Term
| What is a form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move? |
|
Definition
|
|
Term
| What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium? |
|
Definition
|
|
Term
| What detects the presence or absence of a mark in a predetermined place (popular for multiple-choice exams)? |
|
Definition
| C. Optical-mark recognition |
|
|
Term
| What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time? |
|
Definition
|
|
Term
|
Definition
| A. Controls how the various technology tools work together along with the application software |
|
|
Term
| What is application software? |
|
Definition
| D. Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others |
|
|
Term
| What organizes information on a hard disk in the most efficient way? |
|
Definition
|
|
Term
| What provides the tools for data retrieval, modification, deletion, and insertion? |
|
Definition
|
|
Term
| What is the recommended way to implement information security lines of defense? |
|
Definition
| A. People first, technology second |
|
|
Term
| Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? |
|
Definition
|
|
Term
| What identifies the rules required to maintain information security? |
|
Definition
| B. Information security policies |
|
|
Term
| Which of the following is not one of the five steps for creating an information security plan? |
|
Definition
| C. Revise and test the information security policies |
|
|
Term
| What is social engineering? |
|
Definition
| A. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
|
Term
| Which of the following is not one of the top 10 questions managers should ask regarding information security? |
|
Definition
| D. How do we identify potential insiders? |
|
|
Term
| Which of the following is not one of the three primary information security areas? |
|
Definition
| C. Detection and resistance |
|
|
Term
| What is a method for confirming users' identities? |
|
Definition
|
|
Term
| What is the most secure type of authentication? |
|
Definition
| D. Combination of all of the above |
|
|
Term
| What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing? |
|
Definition
|
|
Term
| What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting? |
|
Definition
|
|
Term
| Which of the following is considered a type of biometrics? |
|
Definition
|
|
Term
| What is the most costly and intrusive form of authentication? |
|
Definition
| C. Something that is part of the user such as a fingerprint or voice signature |
|
|
Term
| Which of the following authentication methods is 100 percent accurate? |
|
Definition
|
|
Term
| A. Content filtering, encryption, firewalls |
|
Definition
| A. Content filtering, encryption, firewalls |
|
|
Term
| What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information? |
|
Definition
|
|
Term
|
Definition
| C. A form of unsolicited email |
|
|
Term
|
Definition
| B. Scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
Which of the following can be completed by encryption?
A. Switch the order of characters
B. Replace characters with other characters
C. Use a mathematical formula to convert the information into some sort of code
D. All of the above |
|
Definition
|
|
Term
| Where do organizations typically place firewalls? |
|
Definition
| D. Between the server and the Internet |
|
|
Term
| Which of the following does a firewall perform? |
|
Definition
|
|
Term
| What includes a variety of threats such as viruses, worms, and Trojan horses? |
|
Definition
|
|
Term
| What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender? |
|
Definition
|
|
Term
| What is the most common type of defense within detection and response technologies? |
|
Definition
|
|
Term
| Who works at the request of the system owners to find system vulnerabilities and plug the holes? |
|
Definition
|
|
Term
| Who breaks into other people's computer systems and just looks around or steals and destroys information? |
|
Definition
|
|
Term
| Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses? |
|
Definition
|
|
Term
| Who are hackers with criminal intent? |
|
Definition
|
|
Term
| Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction? |
|
Definition
|
|
Term
| What is a type of virus that spreads itself, not just from file to file, but also from computer to computer? |
|
Definition
|
|
Term
| What floods a website with so many requests for service that it slows down or crashes the site? |
|
Definition
| C. Denial-of-service attack |
|
|
Term
| Which is a virus that opens a way into the network for future attacks? |
|
Definition
|
|
Term
| If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech? |
|
Definition
| C. Detection and response |
|
|
Term
| What are the principles and standards that guide our behavior toward other people? |
|
Definition
|
|
Term
| What is intangible creative work that is embodied in physical form? |
|
Definition
|
|
Term
| What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? |
|
Definition
|
|
Term
| What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes? |
|
Definition
|
|
Term
| What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent? |
|
Definition
|
|
Term
| What is software that is manufactured to look like the real thing and sold as such? |
|
Definition
|
|
Term
| What is the unauthorized use, duplication, distribution, or sale of copyrighted software? |
|
Definition
|
|
Term
| What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment? |
|
Definition
|
|
Term
| Which of the following describes privacy? |
|
Definition
| C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent |
|
|
Term
| Which of the following describes privacy? |
|
Definition
| C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent |
|
|
Term
| Which of the following describes epolicies? |
|
Definition
| B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment |
|
|
Term
| 47. Which of the following is not considered an epolicy? |
|
Definition
| D. Anti-hacker use policy |
|
|
Term
| Which of the following is included in the four quadrants of ethical and legal behavior? |
|
Definition
|
|
Term
| What is the ideal type of decisions for people in an organization to make? |
|
Definition
|
|
Term
| What was the primary problem Saab encountered with one of its marketing companies? |
|
Definition
| C. Contacted customers regardless of their opt-out or opt-in decision |
|
|
Term
| Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer? |
|
Definition
|
|
Term
| Which act allows any person to examine government records unless it would cause an invasion of privacy? |
|
Definition
| C. Freedom of Information Act |
|
|
Term
| Which act restricts what information the federal government can collect? |
|
Definition
|
|
Term
| . Which act protects investors by improving the accuracy and reliability of corporate disclosures? |
|
Definition
|
|
Term
| Which act strengthened criminal laws against identity theft? |
|
Definition
|
|
Term
| Which of the following is not one of the six principles for ethical information management according to CIO magazine? |
|
Definition
| D. The CIO is responsible for how outsiders view and analyze corporate information |
|
|
Term
| What is the policy that contains general principles to guide computer user behavior? |
|
Definition
|
|
Term
| Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions? |
|
Definition
| D. Ethical computer use policy |
|
|
Term
| According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules. |
|
Definition
|
|
Term
| If an organization were to have only one policy, which one would it want? |
|
Definition
| D. Ethical computer use policy |
|
|
Term
| Which policy contains general principles regarding information privacy? |
|
Definition
| A. Information privacy policy |
|
|
Term
| Which of the following represents the classic example of unintentional information reuse? |
|
Definition
| B. Social Security number |
|
|
Term
| What is one of the guidelines an organization can follow when creating an information privacy policy? |
|
Definition
|
|
Term
| What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet? |
|
Definition
|
|
Term
| What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions? |
|
Definition
|
|
Term
| Which policy typically contains a nonrepudiation clause? |
|
Definition
|
|
Term
| Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID? |
|
Definition
|
|
Term
| What is one of the major problems with email? |
|
Definition
| C. User's expectation of privacy |
|
|
Term
| Which of the following is part of the acceptable use policy stipulations? |
|
Definition
|
|
Term
|
Definition
| A. Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space |
|
|
Term
| Which policy details the extent to which email messages may be read by others? |
|
Definition
|
|
Term
| Which of the following is not a part of the email privacy policy stipulations? |
|
Definition
| D. It informs people that the organization has full control over email once it is transmitted outside the organization |
|
|
Term
| Which of the following represents the estimated percentage that spam accounts for in an organizations' email traffic? |
|
Definition
|
|
Term
| 76. Which of the following describes information technology monitoring? |
|
Definition
|
|
Term
| What is a program, when installed on a computer, records every keystroke and mouse click? |
|
Definition
|
|
Term
| What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard? |
|
Definition
|
|
Term
| What is a small file deposited on a hard drive by a website containing information about customers and their Web activities? |
|
Definition
|
|
Term
| What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets? |
|
Definition
| C. Enterprise architecture |
|
|
Term
| Which organization did a 66-hour database failure allow consumers to purchase guns without background checks? |
|
Definition
|
|
Term
| A unified enterprise architecture will perform all of the following, except? |
|
Definition
| B. Provide looser links to the business strategy allowing the organization additional flexibility |
|
|
Term
| What are the four different lenses a business must use to look at an enterprise architecture plan? |
|
Definition
| A. Business, data, applications, and technology architecture |
|
|
Term
| Which of the following represents a person grounded in technology, fluent in business, and provides the important bridge between IT and the business? |
|
Definition
|
|
Term
| Which company's EAs found software already written to allow its subscribers to customize the ring sounds on their cell phones? |
|
Definition
|
|
Term
| What determines how applications integrate and relate to each other? |
|
Definition
| A. Application architecture |
|
|
Term
| What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals? |
|
Definition
| D. Infrastructure architecture |
|
|
Term
| Which of the following is not one of the three components of an enterprise architecture? |
|
Definition
|
|
Term
| 10. Which of the following is not a component of an information architecture? |
|
Definition
|
|
Term
| Which architecture supports managing user access and using up-to-date antivirus software and patches? |
|
Definition
| B. Information architecture |
|
|
Term
| What are the primary differences between types of backup/recovery media such as DVDs and redundant storage servers? |
|
Definition
| B. Speed and associated costs |
|
|
Term
| How frequently should a large organization that deals with large volumes of critical information backup? |
|
Definition
|
|
Term
| FirstEnergy missed signs that there were potential problems in its portion of North America's electrical grid. The events that followed left an estimated 50 million people in the Northeast and Canada in the dark. A joint task force between Canada and the US investigated the causes and recommended all of the following to avoid big-scale outages, except? |
|
Definition
| C. Ensure the networks have a quick backup system in case of downtime |
|
|
Term
| What is a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? |
|
Definition
| D. Business continuity planning |
|
|
Term
| Which company used its continuity planning group to safeguard against earthquakes and other natural disasters? |
|
Definition
| C. Union Bank of California |
|
|
Term
| Good information architectures include all of the following, except? |
|
Definition
| B. Ensuring scalability to meet increased demand |
|
|
Term
|
Definition
| D. A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time |
|
|
Term
|
Definition
| C. A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service |
|
|
Term
| What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business? |
|
Definition
|
|
Term
| What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? |
|
Definition
| D. Disaster recovery plan |
|
|
Term
| What refers to how well a system can adapt to increased demands? |
|
Definition
|
|
Term
| What determines the future IT infrastructure requirements for new equipment and additional network capacity? |
|
Definition
|
|
Term
| What addresses when systems can be accessed by employees, customers, and partners |
|
Definition
|
|
Term
| Which website was inundated with more than 91 million page views on September 11, 2001? |
|
Definition
|
|
Term
| Which company created its website to parallel the same sleek but simple design of its quarterly flagship magazine? |
|
Definition
|
|
Term
| Which of the following is not a component of an application architectur |
|
Definition
|
|
Term
|
Definition
| C. A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them |
|
|
Term
| What is interoperability? |
|
Definition
| B. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers |
|
|
Term
|
Definition
| A. Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services |
|
|
Term
| Which of the following is not an primary business goal of enterprise architectures? |
|
Definition
|
|
Term
| Which of the following is a type of backup/recovery media? |
|
Definition
|
|
Term
| Which of the following is a type of backup/recovery media? |
|
Definition
|
|
Term
| What is the primary difference between the different types of backup/recovery media? |
|
Definition
|
|
Term
| What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information? |
|
Definition
|
|
Term
| What does the disaster recovery cost curve chart? |
|
Definition
|
|
Term
| What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster. |
|
Definition
|
|
Term
| Which of the following is not a characteristic of a solid infrastructure architecture? |
|
Definition
|
|
Term
| What ensures all systems are functioning correctly and providing accurate information? |
|
Definition
|
|
Term
| What addresses the timeframes when systems can be accessed by employees, customers, and partners? |
|
Definition
|
|
Term
| What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput? |
|
Definition
|
|
Term
| What is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services? |
|
Definition
| C. Service oriented architecture |
|
|
Term
| Which of the following does not apply to SOA? |
|
Definition
| A. A concrete tool or framework that can be purchased |
|
|
Term
| Which of the following is not a component in an SOA architecture? |
|
Definition
|
|
Term
| What are the key technical concepts of SOA? |
|
Definition
| A. Processes, integration, tight coupling |
|
|
Term
|
Definition
| A. A simple business task |
|
|
Term
| Which of the following is not part of a typical SOA solution? |
|
Definition
| D. Improve customer retention and deliver new products and services through reuse of current investments |
|
|
Term
| What is extensible markup language (XML)? |
|
Definition
| A. A markup language for documents containing structured information |
|
|
Term
|
Definition
| C. The capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components |
|
|
Term
| What is a framework for dividing the resources of a computer into multiple execution environments? |
|
Definition
|
|
Term
| Which of the following is a great example of loose coupling? |
|
Definition
| C. The capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components |
|
|
Term
| What is a framework for dividing the resources of a computer into multiple execution environments? |
|
Definition
|
|
Term
| Which of the following is a great example of loose coupling? |
|
Definition
| A. Conversion of currency |
|
|
Term
| Which of the following is an example of loose coupling? |
|
Definition
| A. Common customer identification |
|
|
Term
| Which of the following is considered virtualization? |
|
Definition
| B. Partitioning a hard drive |
|
|
Term
| What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system? |
|
Definition
|
|
Term
| Which of the following is a trend responsible for moving virtualization into the spotlight? |
|
Definition
|
|
Term
| Which of the following reflects Moore's Law? |
|
Definition
| A. New generations of chips deliver double the processing power as the previous generation |
|
|
Term
| Which of the following is not an additional benefit of virtualization |
|
Definition
| C. Ease of use for customer relationship management system |
|
|
Term
| What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data? |
|
Definition
|
|
Term
| What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration? |
|
Definition
|
|
Term
| Business benefits for using grid computing include? |
|
Definition
|
|
Term
| What is often referred to as being the world's single and most powerful computer solution? |
|
Definition
|
|
Term
| t/f: Enterprise architectures are always static; they never change. |
|
Definition
|
|
Term
| t/f: A system should not be designed to include the ability to handle multiple currencies and languages if the company is not currently performing business in other countries. |
|
Definition
|
|
Term
| t/f: SOA is not a concrete architecture; it is something that leads to a concrete architecture. |
|
Definition
|
|
Term
| t/f: SOA provides the technology underpinnings for working with services that are not just software or hardware, but rather business tasks. |
|
Definition
|
|
Term
| t/f: Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput. |
|
Definition
|
|
Term
| t/f: Web services are the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. |
|
Definition
|
|
Term
| t/f: Infrastructure architecture identifies where and how important information, like customer records, is maintained and secured. |
|
Definition
|
|
Term
| t/f: Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination |
|
Definition
|
|
Term
| t/f: Historically, the makers of proprietary software have generally not made source code available. |
|
Definition
|
|
Term
| t/f: The primary characteristics of a solid infrastructure include flexibility, scalability, reliability, availability, and performance. |
|
Definition
|
|
Term
| SOA is not a concrete architecture; it is something that leads to a ___________ architecture. |
|
Definition
|
|
Term
| Loose coupling is simply a way of ensuring that the technical details such as language, platform and so on are _____________ from the service. |
|
Definition
|
|
Term
| In a virtualized environment, the logical functions of computing, storage, and network elements are separated from their ____________ functions. |
|
Definition
|
|
Term
| The bandwidth required to transport the __________ services will continue to increase and the possibility of __________ degradation will become more challenging since ________ cannot tolerate packet loss. (Please note the same word fits in all of these blanks - you only need one word for the answer to fit all 3 blanks) |
|
Definition
|
|
Term
| ___________ architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets. |
|
Definition
|
|
Term
| ____________ architecture determines how applications integrate and relate to each other. |
|
Definition
|
|
Term
| A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. |
|
Definition
|
|
Term
| A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster. |
|
Definition
|
|
Term
| _________ ensures all systems are functioning correctly and providing accurate information. |
|
Definition
|
|
Term
| ____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. |
|
Definition
|
|
Term
| Managing ___________ access to information is a critical piece of the information architecture. |
|
Definition
|
|
Term
| A(n) _______________ is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. |
|
Definition
|
|
Term
| Service oriented architecture begins with a(n) ______________. |
|
Definition
|
|