07 Jun Strategic IT MC questions exam 3
Question
Exam 3
Question 1 of 20
5.0 Points
__________ is the operating system of choice for Web servers, embedded system, and supercomputers alike.
A. Tux
B. Pengu-ware
C. Linux
D. Unix Reset Selection
Mark for Review What’s This?
Question 2 of 20
5.0 Points
When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use?
A. Pause transaction processing while analytical processing is occurring.
B. Only allow transaction processing during off-peak hours.
C. Replicate all transactions on a second database server and run analytical processing off of the second server.
D. None of the above Reset Selection
Mark for Review What’s This?
Question 3 of 20
5.0 Points
Which of the following is NOT considered a core business process?
A. Manufacture goods
B. Hire employees
C. Sell products
D. Provide service Reset Selection
Mark for Review What’s This?
Question 4 of 20
5.0 Points
Software asset management includes all of the following EXCEPT:
A. performing a software inventory.
B. matching installed software with licenses.
C. creating a software asset management plan.
D. All of these are part of software asset management. Reset Selection
Mark for Review What’s This?
Question 5 of 20
5.0 Points
The Windows Update Service is an example of a __________ system.
A. bug-fixing
B. patch management
C. software asset management
D. online help and repair Reset Selection
Mark for Review What’s This?
Question 6 of 20
5.0 Points
__________ is a set of best practices that help organizations maximize the benefits from their information systems infrastructure while at the same time establishing appropriate controls.
A. CMMS
B. CAAT
C. S-OX
D. COBIT Reset Selection
Mark for Review What’s This?
Question 7 of 20
5.0 Points
Systems for gaining business intelligence __________ data in order to better manage the organization.
A. gather
B. process and analyze
C. store
D. All of the above Reset Selection
Mark for Review What’s This?
Question 8 of 20
5.0 Points
__________ can increase the reliability of an organization’s information systems infrastructure.
A. On-demand computing
B. Grid computing
C. Autonomic computing
D. Pay-per-use computing Reset Selection
Mark for Review What’s This?
Question 9 of 20
5.0 Points
Graphical software tools that provide complex analysis of stored data are:
A. OLTP.
B. OLAP.
C. OLST.
D. OLIP. Reset Selection
Mark for Review What’s This?
Question 10 of 20
5.0 Points
__________ is the use of the Internet Protocol for transporting voice, video, fax, and data traffic.
A. IP conveyance
B. IP integration
C. IP communication
D. IP convergence Reset Selection
Mark for Review What’s This?
Question 11 of 20
5.0 Points
Systems designed to perform specific, predefined tasks such as a digital video recorder (TiVo) or a network router are referred to as __________ systems.
A. integrated
B. specific
C. embedded
D. special-purpose Reset Selection
Mark for Review What’s This?
Question 12 of 20
5.0 Points
A __________ backup site is a backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else.
A. hot
B. cold
C. empty
D. dormant Reset Selection
Mark for Review What’s This?
Question 13 of 20
5.0 Points
Application service providers offer:
A. on-demand computing.
B. on-demand software.
C. utility computing.
D. utility software. Reset Selection
Mark for Review What’s This?
Question 14 of 20
5.0 Points
In a __________ grid, the computers are just there to perform the grid’s computing tasks.
A. homogeneous
B. dedicated
C. pure
D. uniform Reset Selection
Mark for Review What’s This?
Question 15 of 20
5.0 Points
A(n) __________ ASP offers services for small businesses within a limited geographical area.
A. specialist or functional
B. vertical market
C. enterprise
D. local Reset Selection
Mark for Review What’s This?
Question 16 of 20
5.0 Points
An autonomic computing system must know its:
A. configuration.
B. capacity.
C. current status.
D. All of the above Reset Selection
Mark for Review What’s This?
Question 17 of 20
5.0 Points
The Linux operating system is an example of:
A. public domain software.
B. nonprotective open source software.
C. protective open source software.
D. proprietary software. Reset Selection
Mark for Review What’s This?
Question 18 of 20
5.0 Points
A __________ is a facility in which businesses can rent space for servers or other information systems equipment.
A. collocation facility
B. server room
C. data warehouse
D. server warehouse Reset Selection
Mark for Review What’s This?
Question 19 of 20
5.0 Points
__________ refers to the use of Internet technologies for placing telephone calls.
A. VoIP
B. IPT
C. IPP
D. PoIP Reset Selection
Mark for Review What’s This?
Question 20 of 20
5.0 Points
__________ are controls helping to ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.
A. Information systems controls
B. Audit controls
C. Infrastructure controls
D. Access controls Reset Selection
Exam 5
1. Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command
2. According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
3. __________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
4. Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
5. One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
6. Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
7. A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
8. The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
9. __________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
10. Encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
11. The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
12. __________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
13. The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
14. A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
15. Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
16. ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
17. To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
18. Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
19. Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
20. Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.
A. freaking
B. tricking
C. phishing
D. luring
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
