook page, industry blogs, telephone and so on.

Definition

Enterprise marketing management

Term

________ tools help a company in the execution of the CRM strategy by improving the management of promotional campaigns.

Definition

Enterprise marketing management

Term

________ focuses on studying customer behavior and perceptions in order to provide the business intelligence necessary to identify new opportunities and to provide superior customer service

Definition

Analytical CRM

Term

Organizations that effectively utilize ________ can more easily customize marketing campaigns from the segment level to even the individual customer.

Definition

analytical CRM

Term

Which of the following business processes can be enhanced by the analytical CRM system?

Definition

price, quality, and satisfaction analysis of competitors

Term

________ refers to systems for providing effective and efficient communication with the customer from the entire organization.

Definition

Collaborative CRM

Term

________ facilitate the sharing of information across the various departments of an organization in order to increase customer satisfaction and loyalty.

Definition

Collaborative CRM systems

Term

Which of the following statements best describes the productivity paradox for technology investment?


Definition

While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.

Term

System efficiency is the extent to which a system ________.


Definition

enables people to do things faster or at lower cost

Term

Which of the following is true for system effectiveness?

Definition

It is the extent to which a system enables the firm to accomplish goals well.

Term

Which of the following scenarios demonstrates system efficiency?

Definition

The new information system at Barker's helped employees work faster, with less effort.

Term

BelAir Tech replaced its outdated information system with a newer version. As a result, its employees reported a significant increase in work speed. Which of the following is most similar to BelAir's situation?

Definition

At Sterling Inc, the average number of application forms processed in an hour rose from 4 to 6 as a result of the new system.

Term

B&Z Inc. implemented a new information system two months ago but there have been no concrete increases in productivity as a result of the system. A similar system has been in place at the company headquarters for the past two years, and this system has resulted in significant, quantifiable benefits. Which of the following reasons is the most likely explanation for the lack of results?


Definition

It can take years from the first implementation of this new system before the magnitude of benefits is felt by the organization.

Term

Business case arguments based on ________ focus on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on.

Definition

faith

Term

Business case arguments based on fear are based on ________.

Definition

the notion that if the system is not implemented, the firm will lose out to the competition or go out of business

Term

Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ________.

Definition

facts

Term

Which of the following is an example of a business case argument based on fear?

Definition

If we do not implement this system, our competitors could gain a significant advantage over us.

Term

The total cost of ownership of a system refers to ________.

Definition

the total cost of acquisition and all costs associated with use and maintenance of a system

Term

Which of the following is an example of a recurring cost associated with an information system?

Definition

employee salaries

Term

Which of the following is an example of an intangible cost for a system?

Definition

cost of losing customers

Term

BelAir Tech is conducting a cost-benefit analysis for its IS department. In this, the salary of an employee is an example of a(n) ________.

Definition

tangible and recurring cost

Term

Which of the following is true for tangible costs?

Definition

They are relatively easy to quantify.

Term

BelAir Tech implements a new information system and sees a 5 percent increase in monthly sales after implementation. This is a(n) ________ of the system.

Definition

) tangible benefit

Term

"Increased customer reach of the new Web-based system will result in at least a modest increase in sales." This statement represents ________ for the company.

Definition

an intangible benefit

Term

Which of the following is an example of an intangible benefit for a firm?

Definition

improved customer perceptions of the firm

Term

A break-even analysis ________.

Definition

identifies at what point tangible benefits equal tangible costs

Term

A method for deciding among different IS investments or when considering alternative designs for a given system is ________.

Definition

weighted multicriteria analysis

Term

________ are alternative measures of outcomes that can help clarify what the impact of a change will be for a firm.

Definition

Proxy variables

Term

Which of the following is the main advantage of customizable software over off-the-shelf software?

Definition

problem specificity

Term

The first phase of the systems development life cycle is ________.

Definition

systems planning and selection

Term

During the first phase of the systems development life cycle, organizations ________.

Definition

identify, plan, and select a development project from all possible projects that could be performed

Term

The final phase of the systems development life cycle is ________.

Definition

systems maintenance

Term

Requirements collection takes place during the ________ phase of the systems development life cycle.

Definition

systems analysis

Term

________ is the process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how a proposed information system should function.

Definition

Requirements collection

Term

 ________ is a group meeting-based process for requirements collection.

Definition

Joint application design

Term

) ________ represent(s) the movement of data through an organization or within an information system.

Definition

Data flows

Term

________ represents the way in which data are transformed.

Definition

Processing logic

Term

Processing logic is often expressed in ________, which is independent of the actual programming language being used.

Definition

pseudocode

Term

After systems analysis, the next phase in the systems development life cycle is ________.

Definition

systems design

Term

In an information system, a ________ is the point of contact between a system and users.

Definition

human–computer interface

Term

A ________ is a business document containing some predefined data, often including some areas where additional data can be filled in.

Definition

form

Term

A ________ is a business document containing only predefined data for online viewing or printing.

Definition

report

Term

The processing and logic operations of an information system refer(s) to ________.

Definition

the procedures that transform raw data inputs into new or modified information

Term

Software programming and testing takes place during the ________ stage of the systems development process.

Definition

systems implementation

Term

Which of the following best describes developmental testing?

Definition

testing the correctness of individual modules and the integration of multiple modules

Term

 ________ testing is testing of the overall system to see whether it meets design requirements.

Definition

Alpha

Term

 Jason has just made some changes to the information system at BelAir Tech and wants to check if the system is working correctly. He wants to conduct a beta test of the system. Which of the following should he do to achieve this?

Definition

He should ask users of the system to test it using actual data.

Term

________ testing involves testing of the capabilities of the system in the user environment with actual data.

Definition

 Beta

Term

) Developmental testing of an information system is performed by ________.

Definition

programmers

Term

________ testing is performed by actual users of the system.

Definition

Beta

Term

Which of the following can be considered beta testing?

Definition

System users at URP feed data into a new information system to test its capability.

Term

Programming is the process of ________.

Definition

transforming the system design into a working computer system

Term

 ________ is the process of decommissioning the current way of doing things and installing the new system in the organization.

Definition

System conversion

Term

Which of the following is true for patch management?

Definition

It helps in testing the correctness of individual modules and the integration of multiple modules of a system.

Term

________ use the Internet to check the software vendor's Web site for available fixes for problems. The application downloads and installs these in order to fix software flaws.

Definition

Patch management systems

Term

The process of making changes to an information system to repair flaws in design, coding, or implementation is known as ________.

Definition

corrective maintenance

Term

The process of making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment is known as ________.

Definition

adaptive maintenance

Term

Which of the following types of system maintenance involves making enhancements to improve processing performance or interface usability?

Definition

perfective maintenance

Term

Preventive maintenance of a system involves ________.

Definition

making changes to a system to reduce the chance of future system failure

Term

BelAir Tech has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?

Definition

Justin works on the system to make the user interface more user-friendly.

Term

BelAir Tech has a five-member team in charge of development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of adaptive maintenance?

Definition

Sara knows that the company is migrating to a new operating environment in the next month, and makes the appropriate changes to the system.

Term

Which of the following is true for prototyping?

Definition

It uses a trial-and-error approach for discovering how a system should operate.

Term

BelAir Tech needs a new information system to manage increasing customer orders and changing demands. The company's five-member IS team is competent and capable of developing a new system, but BelAir decides against developing a system in-house. Which of the following, if true, would most weaken BelAir's decision?

Definition

The company's IS team is short-staffed and is finding it difficult to cope with increased work.

Term

Which of the following steps takes place in an organization during both in-house systems development as well as external acquisition?

Definition

systems analysis

Term

BelAir has decided to buy an information system from an external vendor. The company has made a list of its requirements and asked prospective vendors to submit proposals for the system. Which of the following is the next step in the company's external acquisition process?

Definition

proposal evaluation

Term

 

Which of the following statements is true for a request for proposal?

Definition

It is a list of user requirements sent to prospective vendors.

Term

________ is the use of standardized performance tests to facilitate comparison between systems.


Definition

Systems benchmarking

Term

 BelAir has submitted a request for proposal to a number of vendors. It must now evaluate the proposals it has received. Which of the following methods can it use to compare the different systems?

Definition

systems benchmarking

Term

________ licenses are activated as soon as the packaging of the software has been removed.

Definition

Shrink-wrap

Term

A(n) ________ license refers to a license primarily used for downloaded software that requires computer users to choose "I accept"before installing the software.

Definition

click- wrap

Term

An enterprise license is also known as a(n) ________ license.

Definition

volume

Term

Which of the following is true for software as a service?

Definition

It allows clients to access services on an as-needed basis.

Term

 

BelAir Tech has developed and run its own information system for the past ten years. However, the company has now decided to outsource its IS function to a service provider. Which of the following, if true, will strengthen BelAir's decision?

Definition

 

 

BelAir has seen a fall in company revenue over the last year.

Term

Which of the following is an example of a basic relationship between an outsourcing vendor and client?

Definition

 BelAir sets its system preferences according to STS products.

Term

A group of inexperienced computer operators cause the loss of valuable information. This information loss can be classified as one caused due to ________.

Definition

accidents

Term

Which of the following is the most complete definition of a computer crime?

Definition

the act of using a computer to commit an illegal act

Term

3) Which of the following is one of the main federal laws in the United States against computer crimes?

Definition

Electronic Communications Privacy Act of 1986

Term

The Computer Fraud and Abuse Act of 1986 prohibits ________.

Definition

threatening to damage computer systems in order to extort money or other valuables

Term

Which of the following US laws amended the Computer Fraud and Abuse Act to allow investigators access to voice-related communications?

Definition

the Computer Abuse Amendments Act

Term

Which of the following acts have made it a crime to break into any electronic communications service, including telephone services?

Definition

the Electronic Communications Privacy Act

Term

Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?

Definition

the Computer Fraud and Abuse Act

Term

Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.

Definition

misdemeanors

Term

Some computer criminals attempt to break into systems or deface Web sites to promote political or ideological goals. They are called ________.

Definition

hacktivists

Term

Today, people who break into computer systems with the intention of doing damage or committing a crime are usually called ________.

Definition

crackers

Term

WikiLeaks is a famous not-for-profit whistle-blowing Web site. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this. These attackers, who tried to protect WikiLeaks, can be called ________.

Definition

 hacktivists

Term

Employees steal time on company computers to do personal business. This can be considered an example of ________.

Definition

unauthorized access

Term

) A(n) ________ is a destructive program that disrupts the normal functioning of computer systems.

Definition

virus

Term

In May 2000, a malware email with "I LOVE YOU"in the subject field, spread to numerous computers in the world. The program replicated itself to everyone in the user's Outlook address book and then destroyed local files. This love email forced several organizations to shut down their e-mail systems. The malware discussed here is an example of a ________.

Definition

computer virus

Term

Ronald downloads a movie from the Internet. During this process, his system gets affected by malicious software. The file does nothing initially and his system functions as usual for a few days. Later the file reproduces itself and starts to slow down his system. In a month's time his system is fully affected by the malware. Which of the following is most similar to the situation described here?

Definition

Anderson receives a malware file through email. On January 1st, the malware alters the name of his local files and displays funny names.

Term

 A(n) ________ is a variation of a virus that is targeted at networks and takes advantage of security holes in operating systems and other software to replicate endlessly across the Internet. This causes servers to crash and denies service to Internet users.

Definition

worm

Term

The official Web site of the Iranian government was made unreachable by foreign activists seeking to help the opposition parties during the 2009 Iranian election protests. Web sites belonging to many Iranian news agencies were also made unreachable by the activists. This cyber protest is an example of a(n) ________ attack.

Definition

denial of service

Term

________ refers to any software that covertly gathers information about a user through an Internet connection without the user's knowledge.

Definition

Spyware

Term

Which of the following terms represents junk newsgroup postings used for the purpose of advertising for some product or service?

Definition

spam

Term

Robert receives a mail which says he has won an online lottery worth $50 Billion. Robert was wondering how he could win it without even buying the lottery. It was a spam mail intended to obtain the bank account details and the credit card number of Robert. Such attempts to trick financial account and credit card holders are called ________.

Definition

phishing

Term

Phishing refers to the ________.

Definition

attempts to trick financial account and credit card holders into giving away their authorization information

Term

Which of the following is a message passed to a Web browser on a user's computer by a Web server?

Definition

cookie

Term

When using Yahoo Messenger, you get an unsolicited advertisement from a company. This advertisement contained a link to connect to the merchant's Web site. Which of the following is the best way of classifying this advertisement?

Definition

Cookie

Term

Which of the following is the most accurate definition of a botnet?

Definition

destructive software robots, working together on a collection of zombie computers via the Internet

Term

A hacker takes an individual's social security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid. This practice is called ________.

Definition

identity theft

Term

________ are false messages often circulated online about new viruses, earthquakes ; kids in trouble; cancer causes; or any other topic of public interest.

Definition

Internet hoaxes

Term

Arbitron consultants, a leading software consulting firm in the United States, decide to launch ERP an ERP Solution. The company chooses the brand name ArbitEnterprise for the new solution. However, when the company attempted to register the domain name, it found that the domain name was registered to an unknown firm. The small firm is now attempting to sell the domain name to Arbitron. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?

Definition

cybersquatting

Term

Identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.

Definition

cybersquatting

Term

Cyber criminals gain information on a victim by monitoring online activities, accessing databases, and so on and make false accusations that damage the reputation of the victim on blogs, Web sites, chat rooms, or e-commerce sites. Such acts are called ________.

Definition

 cyberstalking

Term

Which of the following refers to the practice of deliberately causing emotional distress in the victim?

Definition

 cyberbullying

Term

Which of the following creations typically obtain patent rather than copyright?

Definition

material inventions

Term

An organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.Which of the following terms best represents such attacks by a country?

Definition

cyberwar

Term

Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.

Definition

patriot hackers

Term

Jester is a famous hacker who describes himself as a "hacktivist for good." He launches attacks on terrorist sites that pose threats to nations. Jester claims that he is obstructing the lines of communication for terrorists, sympathizers, fixers, facilitators, oppressive regimes and other general bad guys. Jester can be called a(n) ________.

Definition

patriot hacker

Term

________ is the use of computer and networking technologies, by individuals and organized groups, against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals.

Definition

Cyberterrorism

Term

A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested the country's policies. The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline. This is an example of

Definition

cyberterrorism

Term

________ refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors.

Definition

) Data mining

Term

Which of the following is a significant disadvantage to using acts of cyberterrorism as a weapon?

Definition

 Cyberattacks cause more emotions in the public than the actual material destruction caused. 

Term

________ refers to precautions taken to keep all aspects of information systems safe from destruction, manipulation, or unauthorized use or access.

Definition

Information systems security

Term

Which of the following is a process in which you assess the value of the assets being protected, determine their likelihood of being compromised, and compare the probable costs of their being compromised with the estimated costs of whatever protection you might have to take?

Definition

risk analysis

Term

An organization takes active countermeasures to protect its systems, such as installing firewalls. This approach is ________.

Definition

risk reduction

Term

 An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur. This approach is called ________.

Definition

risk acceptance

Term

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers and its databases contain valuable information about its customers. The loss of customer information used to decide services would be extremely harmful to the organization. Which of the following strategies used by Ciscon is an example of risk transference?

Definition

The company insures any possible data loss for a large sum.

Term

RBS Publishing is a leading media company in France. The company handles sensitive information and often finds it susceptible to information threats. As a counter measure the company installs strong firewalls and protective software. These steps are a part of ________ strategy.

Definition

risk reduction

Term

An organization is using physical access restrictions to safeguard information systems when it uses ________.

Definition

 passwords

Term

Your company uses a fingerprint recognition system instead of an access card. This helps the company prevent unauthorized physical access. Which of the following technologies is used for restriction here?

Definition

biometrics

Term

An organization is using biometrics when it uses ________ to identify employees.

Definition

fingerprints

Term

________ software allows computer users access only to those files related to their work.

Definition

Access-control

Term

An attacker accesses a network, intercepts data from it, and uses network services and sends attack instructions to it without entering the home, office, or organization that owns the network. This new form of attack is known as ________ attack.

Definition

drive-by hacking

Term

Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe. The company is heavily dependent on Internet for transporting data. The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised. Which of the following would be most helpful to the company in achieving this goal?

Definition

 tunneling

Term

Which of the following is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network?

Definition

firewall

Term

Which of the following is a valid observation about encryption?

Definition

Encrypted messages cannot be deciphered without the decoding key.

Term

Implementing encryption on a large scale, such as on a busy Web site, requires a third party, called a(n) ________.

Definition

certificate authority

Term

________ software is used to keep track of computer activity so that inspectors can spot suspicious activity and take action.

Definition

Audit-control

Term

A cold backup site is a(n) ________.

Definition

empty warehouse with all necessary connections for power and communication

Term

An organization builds a fully equipped backup facility, having everything from office chairs to a one-to-one replication of the most current data. This facility is called a(n) ________ backup site.

Definition

hot

Term

Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power, backups, connectivity, and security. Such data centers are called ________.

Definition

collocation facilities

Term

Which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?

Definition

honeypot

Term

The ________ policy explains technical controls on all organizational computer systems, such as access limitations, audit-control software, firewalls, and so on.

Definition

security

Term

Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization.

Definition

account management policy

Term

Which of the following types of plans describes how a business resumes operation after a disaster?

Definition

business continuity plan

Term

 Recovery point objectives of a recovery plan specify ________.

Definition

the maximum time allowed to recover from a catastrophic event

Term

Controls that are used to assess whether anything went wrong, such as unauthorized access attempts are called ________ controls.

Definition

detective

Term

Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls. This process is called ________.

Definition

an information systems audit

Term

Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse or fraud, controls to detect any potential problems, and effective measures to correct any problems?

Definition

Sarbanes-Oxley Act

Term

Which of the following types of control is used to define the aims and objectives of an organization?

Definition

 policies

Term

Which of the following is an example of organization and management control?

Definition

policies about incident reporting

Supporting users have an ad free experience!