Exam 3 Review

Created by amyfig23 

Upgrade to
remove ads

Chapter 7, 8 & 12

High-availability computing is also referred to as fault tolerance. T/F

False

An authentication token is a(n):

gadget that displays passcodes

Specific security challenges that threaten clients in a client/server environment include:

unauthorized access; errors; spyware.

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:

recovery oriented computing

Specific security challenges that threaten the communications lines in a client/server environment include:

tapping; sniffing; message alteration; radiation

Most antivirus software is effective against:

only those viruses already known when the software is written.

Public key encryption uses two keys. T/F

True.

Biometric authentication:

can use a person's voice as a unique, measurable trait.

Large amounts of data stored in electronic form are ________ than the same data in manual form.

vulnerable to many more kinds of threats

Phishing is a form of:

spoofing.

Which of the following statements about the Internet security is not true?

VoIP is more secure than the switched voice network

The range of Wi-Fi networks can be extended up to two miles by using external antennae. T/F

False

DoS attacks are used to destroy information and access restricted areas of a company's information system. T/F

False

Statements ranking information risks and identifying security goals are included in a(n):

security policy.

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. T/F

True.

In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?

Stateful inspection

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

Employees

Packet filtering catches most types of network attacks. T/F

False

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs

True.

Uncertainties arise in any supply chain because of:

unforeseeable events.

Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain. T/F

False

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the

upstream portion of the supply chain.

CRM software can help organizations identify high-value customers for preferential treatments. T/F

True

Enterprise systems require fundamental changes in the way the business operates.T/F

True.

________ management is an important capability for service processes that is found in most major CRM software products.

Returns

From your reading of the Severstal case study, the firm implemented new information systems in order to achieve which of the main six business objectives?

operational excellence

Concurrent supply chains are made possible by which technology?

The Internet.

The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

False.

Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. T/F

True.

Supply chain complexity and scale increases when firms

produce products and services that coordinate with hundreds or more firms and suppliers.

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

. Safety stock

Which of the following is not an example of next-generation enterprise applications?

Solutions incorporating SCM

Customer relationship management systems typically provide software and online tools for sales, customer service, and:

marketing

All CRM packages contain modules for PRM and ERM. T/F

False

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:

ERP systems.

In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. T/F

False

Supply chain planning systems:

identify the transportation mode to use for product delivery.

Why is overstocking warehouses not an effective solution for a problem of low availability?

It increases inventory costs.

The business value of an effective supply chain management system includes all of the following except:

increased inventory levels.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

Quality of Life

A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. T/F

True.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

property rights and obligations.

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:

profiling

According to the ________, you should take the action that produces the least harm.

Risk Aversion Principle

Protection for trade secrets is enforced at the federal level. T/F

False

The U.S. CAN-SPAM Act of 2003:

requires spammers to identify themselves.

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. T/F

True

The ethical "no free lunch" rule states that:

everything is owned by someone else, and that the creator wants compensation for this work.

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

Information rights and obligations

P3P stands for:

Platform for Privacy Preferences.

The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) ________.

networking advances and the Internet

P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly. T/F

False.

Spam is unsolicited e-mail. T/F

False

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

opt-out

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. T/F

True

The "do anything anywhere" computing environment can:

blur the traditional boundaries between work and family time.

The Online Privacy Alliance:

encourages self-regulation to develop a set of privacy guidelines for its members.

The introduction of new information technology has a:

ripple effect raising new ethical, social, and political issues.

It is not feasible for companies to produce error-free software because:

it is too expensive create perfect software.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set