IS Final Flashcards
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor’s site, a small program called Mitglider was downloaded to the user’s machine. The program enables outsiders to infiltrate the user’s machine. What time of Malware is this?
Trojan Horse
All malicious software programs can replicate themselves and spread over all files in an infected PC:
False
The term cracker is used to identify a hacker who specialty is breaking open security systems:
False
Redirecting a web link to a different address as a form of:
Spoofing
Both computer viruses and worms are attached to a computer file and rely on the infected file to spread.
False
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ______ attack.
DDos
And example of phishing is:
Setting up a fake medical website that ask user for confidential information
Installing antivirus software can guarantee that your computer is virus free.
False
WEP is a more secure encryption standard than WPA2.
False
Zero-day vulnerabilities are an industry standard to ensure software programs are bug free when first released.
False
Tricking a vendor to reveal a customer’s account info by pretending to be the spouse of the customer is called:
Social engineering
Enterprise software is built around thousands of pre-defined business processes that reflect:
Best practices in the industry
Enterprise software is expressly built to allow companies to facilitate their unique business practices.
False
You have been asked to implement enterprise system software for a manufacture of kitchen appliances. What is the first step you should take?
Select the functions of the system you wish to use
To achieve maximum benefit from an enterprise software package, a business:
Changes the way it works to match the software’s business processes
A company’s suppliers, supplier’s suppliers, and the processes for managing relationships with them forms:
The upstream portion of the supply chain
Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain.
False
SCM systems can help organizations reduce the bullwhip by:
Reducing information uncertainty
Among the various players in the supply chain, which has the most excess inventory due to bullwhip effect?
Supplier
Supply change management systems are a type of enterprise system.
False
Capabilities of supply chain execution systems do not include:
Identify the optimal transportation mode
In a push base model, who determines the demand?
Manufacturer
Which of the following differs from the other three supply chain models?
Stock based
The integration video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce?
Richness