MIS 300 Exam 2 Spring 2011

Similar documents
Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Chapter 1 B: Exploring the Network

Technology in Action

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Securing Information Systems

Ethical Hacking and Prevention

Logical Network Design (Part II)

It is the process of sharing data, programs, and information between two or more computers.

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

IS Today: Managing in a Digital World 9/17/12

Chapter 10: Security and Ethical Challenges of E-Business

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Security Assessment Checklist

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Future-ready security for small and mid-size enterprises

CHAPTER 8 SECURING INFORMATION SYSTEMS

A Review Paper on Network Security Attacks and Defences

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Chapter 11: Networks

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Bachelor of Information Technology (Network Security)

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Malware, , Database Security

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Electronic Vaulting Services

4 Information Security

CompTIA Security+(2008 Edition) Exam

SUMMARIES OF INTERACTIVE MULTIMEDIA

Solution Architecture

Networks. Unit 5 Terminology Study Assignment Review Computer Technology. S3 Obj 2 1-3

Introduction to Information Security Dr. Rick Jerz

Riverbed Xirrus Cloud Processes and Data Privacy June 19, 2018

Wireless Attacks and Countermeasures

ECDL / ICDL IT Security. Syllabus Version 2.0

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

Wireless# Guide to Wireless Communications. Objectives

A1 ASSIGNMENT TERMINOLOGY.

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Networks with Cisco NAC Appliance primarily benefit from:

IBM Proventia Management SiteProtector Installation Guide

Cisco Cisco Sales Expert. Practice Test. Version

Vocabulary Bank organized by module

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

NETWORK THREATS DEMAN

COPYRIGHTED MATERIAL. Index

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

Course Outline (version 2)

Chapter 11: It s a Network. Introduction to Networking

Communications and Networks

Datacenter replication solution with quasardb

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Position Title: IT Security Specialist

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

E-companion. Quiz for IT-knowledge

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Technical Architecture. Section 1. System Infrastructure & Scalability. Yes No Comments

Children s Health System. Remote User Policy

Total Threat Protection. Whitepaper

SECURE USE OF IT Syllabus Version 2.0

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Copyright 2006 Prentice-Hall. All rights reserved. 1

CompTIA Network+ Study Guide Table of Contents

Standard For IIUM Wireless Networking

Wireless and Network Security Integration Solution Overview

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Chapter 5 Local Area Networks. Computer Concepts 2013

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Certified Information Systems Auditor (CISA)

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

COMPUTER TECHNOLOGY (COMT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Industrial Control System Security white paper

Chapter 19 Security. Chapter 19 Security

Table of Contents (CISSP 2012 Edition)

Xceedium Xio Framework: Securing Remote Out-of-band Access

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Security Awareness. Presented by OSU Institute of Technology

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Available Instructor Resources Resource File Name Found

Campus Network Design

MigrationWiz Security Overview

MOBILE NETWORK ACCESS CONTROL

NetDefend Firewall UTM Services

Securing the Converged Enterprise, Part I

Transcription:

MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for. You may write on this question set. Record your answers on the ScanTron form. 1.? is intangible, creative work embodied in a physical form. A. Copyright B. Counterfeit software C. Fair use doctrine D. Intellectual property E. Pirated software 2. Privacy is the assurance that messages and information are available only to those who authorized to view them. 3. The? is a policy that a user must agree to follow in order to be provided access to a network or to the Internet. A. Acceptable use policy B. Anti-spam policy C. Ethical computer use policy D. Information privacy policy E. Internet use policy 4. E-mail traveling between your computer and the recipient s computer is generally not secure because servers store the e-mail temporarily and administrators may view the messages. 5. A (an)? is a program that records every keystroke and mouse click, and transmits the information to the person who installed the program. A. Adware B. Backdoor program C. Key logger or key trapper software D. Spyware 1

6. The CIA information security triangle identifies three critical information security issues, including?. A. Accessibility B. Availability C. Control D. Inspection E. All of the above 7. A? is a person who finds hacking code on the Internet and click-and-points his or her way into systems to cause damage or spread viruses. A. Black-hat hacker B. Cracker C. Cyberterrorist D. Hactivist E. Script kiddy or script bunny 8. Both viruses and worms can cause damage to computers; a virus relies on people to spread while a worm actively attempts to gain access to computers on its own. 9. Social engineering occurs when an attacker floods a website with so many requests for service that it slows down or crashes. 10.? is a method for authenticating users based on how individuals do something, such as how they write their signatures. A. Something the user does B. Something the user has C. Something the user is D. Something the user knows 11. An authorization consists of?. A. A person or group B. A resource C. The type of access D. All of the above E. None of the above 2

12. With public key encryption, a server or website (e.g., Amazon) sends the same public key to every user so that the users may send information to the server in a form only the server may understand. 13. A (an)? is hardware or software that protects a private network by analyzing information entering and leaving the network. A. Anti-spyware system B. Antivirus system C. Denial of access system D. Firewall 14. A backup should be stored offline, offsite, and in a secure location. 15. An enterprise architecture includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets. 16. An? includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization s goals. A. Application architecture B. Information architecture C. Infrastructure architecture D. None of the above 17. One of the desired qualities of an infrastructure architecture is?, which deals with how well a system can adapt to increased demands. A. Availability B. Flexibility C. Performance D. Reliability E. Scalability 18. Web services consist of a collection of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services. 3

19. Open source is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. 20.? is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. A. Failover B. Fault tolerance C. Recovery D. Reliable computing 21. A? is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster and install systems, software, and other resources to continue operations. A. Cold site B. Warm site C. Hot site D. All of the above E. None of the above 22. Service oriented architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services. 23.? is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. A. Accommodative computing B. Cooperative computing C. Interoperability D. Shared computing 24. Tight coupling is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components. 4

25.? enables virtualization of user-oriented systems such as the operating systems running on personal and laptop computers. A. Application virtualization B. Desktop virtualization C. Server virtualization D. End-user computing virtualization 26. Which of the following is not a reason for organizations to adopt virtualization? A. Data centers running out of space B. Hardware underutilized C. Increased energy costs D. System administration costs mounting E. All of the above are reasons to adopt virtualization 27. Grid computing is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data. 28. Information granularity refers to the extent of detail within the information. Information may be detailed, summary, or aggregate. 29.? encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks. A. Analytical information B. Decisional information C. Operational information D. Transactional information 30. A (an)? provides immediate, up-to-date information in response to query requests. A. Batch system B. Online system C. Real-time system D. None of the above 5

31.? addresses the question, Is aggregate or summary information in agreement with detailed information. A. Accuracy B. Completeness C. Consistency D. Timeliness E. Uniqueness 32. A (an)? is a characteristic or property of a person, place, thing, transaction, or event about which information is stored. A. Field, attribute, or column B. Record, entity, or object C. Relationship D. Table or class 33. A primary key is a field (or group of fields) that uniquely identifies a given entity (record) in a table. 34. A (an)? is a constraint that determines acceptable values for a field. A. Field constraint B. Referential integrity constraint C. Validation rule D. Value constraint 35. Redundancy is the duplication of information in multiple places. 36.? is a set of Structured Query Language (SQL) commands used to define structures in a database, including tables, fields, and relationships. A. Data Definitional Language (DDL) B. Data Manipulation Language (DML) C. Data Query Language (DQL) D. None of the above 6

37.? is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks. A. Data store B. Information store C. Data warehouse D. Information warehouse 38. Extraction, transformation, and loading (ETL) is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse. 39. Data scanning is the process of analyzing data to extract information not offered by the raw data alone. 40. A network is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. 41. A? is a network spanning a facility. A. Campus area network (CAN) B. Local area network (LAN) C. Metropolitan area network (MAN) D. Valued-added network (VAN) E. Wide area network (WAN) 42. A? is a private network, provided by a third party, for exchanging information through a high capacity connection. This type of network supports business-to-business exchanges. A. Campus area network (CAN) B. Local area network (LAN) C. Metropolitan area network (MAN) D. Valued-added network (VAN) E. Wide area network (WAN) 7

43. A? is a way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization s network. A. Business security network (BSN) B. Secured business network (SBN) C. Valued-added network (VAN) D. Virtual private network (VPN) 44. Although the cellular network is useful for individual communications, businesses generally do not use the cellular network. 45.? is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants (PDAs) can be easily interconnected using a shortrange wireless connection. A. Bluetooth B. Greenacher C. inet D. Mininet 46.? is commonly used to transmit network signals over great distances, using a specific radio frequency, along a line of site between towers. A. Line of site radio frequency (LSRF) B. Microwave C. Wireless fidelity (wi-fi) D. WiMax 47.? is a means of linking computers using radio signals over short distances like within a home or office. A. Line of site radio frequency (LSRF) B. Microwave C. Wireless fidelity (wi-fi) D. WiMax 8

48.? is a telecommunications technology aimed at providing wireless data over long distances using radio frequencies. This technology uses a central tower to provide communications over a large area. A. Line of site radio frequency (LSRF) B. Microwave C. Wireless fidelity (wi-fi) D. WiMax 49.? is a system designed to work with information that can be shown on a map. A. Geographic information system (GIS) B. Global Positioning System (GPS) C. Location-based services (LBS) D. Mapping information system (MIS) 50. Radio formatted information diodes (RFID) uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Turn in this question set and your ScanTron form. 9