Details of this Paper

Strategic IT MC questions exam 3




Exam 3;Question 1 of 20;5.0 Points;is the operating system of choice for Web servers, embedded system, and supercomputers alike.;A. Tux;B. Pengu-ware;C. Linux;D. Unix Reset Selection;Mark for Review What's This?;Question 2 of 20;5.0 Points;When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use?;A. Pause transaction processing while analytical processing is occurring.;B. Only allow transaction processing during off-peak hours.;C. Replicate all transactions on a second database server and run analytical processing off of the second server.;D. None of the above Reset Selection;Mark for Review What's This?;Question 3 of 20;5.0 Points;Which of the following is NOT considered a core business process?;A. Manufacture goods;B. Hire employees;C. Sell products;D. Provide service Reset Selection;Mark for Review What's This?;Question 4 of 20;5.0 Points;Software asset management includes all of the following EXCEPT;A. performing a software inventory.;B. matching installed software with licenses.;C. creating a software asset management plan.;D. All of these are part of software asset management. Reset Selection;Mark for Review What's This?;Question 5 of 20;5.0 Points;The Windows Update Service is an example of a __________ system.;A. bug-fixing;B. patch management;C. software asset management;D. online help and repair Reset Selection;Mark for Review What's This?;Question 6 of 20;5.0 Points;is a set of best practices that help organizations? maximize the benefits from their information systems infrastructure while at the same time establishing appropriate controls.;A. CMMS;B. CAAT;C. S-OX;D. COBIT Reset Selection;Mark for Review What's This?;Question 7 of 20;5.0 Points;Systems for gaining business intelligence __________ data in order to better manage the organization.;A. gather;B. process and analyze;C. store;D. All of the above Reset Selection;Mark for Review What's This?;Question 8 of 20;5.0 Points;can increase the reliability of an organization’s information systems infrastructure.;A. On-demand computing;B. Grid computing;C. Autonomic computing;D. Pay-per-use computing Reset Selection;Mark for Review What's This?;Question 9 of 20;5.0 Points;Graphical software tools that provide complex analysis of stored data are;A. OLTP.;B. OLAP.;C. OLST.;D. OLIP. Reset Selection;Mark for Review What's This?;Question 10 of 20;5.0 Points;is the use of the Internet Protocol for transporting voice, video, fax, and data traffic.;A. IP conveyance;B. IP integration;C. IP communication;D. IP convergence Reset Selection;Mark for Review What's This?;Question 11 of 20;5.0 Points;Systems designed to perform specific, predefined tasks such as a digital video recorder (TiVo) or a network router are referred to as __________ systems.;A. integrated;B. specific;C. embedded;D. special-purpose Reset Selection;Mark for Review What's This?;Question 12 of 20;5.0 Points;A __________ backup site is a backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else.;A. hot;B. cold;C. empty;D. dormant Reset Selection;Mark for Review What's This?;Question 13 of 20;5.0 Points;Application service providers offer;A. on-demand computing.;B. on-demand software.;C. utility computing.;D. utility software. Reset Selection;Mark for Review What's This?;Question 14 of 20;5.0 Points;In a __________ grid, the computers are just there to perform the grid’s computing tasks.;A. homogeneous;B. dedicated;C. pure;D. uniform Reset Selection;Mark for Review What's This?;Question 15 of 20;5.0 Points;A(n) __________ ASP offers services for small businesses within a limited geographical area.;A. specialist or functional;B. vertical market;C. enterprise;D. local Reset Selection;Mark for Review What's This?;Question 16 of 20;5.0 Points;An autonomic computing system must know its;A. configuration.;B. capacity.;C. current status.;D. All of the above Reset Selection;Mark for Review What's This?;Question 17 of 20;5.0 Points;The Linux operating system is an example of;A. public domain software.;B. nonprotective open source software.;C. protective open source software.;D. proprietary software. Reset Selection;Mark for Review What's This?;Question 18 of 20;5.0 Points;A __________ is a facility in which businesses can rent space for servers or other information systems equipment.;A. collocation facility;B. server room;C. data warehouse;D. server warehouse Reset Selection;Mark for Review What's This?;Question 19 of 20;5.0 Points;refers to the use of Internet technologies for placing telephone calls.;A. VoIP;B. IPT;C. IPP;D. PoIP Reset Selection;Mark for Review What's This?;Question 20 of 20;5.0 Points;are controls helping to ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.;A. Information systems controls;B. Audit controls;C. Infrastructure controls;D. Access controls Reset Selection;Exam 5;1. Viruses that attach themselves to files with certain extensions, such as.doc or.exe., are __________ viruses.;A. boot sector;B. file infector;C. file destroyer;D. file command;2. According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.;A. 25 percent or less;B. 50 percent;C. 75 percent;D. nearly 90 percent;3. __________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.;A. Johann Gutenberg;B. Phil Zimmerman;C. William (Bill) Gates;D. Tim Burners-Lee;4. Which of the following is NOT an example of a computer crime as listed in the textbook?;A. Data diddling;B. Salami slicing;C. Piggybacking;D. Cold calling;5. One common way to gain access to a password-protected system is to use a __________ approach.;A. back-door;B. ?sneak peek?;C. brute-force;D. social engineering;6. Persons who plant viruses are called;A. computer hackers.;B. cyberterrorists.;C. vandals.;D. predators.;7. A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called;A. authentication.;B. privacy/confidentiality.;C. nonrepudiation.;D. integrity.;8. The global reach of computer networks has raised concerns over;A. copyrights.;B. privacy.;C. security.;D. All of the above;9. __________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.;A. Access control software;B. Computer security software;C. Application restriction software;D. Data protection software;10. Encryption software allows users to ensure;A. authentication.;B. privacy/confidentiality.;C. nonrepudiation.;D. All of the above;11. The slang term for stolen software is;A. hackerware.;B. warez.;C. vaporware.;D. discountware.;12. __________ are the least used security technology.;A. Passwords;B. Biometrics;C. Encrypted files;D. Firewalls;13. The Computer Fraud and Abuse Act of 1986 prohibited;A. stealing or compromising data about national defense and foreign relations.;B. breaking into any electronic communications service.;C. monitoring voice communications.;D. stealing trade secrets.;14. A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.;A. information systems security plan;B. disaster recovery plan;C. infrastructure management;D. risk assessment plan;15. Crimes committed against telephone company computers are an example of;A. phreaking.;B. spoofing.;C. social engineering.;D. data diddling.;16. ECPA is an acronym that refers to the;A. Electronic Controls Privacy Act.;B. Electronic Communications Privacy Act.;C. E-Commerce Customer Protection Association.;D. Electric Computer Protection Agency.;17. To execute denial of service attacks, intruders often use __________ computers.;A. zombie;B. monster;C. robot;D. android;18. Examples of the ethical conundrum include all EXCEPT;A. using computer time at work to read personal e-mail.;B. organizations compiling personal information about shopping habits.;C. the government regulating computer crimes.;D. using technology to rearrange photographs.;19. Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the;A. Information Age.;B. Industrial Revolution.;C. Agriculture and Handwork Age.;D. Modern Age.;20. Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.;A. freaking;B. tricking;C. phishing;D. luring


Paper#29144 | Written in 18-Jul-2015

Price : $47