MIS Flashcards

1
Q

Which of the following is an automated method of seeking passwords?

a) Phishing
b) Social Engineering
c) Software Bugs
d) Backdoors
e) Careless behavior

A

Phishing

Chapter 13 (page 353)
The process of social engineering can be “automated” using a technique called phishing.
The act of phishing is the act of collecting personal information, and a number of creative methods have been devised to direct traffic to the phony website and fool people into complying by crafting official-sounding messages from reputable institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is spyware usually not considered a virus?

a) It does not have a payload
b) It does not do anything other than
watch what the user does
c) It does not self-replicate
d) It only show advertisements
e) None of the above. They are
always viruses

A

It does not self-replicate

Chapter 13 (page 357)
Spyware is software that, unbeknownst to the owner of the computer, monitors behavior, collects information, and either transfer this information to a third party via the Internet or performs unwanted operations.
While spyware differs from viruses, in that it cannot self-replicate, it can create significant problems for an organization. . Beyond the malicious and often fraudulent effects of spyware, these programs divert resources and often slow down the user’s legitimate work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is a trojan horse not a virus?

a) It does not have a payload
b) It does not have a trigger event
c) It does not self-replicate
d) It is a legitimate form of security
protection
e) It does not do anything harmful

A

It does not self-replicate

Chapter 13 (page 356)
A computer program that claims to, and sometimes does, delivers some useful functionality. But the Trojan horse hides a dark side and, like a virus, delivers a malicious payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following refers to code built into a program to allow the programmer a way to bypass password protection?

a) Password Spoofing
b) Bugs
c) Viruses
d) Phishing
e) Backdoors

A

Backdoors

Chapter 13 (page 353)

Code built into software programs to allow access to an application by circumventing password protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Function creep is the situation where data collected for a stated or implied purpose is later on reused for the same purpose. True or false?

A

False

Chapter 13 (page 371)

Function creep occurs when data collected for a stated or implied purpose are then reused for other, unrelated objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious cyberactivity is decreasing due to improvements in software protection systems. True or False?

A

False

Chapter 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Creating security policies that spell out the behaviors that should be followed in order to minimize security risks and auditing the policies to ensure compliance will mitigate security risks. True or False>

A

True

Chapter 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Audit the current resources, technological, and human, provides the basis for:

a) Risk Reduction
b) Risk Transference
c) Risk Assessment
d) Risk Increase
e) Reward Mechanism

A

Risk Assessment

Chapter 13 (page 349)
The risk assessment process consists of auditing the current resources, technological as well as human, in an effort to map the current state of the art of information systems security in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is security considered a negative deliverable?

a) It costs money
b) It is largely ignored
c) It does not affect profits whether it is done well or poorly
d) It produces no revenue or efficiency
e) It produces only tangible benefits

A

It produces no revenue or efficiency

Chapter 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a viable method of dealing with internal security threats?

a) Antivirus software
b) Firewalls
c) Policies regarding what computing resources are accessible to whom
d) Policies that mandate frequent updates to program and such
e) Not immediately deleting terminated employees

A

Policies regarding what computing resources are accessible to whom

Chapter 13 (page 351)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following risk strategies is associated with increased potential for failure?

a) Avoidance
b) Acceptance
c) Analysis
d) Transference
e) Reduction

A

Acceptance

Chapter 13 (page 350)
Risk acceptance
This strategy consists of not investing in countermeasures and not reducing the security risk. The more an organization gravitates toward this strategy, the higher the potential failure cost it faces while minimizing anticipation costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an example of an internal threat?

a) Backdoors
b) Viruses
c) Social Engineering
d) External Intrusions
e) Employee’s careless behavior

A

Employee’s careless behavior

Chapter 13 (page 351)
Internal threats are those posed by individuals who have direct, on-premises access to the firm’s technology infrastructure or those who have legitimate reasons t be using the firm’s assets.
When addressing internal security threats, we can separate them into two categories:
Intentional Malicious Behavior and
Careless Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk mitigation allows the organization to do what?

a) Devise optimal strategies given the security risk the organization faces
b) Prevent security issues from ever happening in the first place
c) Keep both costs and risks at minimum levels
d) Minimize failure costs
e) Reward IT workers when no issues arise

A

Devise optimal strategies given the security risk the organization faces

Chapter 13 (page 349)
Risk mitigation is the process of matching the appropriate response to the cybersecurity threats your firm has identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Function Creep, when used in terms of privacy risks, refers to new technological advances and devices that generate more data than ever. True or False?

A

False

Chapter 13 (page 371)

Function creep occurs when data collected for a stated or implied purpose are then reused for other, unrelated objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk audit provides the basis for:

a) Risk Reduction
b) Risk Transference
c) Risk Analysis
d) Risk Increase
e) Reward Mechanism

A

Risk Analysis

Chapter 13 (page 349)
Risk analysis is the process by which the firm attempts to quantify the hazards identified in the audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a company is faced with a security threat, they have which three strategies available to them?

a) Acceptance, avoidance, and transference
b) Acceptance, reduction, and transference
c) Avoidance, reduction, and transference
d) Acceptance, avoidance, and reduction
e) All of the above

A

Acceptance, reduction , and transference

Chapter 13 (page 350)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Increased anticipation costs are most directly associated with which risk strategy?

a) Acceptance
b) Avoidance
c) Analysis
d) Reduction
e) Transference

A

Reduction

Chapter 13 (page 350)
Risk Reduction
This strategy consists of actively investing in the safeguards designed to mitigate security threats. The more an organization gravitates toward this strategy, the higher the anticipation cost if faces while actively reducing failure costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Insurance costs are most directly associated with which risk strategy?

a) Acceptance
b) Avoidance
c) Analysis
d) Reduction
e) Transference

A

Transference

Chapter 13 (page 350)
Risk transference
This strategy consists of passing a portion (or all) of the risks associated with cybersecurity to a third party (e.g., by outsourcing security or buying insurance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IT Risk Management is the process of identifying and measuring information systems security risks to devise the optimal mitigation strategy. True or False?

A

True

Chapter 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is not a form of malware?

a) Viruses
b) Spyware
c) Sniffers
d) Keyloggers
e) Worms

A

Sniffers

Chapter 13 (page 356)
Malicious code also known as malware refers to software programs that are designed to cause damage to individuals’ and/or organizations’ IT assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

1-2

a)
b)
c)
d)
e)

A

1-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

1-3

A

1-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

1-4

A

1-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1-5

A

1-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

1-6

A

1-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

1-7

A

1-7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

1-8

A

1-8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

1-9

A

1-9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

1-10

A

1-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

1-11

A

1-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

1-12

A

1-12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

1-13

A

1-13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

1-14

A

1-14

34
Q

1-15

A

1-15

35
Q

1-16

A

1-16

36
Q

1-17

A

1-17

37
Q

1-18

A

1-18

38
Q

1-19

A

1-19

39
Q

1-20

A

1-20

40
Q

2-1

A

2-1

41
Q

2-2

A

2-2

42
Q

2-3

A

2-3

43
Q

2-4

A

2-4

44
Q

2-5

A

2-5

45
Q

2-6

A

2-6

46
Q

2-7

A

2-7

47
Q

2-8

A

2-8

48
Q

2-9

A

2-9

49
Q

2-10

A

2-10

50
Q

2-11

A

2-11

51
Q

2-12

A

2-12

52
Q

2-13

A

2-13

53
Q

2-14

A

2-14

54
Q

2-15

A

2-15

55
Q

2-16

A

2-16

56
Q

2-17

A

2-17

57
Q

2-18

A

2-18

58
Q

2-19

A

2-19

59
Q

In a recent board meeting the CFO remarked the necessity to ‘attack on capital expenditures (CAPEX) favoring more variable cost structures. What could the CIO do to support this transition?

a. To accelerate the planned investments in the IT infrastructure.
b. To migrate part of the infrastructure to the cloud.
c. To migrate to a NoSQL architecture.
d. to reduce the non-local IT staff

A

To migrate part of the infrastructure to the cloud.

Chapter 3

60
Q

Batch processing is a vestige of the past and is increasingly abandoned.
True
False

A

False

Chapter 3 (page 67)

61
Q

Which kind of analytics are typically present in reports and visualizations through executive dashboards, OLAP tools or scorecards?

a. Big data analytics
b. Descriptive analytics
c. Predictive analytics
d. Prescriptive analytics

A

Descriptive analytics

Chapter 3

62
Q

What kind of analytics consists of optimization algorithms that seek to identify targets to guide decisions or monitor current operations?

a. Big data analytics
b. Descriptive analytics
c. Predictive analytics
d. Prescriptive analytics

A

Prescriptive analytics

Chapter 3 (page 65)

63
Q

Which are the three dimensions in trade-off considered by the CAP theorem?

a. Certain, available, and processed
b. Coherence, access, and portion
c. Compliance, analysis, and processing
d. Consistency, availability, and partition

A

Consistency, availability, and partition

Chapter 3

64
Q

Which among these trends was the catalyst for the current attention to analytics?

a. Analytics becoming more important
b. Declining costs of computing power
c. Declining storage costs
d. Proliferation of data generated by sensors, machines and humans

A

Proliferation of data generated by sensors, machines and humans

Chapter 3 (page 67)

65
Q

In a recent conversation with your CIO she evoked the need to adopt for certain operations, a document-oriented database with dynamic schema. To which category of DMBS was she referring?

a. MySQL databases
b. NoSQL databases
c. Relational databases
d. SQL databases

A

NoSQL databases

Chapter 3

66
Q

Which is the focus of ‘descriptive analytics?

a. To better understand what has occurred
b. To better understand what should occur
c. To better understand what will occur
d. To guide managerial decisions

A

To better understand what has occurred

Chapter 3 (page 65)

67
Q

In a recent brief the CIO announced the decision to adopt a new ERP system embedding industry’s best practices. What did it mean when he referred to ‘best practices?

a. The best-in-class solutions are integrated to provide optimal performance
b. That industry’s optimal techniques, activities and processes are identified and codified in the software
c. That the best software applications are integrated in the new ERP
d. That the coders made the greatest effort to improve the efficiency of the ERP

A

That industry’s optimal techniques, activities and processes are identified and codified in the software

Chapter 3 (page 60)

68
Q

We identified four main eras of data processing in business, what characterizes the ‘business intelligence era?

a. The use of new technologies and management practices to leverage the increasing amounts of collected data.
b. The use of transactions for decision support
c. Transactions were batched and processed by a mainframe as they occurred
d. Transactions were stored in large mainframe databases called ‘batch’

A

The use of transactions for decision support

Chapter 3 (page 71)

69
Q

What is the focus of ‘predictive analytics’ ?

a. To better understand what has occurred
b. To better understand what should occur
c. To better understand what will occur
d. To guide managerial decisions

A

To better understand what will occur

Chapter 3 (page 65)

70
Q

Online transaction processing (OLTP) systems are designed to provide real-time or near real-time results.
True
False

A

True

Chapter 3 (page 69)

71
Q

BitTorrent is a software that enables data and file sharing on the Internet directly among users. Which of the following best describes its architecture?

a. Centralized
b. Client-server
c. Distributed
d. Peer-to-peer

A

Peer-to-peer

Chapter 3

72
Q

What does the term ‘business analytics’ mean?

a. The activities performed by business analysts
b. The examination of business data in an effort to reveal useful insight for better decision-making.
c. The use of advanced data processing techniques on business data
d. The use of computers to explore large pools of data

A

The examination of business data in an effort to reveal useful insight for better decision-making.

Chapter 3 (page 65)

73
Q

Which kind of the following best describes the cloud delivery model of Amazon Web Services (AWS)?

a. Infrastructure as a service (IaaS)
b. Packaged software
c. Platform as a service (Paas)
d. Software as a service (SaaS)

A

Infrastructure as a service (IaaS)

Chapter 3

74
Q

A NoSQL database adhere to the relation model.
True
False

A

False

Chapter 3

75
Q

We identified four main eras of data processing in business, what characterizes the ‘big data era’?

a. The use of new technologies and management practices to leverage the increasing amounts of collected data.
b. The use of transactions for decision support
c. Transactions were batched and processed by a mainframe as they occurred
d. Transactions were stored in large mainframe databases called ‘batch’

A

The use of new technologies and management practices to leverage the increasing amounts of collected data

Chapter 3

76
Q

Why is a trojan horse not a virus?

A
77
Q

Audi

A
78
Q

Risk mitigation allows the organization to do what?

Chapter 13

A

Devise optimal strategies given the security risk the organization faces

Chapter 13 (page 349)
Risk mitigation is the process of matching the appropriate response to the cybersecurity threats your firm has identified.

79
Q

Risk mitigation allows the organization to do what?

Chapter 13

A

Devise optimal strategies given the security risk the organization faces

Chapter 13 (page 349)
Risk mitigation is the process of matching the appropriate response to the cybersecurity threats your firm has identified.

80
Q

Risk mitigation allows the organization to do what?

Chapter 13

A

Devise optimal strategies given the security risk the organization faces

Chapter 13 (page 349)
Risk mitigation is the process of matching the appropriate response to the cybersecurity threats your firm has identified.

81
Q

Insurance costs are most directly associated with which risk strategy?

a) Acceptance
b) Avoidance
c) Analysis
d) Reduction
e) Transference

A

Transference

Chapter 13 (page 350)
Risk transferences
The strategy consists of actively investing in the safeguards designed to mitigate security threats. The more an organization gravitates toward this strategy, the higher the anticipation cost it faces while actively reducing failure costs.