Term
1. ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) Legacy systems B) SSID standards C) Vulnerabilities D) Controls |
|
Definition
|
|
Term
2. Firms providing financial services must comply with the ______________ for electronic records management A) Health Insurance Portability and Accountability Act (HIPAA) B) Warren Buffet Act C) Gramm‐Leach‐Bliley Act D) Sarbanes‐Oxley Act E) National Security Policy Act |
|
Definition
C) Gramm‐Leach‐Bliley Act |
|
|
Term
3. You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) Wireless network B) Employees C) Authentication procedures D) Lack of data encryption |
|
Definition
|
|
Term
4. The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. |
|
Definition
D) outlines medical security and privacy rules. |
|
|
Term
5. In ___________ eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. A) SQL injection attacks. B) phishing. C) war driving. D) social engineering. |
|
Definition
|
|
Term
6. ___________ focuses on how the company can restore business operations after a disaster strikes. A) security policy. B) AUP. C) business continuity planning. D) business impact analysis |
|
Definition
C) business continuity planning. |
|
|
Term
7. A(n) ______ determines the level of risk to the firm if a specific activity or process is not properly controlled. Business managers working with IS specialists determine the value of information assets, points of vulnerability, the likely frequency of a problem, and the potential for damage. A) security policy. B) AUP. C) MIS audit. D) risk assessment. |
|
Definition
|
|
Term
8. ________ feature full‐time monitoring tools placed at most vulnerable points or “hot spots” of corporate networks to detect and deter intruders continually. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies |
|
Definition
B) Intrusion detection systems |
|
|
Term
9. A digital certificate system: A) uses third‐party CAs to validate a user’s identity. B) uses digital signatures to validate a user’s identity. C) uses tokens to validate a user’s identity. D) is used primarily by individuals for personal correspondence |
|
Definition
A) uses third‐party CAs to validate a user’s identity. |
|
|
Term
10. For 100% availability, online transaction processing requires: A) high‐capacity storage. B) a multi‐tier server network. C) fault‐tolerant computer systems. D) dedicated phone lines. |
|
Definition
C) fault‐tolerant computer systems. |
|
|
Term
11. Downtime refers to periods of time in which a: A) computer system is malfunctioning. B) computer system is not operational. C) company or organization is not operational. D) computer is not online. |
|
Definition
B) computer system is not operational. |
|
|
Term
12. Smaller firms may outsource some or many security functions to: A) MSSPs. B) MISs. C) SSLs. D) CAs. |
|
Definition
|
|
Term
13. Most antivirus software is effective against: A) only those viruses active on the Internet and through e‐mail. B) any virus. C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written. |
|
Definition
D) only those viruses already known when the software is written. |
|
|
Term
14. An authentication token is a(n): A) device the size of a credit card that contains antivirus software to verify the presence of computer viruses. B) type of hardware and software control that prevents unauthorized users from Internet accessing the organization’s private internal networks. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file. |
|
Definition
C) gadget that displays passcodes. |
|
|
Term
15. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack. A) DDoS B) social engineering C) SQL injection D) phishing |
|
Definition
|
|
Term
16. _________ an independent computer program that copies itself from one computer to another over a network. Unlike viruses, _______ can operate on their own without attaching to other computer program files. A) worm B) trojan horse C) bug D) keyloggers |
|
Definition
|
|
Term
17. Hackers create a botnet by: A) infecting Web search bots with malware. B) using Web search bots to infect other computers. C) causing other people's computers to become "zombie" PCs following a master computer. D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door. |
|
Definition
C) causing other people's computers to become "zombie" PCs following a master computer. |
|
|
Term
18. Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering C) phishing. D) pharming |
|
Definition
|
|
Term
1. Which process defines the objectives of the new or modified system and develops a detailed description of the functions that a new information system must perform? A) Feasibility study B) Requirements analysis C) Systems design D) Test plan development |
|
Definition
|
|
Term
2. System testing: A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting. |
|
Definition
B) tests the functioning of the system as a whole. |
|
|
Term
3. Acceptance testing: A) includes all the preparations for the trials. B) tests the functioning of the system as a whole. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting. |
|
Definition
D) provides the final certification that the system is ready to be used in a production setting. |
|
|
Term
4. In a direct cutover conversion strategy, the new system: A) is tested by an outsourced company. B) replaces the old one at an appointed time. C) and the old are run together. D) is introduced in stages. |
|
Definition
B) replaces the old one at an appointed time. |
|
|
Term
5. Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed: A) compliance. B) production. C) maintenance. D) acceptance. |
|
Definition
|
|
Term
6. The ________ feature of an application software package allows an organization to modify the package to meet its unique requirements without destroying the integrity of the packaged software. A) prototype. B) rapid application design. C) joint application design. D) customization. |
|
Definition
|
|
Term
7. A ________ shows each task as a horizontal bar whose length is proportional to the time required to complete it. A) Gantt chart B) DFD C) feasibility study D) PERT chart |
|
Definition
|
|
Term
8. Which one of the following is the oldest method of building information systems? A) prototyping B) end‐user development C) application software packages D) systems development life cycle |
|
Definition
D) systems development life cycle |
|
|
Term
9. A document that shows how specific information systems fit into a company’s overall business plan and business strategy is called a(n) ________. : A) project plan. B) request for proposal. C) information systems plan. D) mission statement. |
|
Definition
C) information systems plan. |
|
|
Term
10. Which process is used to develop risk profiles for a firm's information system projects and assets? A) Information systems plan B) Scoring model C) Portfolio analysis D) Feasibility study |
|
Definition
|
|
Term
11. You have been hired by a pharmaceutical company to evaluate its portfolio of systems and IT projects. Which types of projects would be best avoided? A) Any high risk projects B) Any low‐benefit projects C) High‐risk, low benefit projects D) None — any project might be beneficial |
|
Definition
C) High‐risk, low benefit projects |
|
|
Term
12. A working version of an information system intended as only a preliminary model is called a(n). A) customization. B) structured methodology. C) end‐user interface. D) prototype. |
|
Definition
|
|
Term
13. When systems are created rapidly, without a formal development methodology: A) end users can take over the work of IT specialists. B) the organization quickly outgrows the new system. C) hardware, software, and quality standards are less important. D) testing and documentation may be inadequate. |
|
Definition
D) testing and documentation may be inadequate. |
|
|
Term
14. Which one of the following tools may help identify risk areas associated with employee acceptance of a new information system? A) Formal planning and control tools B) Organizational impact analysis C) System prototype D) Feasibility study |
|
Definition
B) Organizational impact analysis |
|
|
Term
15. The process of creating workable information systems in a very short period of time is called: A) RAD B) JAD C) Prototyping D) End‐user development |
|
Definition
|
|
Term
16. The entire system‐building effort is driven by: A) organizational change. B) feasibility studies. C) data. D) user information requirements. |
|
Definition
D) user information requirements. |
|
|
Term
17. The primary tool for representing a system's component processes and the flow of data between them is the : A) data dictionary. B) process specifications diagram. C) user documentation. D) data flow diagram. |
|
Definition
|
|
Term
18. You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are more likely to change their requirements during the course of development. What development method would be most successful for this project? A) RAD B) Prototyping C) JAD D) End‐user development |
|
Definition
|
|
Term
1. Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. |
|
Definition
B) They result in new situations that are not covered by old laws. |
|
|
Term
2. The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called: A) profiling B) phishing. C) spamming. D) targeting. |
|
Definition
|
|
Term
3. Most American and European privacy laws are based on a regime called A) privacy rights of individuals B) conspiracy theories C) opt‐out models of informed consent D) fair information practices (FIP). |
|
Definition
D) fair information practices (FIP). |
|
|
Term
4. A colleague of yours frequently takes, for his own personal use, small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule |
|
Definition
A) Kant's Categorical Imperative |
|
|
Term
5. The Federal Trade Commission FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there is a mechanism in place to enforce FIP principles. D) Web sites must disclose their information practices before collecting data. |
|
Definition
D) Web sites must disclose their information practices before collecting data. |
|
|
Term
6. A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. A) opt‐in B) opt‐out C) P3P D) PGP |
|
Definition
|
|
Term
7. _______ refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior. A) Ethics B) intellectual property C) fair use doctrine D) copyright |
|
Definition
|
|
Term
8. ________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials |
|
Definition
A) Regulated common carriers |
|
|
Term
9. It is not feasible for companies to produce error‐free software because: A) any programming code is susceptible to error. B) it is too expensive create perfect software. C) errors can be introduced in the maintenance stage of development. D) any software of any complexity will have errors. |
|
Definition
B) it is too expensive create perfect software |
|
|
Term
10. The most common source of business system failure is: A) software bugs. B) software errors. C) hardware or facilities failures. D) data quality. |
|
Definition
|
|
Term
11. The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations. A) computer B) technology C) digital D) electronic |
|
Definition
|
|
Term
12. European privacy protection is ________ than in the United States. A) much more stringent B) less far‐reaching C) less liable to laws D) much less stringent |
|
Definition
|
|
Term
13. Small text files deposited on a computer hard drive when a user visits certain Web sites are called A) web critters B) cookies. C) digital crumbs D) viruses |
|
Definition
|
|
Term
14. Re‐designing and automating business processes can be seen as a double‐edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle‐management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands‐on knowledge. |
|
Definition
|
|
Term
15. The practice of spamming has been growing because: A) telephone solicitation is no longer legal. B) it is good advertising practice and brings in many new customers. C) It helps pay for the Internet. D) it is so inexpensive and can reach so many people. |
|
Definition
D) it is so inexpensive and can reach so many people. |
|
|
Term
16. The introduction of new information technology has a: A) dampening effect on the discourse of business ethics. B) ripple effect, raising new ethical, social, and political issues. C) beneficial effect for society as a whole, while raising dilemmas for consumers. D) waterfall effect in raising ever more complex ethical issues. |
|
Definition
B) ripple effect, raising new ethical, social, and political issues. |
|
|
Term
17. The health risks computer cause is(are): A) CTS B) CVS C) technostress D) all of the above |
|
Definition
|
|
Term
18. Which of the following tools was designed to help protect Web user privacy? A) P3P B) NAI C) FIP D) DoubleClick |
|
Definition
|
|