ITC 429: Exam 2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

150 Terms

1
New cards

Which of the following represents the two fundamental building blocks that protect organizational information?

ethics and security

2
New cards

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

confidentiality

3
New cards

Which of the following represents the principles and standards that guide our behavior toward other people?

ethics

4
New cards

What is the difference between pirated and counterfeit software?

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit is software that is manufactured to look like the real thing and sold as such.

5
New cards

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

privacy

6
New cards

Which of the following represents the definition of information property?

an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

7
New cards

Which of the following represents the definition of information management?

examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

8
New cards

Which of the following represents the definition of information compliance?

the act of conforming, acquiescing, or yielding information

9
New cards

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

intellectual property

10
New cards

Which of the following describes confidentiality?

the assurance that messages and information are available only to those who are authorized to view them

11
New cards

Which rule is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence?

Rule 41

12
New cards

What is ediscovery?

the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

13
New cards

What is the Child Online Protection Act?

a law passed to protect minors from accessing inappropriate material on the Internet

14
New cards

Which policy contains general principles regarding information privacy?

information privacy policy

15
New cards

Which of the following policies details the extent to which email messages may be read by others?

email privacy policy

16
New cards

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?

antispam policy

17
New cards

What is the electronic defacing of an existing website?

cybervandalism

18
New cards

Which of the following is one of the four basic options included in a bring your own device policy?

unlimited access for personal devices, access only to nonsensitive systems and data, access but preventing local storage of data on personal devices

19
New cards

What refers to choosing to allow permissions to incoming emails?

opt in

20
New cards

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

social media monitoring

21
New cards

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?

social media manager

22
New cards

What outlines the corporate guidelines or principles governing employee online communications?

social media policy

23
New cards

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

click-fraud

24
New cards

Which of the following definitions represents Internet censorship?

government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens

25
New cards

Which of the following is not an example of unplanned downtime?

system upgrade

26
New cards

What is software written with malicious intent to cause annoyance or damage?

virus

27
New cards

What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks?

Cybersecurity and Infrastructure Security Agency

28
New cards

What is simplelocker?

a form of malicious software that infects your computer and asks for money

29
New cards

Who are hackers with criminal intent?

crackers

30
New cards

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

cyberterrorists

31
New cards

Which of the following types of viruses spread themselves not just from file to file but also from computer to computer?

worm

32
New cards

What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?

adware

33
New cards

What is a hacker?

experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

34
New cards

What is information security?

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

35
New cards

What are the first two lines of defense a company should take when addressing security risks?

people first, technology second

36
New cards

Which of the following represents the biggest problem of information security breaches?

people misusing organizational information

37
New cards

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

pretexting

38
New cards

What is dumpster diving?

a hacker looking through your trash to find personal informatio

39
New cards

What is a method for confirming users’ identities?

authentication

40
New cards

What type of encryption technology uses multiple keys, one for public and one for private?

public key encryption

41
New cards

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?

firewall

42
New cards

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?

antivirus software

43
New cards

What is a device that is around the same size as a credit card and contains embedded technologies that can store information and small amounts of software to perform some limited processing?

smart card

44
New cards

What is multifactor authentication?

requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)

45
New cards

What gathers an organization’s computer network traffic patterns to identify unusual or suspicious operations?

network behavior analysis

46
New cards

What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals?

cyberterrorism

47
New cards

What is the traditional security process that requires a username and password?

single-factor authentication

48
New cards

What are biometrics?

the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting

49
New cards

Where do organizations typically place firewalls?

between the server and the Internet

50
New cards

What reroutes requests for legitimate websites to false websites?

pharming

51
New cards

What is information secrecy?

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

52
New cards

What reroutes requests for legitimate websites to false websites?

pharming

53
New cards

What are computer viruses that wait for a specific date before executing their instructions?

time bombs

54
New cards

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

digital certificate

55
New cards

What scrambles information into an alternative form that requires a key or password to decrypt?

encryption

56
New cards

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

cryptography

57
New cards

What is an information MIS infrastructure?

identifies where and how important information, such as customer records, is maintained and secured

58
New cards

Which of the following is a benefit of a solid MIS infrastructure?

reduces costs, improves productivity, optimizes business operations

59
New cards

What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate?

network

60
New cards

What is a computer designed to request information from a server?

client

61
New cards

What is hardware?

consists of the physical devices associated with a computer system

62
New cards

What is software?

the set of instructions the hardware executes to carry out specific tasks

63
New cards

What is a client?

a computer designed to request information from a server

64
New cards

Accessibility, availability, maintainability, portability, reliability, scalability, and usability are all elements of a(n) ________Blank MIS infrastructure.

agile

65
New cards

Which of the following describes the difference between a backup plan and a recovery plan?

Backup is an exact copy of a system’s information, whereas recovery is the ability to get a system up and running in the event of a system crash or failur

66
New cards

What occurs when a primary machine recovers and resumes operations, taking over from a secondary server?

failback

67
New cards

Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?

  • disrupted communications

  • damaged physical infrastructures

  • halted transportation

68
New cards

Among the sites that support disaster recovery, a ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

cold site

69
New cards

Among the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

hot site

70
New cards

Among the sites that support disaster recovery, a ________ is a separate facility with computer equipment that requires installation and configuration.

warm site

71
New cards

What is a disaster recovery plan?

a detailed process for recovering information or a system in the event of a catastrophic disaster

72
New cards

Which of the following is an example of an emergency notification system?

radio stations’ occasional tests of the national alert system

73
New cards

What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property?

emergency

74
New cards

What identifies all critical business functions and the effect that a specific disaster may have upon them?

business impact analysis

75
New cards

What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?

technology recovery strategy

76
New cards

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

portability

77
New cards

What does reliability ensure?

the system is functioning correctly and providing accurate information

78
New cards

What measures how quickly a system performs a process or transaction?

performance

79
New cards

What is usability?

the system is easy to learn, efficient, and satisfying to use

80
New cards

What refers to how well a system can adapt to increased demands?

scalability

81
New cards

What is a system weakness that can be exploited by a threat?

vulnerability

82
New cards

What is availability?

time frames when the system is operational

83
New cards

What is reliability?

ability to ensure that a system is functioning correctly and providing accurate information

84
New cards

What is the difference between unavailable and high availability?

Unavailable is when the system is not operating and can’t be used, whereas high availability is when a system is continuously operating at all times.

85
New cards

What is performance?

how quickly a system performs a process or transaction

86
New cards

What is usability?

the degree to which a system is easy to learn, efficient, and satisfying to use

87
New cards

What is scalability?

how well a system can scale up or adapt to the increased demands of growth

88
New cards

Which of the following reflects Moore’s law?

the computer chip performance per dollar doubles every 18 months

89
New cards

What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment?

sustainability or green MIS

90
New cards

Sustainable MIS is a critical part of ________ Blank within a company.

corporate social responsibility

91
New cards

What is a green personal computer?

a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment

92
New cards

What is upcycle?

reusing or refurbishing ewaste and creating a new product

93
New cards

What is a company’s acknowledged responsibility to society?

corporate social responsibility

94
New cards

Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem?

grid computing

95
New cards

What is dynamic scaling?

MIS infrastructure that can be automatically scaled up or down based on needed requirements

96
New cards

What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple ‘virtual’ machines all on a single computing device?

virtualization

97
New cards

What is a facility used to house management information systems and associated components, such as telecommunications and storage systems?

data center

98
New cards

What does a single instance of a system serving multiple customers mean in the cloud?

multi-tenancy

99
New cards

What occurs when each customer or tenant must purchase and maintain an individual system?

single-tenancy

100
New cards

What promotes massive, global, industry-wide applications offered to the general public?

public cloud