IS Final Flashcards
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor’s site, a small program called Mitglider was downloaded to the user’s machine. The program enables outsiders to infiltrate the user’s machine. What time of Malware is this?
Trojan Horse
All malicious software programs can replicate themselves and spread over all files in an infected PC:
False
The term cracker is used to identify a hacker who specialty is breaking open security systems:
False
Redirecting a web link to a different address as a form of:
Spoofing
Both computer viruses and worms are attached to a computer file and rely on the infected file to spread.
False
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ______ attack.
DDos
And example of phishing is:
Setting up a fake medical website that ask user for confidential information
Installing antivirus software can guarantee that your computer is virus free.
False
WEP is a more secure encryption standard than WPA2.
False
Zero-day vulnerabilities are an industry standard to ensure software programs are bug free when first released.
False
Tricking a vendor to reveal a customer’s account info by pretending to be the spouse of the customer is called:
Social engineering
Enterprise software is built around thousands of pre-defined business processes that reflect:
Best practices in the industry
Enterprise software is expressly built to allow companies to facilitate their unique business practices.
False
You have been asked to implement enterprise system software for a manufacture of kitchen appliances. What is the first step you should take?
Select the functions of the system you wish to use
To achieve maximum benefit from an enterprise software package, a business:
Changes the way it works to match the software’s business processes
A company’s suppliers, supplier’s suppliers, and the processes for managing relationships with them forms:
The upstream portion of the supply chain
Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain.
False
SCM systems can help organizations reduce the bullwhip by:
Reducing information uncertainty