Exam 2 Flashcards

1
Q

The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The legal protection afforded an expression of an idea, such as a song, book, or video game

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The assurance that messages and information are available only to those who are authorized to view them

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer

A

Data scraping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence

A

Rule 41

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Policy that contains general principles regarding information privacy

A

Information privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When creating an employee monitoring policy, organizations should follow these common stipulations:

A

1) Be as specific as possible stating when and what will be monitored
2) Always enforce the policy the same for everyone
3) Expressly communicate that the company reserves the right to monitor all employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the electronic defacing of an existing website?

A

Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

A

Social media monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not an example of unplanned downtime?

A

System upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is software written with malicious intent to cause annoyance or damage?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is click fraud?

A

The abuse of pay-per- click, pay-per- call, and pay-per- conversation revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What includes a variety of threats such as viruses, worms, and Trojan horses?

A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks?

A

Cybersecurity and Infrastructure Security Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A

Cyber terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three areas where technology can aid in the defense against information security attacks?

A

Authentication and authorization, prevention and resistance, detection and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

A

Destructive agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3 ways to maintain information security that a company should include in their information security policy

A

1) Require computer users to log off before leaving for lunch
2) Never share user or password info with anyone
3) Change passwords every 30 to 60 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is pharming?

A

Reroutes requests for legitimate websites to false websites. Example, you type in the URL to your bank and pharming could redirect you to a fake site that collects your information. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Spear phishing

A

a phishing Expedition in which the emails are carefully designed to target a particular person or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

A

Vishing (voice phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The use of a false identity to artificially stimulate demand for a product brand or service

A

Sock puppet marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What decodes information?

A

Decryption 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the three business functions and MIS infrastructure supports?

A

Operations, change, and the environment/sustainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

A

An information MIS infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business

A

Enterprise architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A computer dedicated to providing information in response to requests

A

A server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An infrastructure built for notifying people in the event of an emergency

A

Emergency notification service

30
Q

Creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after disaster or extended disruption

A

Business continuity planning

31
Q

Three questions a company needs to answer when establishing a back up and recovery plan

A

1) What types of storage mechanism will meet the needs of the company?
2) How often does the company need to backup it’s information?
3) What types of recovery systems does the company infrastructure need?

32
Q

The information MIS infrastructure supports the day-to-day business operations and plans for

A

Security breaches and theft, floods and earthquakes, and malicious Internet attacks

33
Q

What is the primary reason a company has a failover system?

A

To take down the primary system for maintenance while the secondary system activates to ensure continuous operations

34
Q

The ability of an application to operate on different devices or software platforms, such as different operating systems 

A

Portability

35
Q

How quickly a system can transform to support environmental changes

A

Maintainability

36
Q

Focuses on prioritizing the order for restoring software, hardware, and data across the organization that Best meets business recovery requirements

A

Technology recovery strategy

37
Q

Cheap electricity is great for keeping Business energy costs down, but this means that we have to rely more on ______ for power

A

Coal

38
Q

The production, management, use, and disposal of technology in a way that minimizes damage to the environment

A

Sustainability or green MIS

39
Q

What is the amount of energy consumed by business processes and systems?

A

Energy consumption

40
Q

What is a company’s acknowledged responsibility to society?

A

Corporate social responsibility

41
Q

What is the software that makes the benefits of cloud computing possible, such as multi tenacity?

A

Cloud fabric

42
Q

What refers to the safe disposal of MIS assets at the end of their life cycle?

A

Sustainable MIS

43
Q

What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple ‘virtual’ machines all on a single computing device?

A

Virtualization

44
Q

What creates a virtual version of computing resources, such as an operating system, server, storage device, or network resource?

A

Virtualized system

45
Q

What offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas?

A

Big Data as a Service (BDaaS) 

46
Q

What is Data as a Service (DaaS)?

A

Facilitates the accessibility of business-critical data in a timely, secure, and affordable manner

47
Q

What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high or peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes?

A

Cloud bursting

48
Q

What is Big Data as a Service (BDaaS)?

A

Offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas

49
Q

What is a real time system?

A

Provides real time data in response to query requests

50
Q

What is one of the biggest pitfalls associated with real time data?

A

It continually changes

51
Q

What is an example of analytical data?

A

Future growth analysis, sales projections, and product statistics

52
Q

What are the two different categories of data type?

A

Transactional and analytical

53
Q

What is data validation?

A

The tests and evaluations used to determine compliance with data governance policies to ensure correctness of data

54
Q

What is the term for the management and oversight of an organizations data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?

A

Data stewardship

55
Q

What maintains data about various types of objects, events, people, and places?

A

Database

56
Q

What occurs when a system produces incorrect, inconsistent, or duplicate data?

A

Data integrity issue

57
Q

What creates, reads, updates, and deletes data in a database while controlling access and security?

A

Database management system

58
Q

What type of integrity constraint does not allow someone to create an order for a nonexistent customer?

A

Relational integrity constraint

59
Q

What is the logical view of data?

A

Focuses on how users logically access data to meet their particular business needs

60
Q

What is an example of a business critical integrity constraint?

A

A system will not allow returns of fresh produce after 15 days past delivery

61
Q

What is it called when a manager has so much data that they cannot make a decision?

A

Data Rich, information poor

62
Q

A data warehouse is a _______ collection of data, gathered from many different ________ databases, that supports business analysis activities and decision-making tasks 

A

Logical; operational

63
Q

What tool can you customize to display data quickly and run custom reports?

A

dashboard

64
Q

What is an individual item on a graph or a chart?

A

Datapoint

65
Q

Characteristics of data warehousing and business intelligence

A

1) They do not include data from other operational systems
2) operational data is mainly current
3) operational data frequently has quality issues

66
Q

A process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse

A

ETL (Extraction, transformation, and loading)

67
Q

What are problems associated with dirty data?

A

Duplicate data, incorrect data, violates business rules

68
Q

Examples of external databases in the data warehouse model?

A

Competitor and industry data, mailing list, and stock market analyses 

69
Q

A requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions ( blocks ) on the distributed ledger or Blockchain

A

Proof-of –work

70
Q

A type of digital currency in which a record of transactions is maintained, new units of currency are generated by the computational solution of mathematical problems, and operates independently of a central bank

A

Bitcoin

71
Q

What is a Blockchain?

A

A type of distributed ledger consisting of blocks of data

72
Q

What is a function that converts an input of letters and numbers into an encrypted output of a fixed length?

A

Hash