Exam 3

Question 1 of 20
5.0 Points
__________ is the operating system of choice for Web servers, embedded system,
and supercomputers alike.

A. Tux

B. Pengu-ware

C. Linux

D. Unix Reset Selection

Mark for Review What’s This?
Question 2 of 20
5.0 Points
When merging transaction and analytical processing a problem occurs. Real-time
analytical processing diminishes the performance of transaction processing.
What is the solution to this problem that many companies use?

A. Pause transaction processing while analytical processing is occurring.

B. Only allow transaction processing during off-peak hours.

C. Replicate all transactions on a second database server and run analytical
processing off of the second server.

D. None of the above Reset Selection

Mark for Review What’s This?
Question 3 of 20
5.0 Points
Which of the following is NOT considered a core business process?

A. Manufacture goods

B. Hire employees

C. Sell products

D. Provide service Reset Selection

Mark for Review What’s This?
Question 4 of 20
5.0 Points
Software asset management includes all of the following EXCEPT:

A. performing a software inventory.

B. matching installed software with licenses.

C. creating a software asset management plan.

D. All of these are part of software asset management. Reset Selection

Mark for Review What’s This?
Question 5 of 20
5.0 Points
The Windows Update Service is an example of a __________ system.

A. bug-fixing

B. patch management

C. software asset management

D. online help and repair Reset Selection

Mark for Review What’s This?
Question 6 of 20
5.0 Points
__________ is a set of best practices that help organizations maximize the
benefits from their information systems infrastructure while at the same time
establishing appropriate controls.

A. CMMS

B. CAAT

C. S-OX

D. COBIT Reset Selection

Mark for Review What’s This?
Question 7 of 20
5.0 Points
Systems for gaining business intelligence __________ data in order to better
manage the organization.

A. gather

B. process and analyze

C. store

D. All of the above Reset Selection

Mark for Review What’s This?
Question 8 of 20
5.0 Points
__________ can increase the reliability of an organization’s information
systems infrastructure.

A. On-demand computing

B. Grid computing

C. Autonomic computing

D. Pay-per-use computing Reset Selection

Mark for Review What’s This?
Question 9 of 20
5.0 Points
Graphical software tools that provide complex analysis of stored data are:

A. OLTP.

B. OLAP.

C. OLST.

D. OLIP. Reset Selection

Mark for Review What’s This?
Question 10 of 20
5.0 Points
__________ is the use of the Internet Protocol for transporting voice, video,
fax, and data traffic.

A. IP conveyance

B. IP integration

C. IP communication

D. IP convergence Reset Selection

Mark for Review What’s This?
Question 11 of 20
5.0 Points
Systems designed to perform specific, predefined tasks such as a digital video
recorder (TiVo) or a network router are referred to as __________ systems.

A. integrated

B. specific

C. embedded

D. special-purpose Reset Selection

Mark for Review What’s This?
Question 12 of 20
5.0 Points
A __________ backup site is a backup facility consisting of an empty warehouse
with all necessary connections for power and communication, but nothing else.

A. hot

B. cold

C. empty

D. dormant Reset Selection

Mark for Review What’s This?
Question 13 of 20
5.0 Points
Application service providers offer:

A. on-demand computing.

B. on-demand software.

C. utility computing.

D. utility software. Reset Selection

Mark for Review What’s This?
Question 14 of 20
5.0 Points
In a __________ grid, the computers are just there to perform the grid’s
computing tasks.

A. homogeneous

B. dedicated

C. pure

D. uniform Reset Selection

Mark for Review What’s This?
Question 15 of 20
5.0 Points
A(n) __________ ASP offers services for small businesses within a limited
geographical area.

A. specialist or functional

B. vertical market

C. enterprise

D. local Reset Selection

Mark for Review What’s This?
Question 16 of 20
5.0 Points
An autonomic computing system must know its:

A. configuration.

B. capacity.

C. current status.

D. All of the above Reset Selection

Mark for Review What’s This?
Question 17 of 20
5.0 Points
The Linux operating system is an example of:

A. public domain software.

B. nonprotective open source software.

C. protective open source software.

D. proprietary software. Reset Selection

Mark for Review What’s This?
Question 18 of 20
5.0 Points
A __________ is a facility in which businesses can rent space for servers or
other information systems equipment.

A. collocation facility

B. server room

C. data warehouse

D. server warehouse Reset Selection

Mark for Review What’s This?
Question 19 of 20
5.0 Points
__________ refers to the use of Internet technologies for placing telephone
calls.

A. VoIP

B. IPT

C. IPP

D. PoIP Reset Selection

Mark for Review What’s This?
Question 20 of 20
5.0 Points
__________ are controls helping to ensure the reliability of information, consisting
of policies and their physical implementation, access restrictions, or
recordkeeping of actions and transactions.

A. Information systems controls

B. Audit controls

C. Infrastructure controls

D. Access controls Reset Selection

Exam 5

1. Viruses that attach themselves to files with certain
extensions, such as .doc or .exe., are __________ viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command

2. According to the CSI/FBI Cyber Crime Survey, __________ of organizations
conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent

3. __________ invented the movable-type printing press that accelerated the
amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee

4. Which of the following is NOT an example of a computer crime as listed in
the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling

5. One common way to gain access to a password-protected system is to use a
__________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering

6. Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.

7. A mechanism using a digital signature to prove that a message did, in fact,
originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.

8. The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above

9. __________ is a type of software for securing information systems by
allowing only specific users access to specific computers, applications, or
data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software

10. Encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above

11. The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.

12. __________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls

13. The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.

14. A(n) __________ is an ongoing planning process involving risk assessment,
risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan

15. Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.

16. ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.

17. To execute denial of service attacks, intruders often use __________
computers.
A. zombie
B. monster
C. robot
D. android

18. Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.

19. Futurist author Alvin Toffler describes three “waves of change.”
The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.

20. Some spam e-mail includes __________, which are attempts to trick financial
account and credit card holders into giving away their authorization
information.
A. freaking
B. tricking
C. phishing
D. luring