Term
What is a form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move? |
|
Definition
|
|
Term
What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium? |
|
Definition
|
|
Term
What detects the presence or absence of a mark in a predetermined place (popular for multiple-choice exams)? |
|
Definition
C. Optical-mark recognition |
|
|
Term
What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time? |
|
Definition
|
|
Term
|
Definition
A. Controls how the various technology tools work together along with the application software |
|
|
Term
What is application software? |
|
Definition
D. Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others |
|
|
Term
What organizes information on a hard disk in the most efficient way? |
|
Definition
|
|
Term
What provides the tools for data retrieval, modification, deletion, and insertion? |
|
Definition
|
|
Term
What is the recommended way to implement information security lines of defense? |
|
Definition
A. People first, technology second |
|
|
Term
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? |
|
Definition
|
|
Term
What identifies the rules required to maintain information security? |
|
Definition
B. Information security policies |
|
|
Term
Which of the following is not one of the five steps for creating an information security plan? |
|
Definition
C. Revise and test the information security policies |
|
|
Term
What is social engineering? |
|
Definition
A. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
|
Term
Which of the following is not one of the top 10 questions managers should ask regarding information security? |
|
Definition
D. How do we identify potential insiders? |
|
|
Term
Which of the following is not one of the three primary information security areas? |
|
Definition
C. Detection and resistance |
|
|
Term
What is a method for confirming users' identities? |
|
Definition
|
|
Term
What is the most secure type of authentication? |
|
Definition
D. Combination of all of the above |
|
|
Term
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing? |
|
Definition
|
|
Term
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting? |
|
Definition
|
|
Term
Which of the following is considered a type of biometrics? |
|
Definition
|
|
Term
What is the most costly and intrusive form of authentication? |
|
Definition
C. Something that is part of the user such as a fingerprint or voice signature |
|
|
Term
Which of the following authentication methods is 100 percent accurate? |
|
Definition
|
|
Term
A. Content filtering, encryption, firewalls |
|
Definition
A. Content filtering, encryption, firewalls |
|
|
Term
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information? |
|
Definition
|
|
Term
|
Definition
C. A form of unsolicited email |
|
|
Term
|
Definition
B. Scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
Which of the following can be completed by encryption?
A. Switch the order of characters
B. Replace characters with other characters
C. Use a mathematical formula to convert the information into some sort of code
D. All of the above |
|
Definition
|
|
Term
Where do organizations typically place firewalls? |
|
Definition
D. Between the server and the Internet |
|
|
Term
Which of the following does a firewall perform? |
|
Definition
|
|
Term
What includes a variety of threats such as viruses, worms, and Trojan horses? |
|
Definition
|
|
Term
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender? |
|
Definition
|
|
Term
What is the most common type of defense within detection and response technologies? |
|
Definition
|
|
Term
Who works at the request of the system owners to find system vulnerabilities and plug the holes? |
|
Definition
|
|
Term
Who breaks into other people's computer systems and just looks around or steals and destroys information? |
|
Definition
|
|
Term
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses? |
|
Definition
|
|
Term
Who are hackers with criminal intent? |
|
Definition
|
|
Term
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction? |
|
Definition
|
|
Term
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer? |
|
Definition
|
|
Term
What floods a website with so many requests for service that it slows down or crashes the site? |
|
Definition
C. Denial-of-service attack |
|
|
Term
Which is a virus that opens a way into the network for future attacks? |
|
Definition
|
|
Term
If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech? |
|
Definition
C. Detection and response |
|
|
Term
What are the principles and standards that guide our behavior toward other people? |
|
Definition
|
|
Term
What is intangible creative work that is embodied in physical form? |
|
Definition
|
|
Term
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? |
|
Definition
|
|
Term
What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes? |
|
Definition
|
|
Term
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent? |
|
Definition
|
|
Term
What is software that is manufactured to look like the real thing and sold as such? |
|
Definition
|
|
Term
What is the unauthorized use, duplication, distribution, or sale of copyrighted software? |
|
Definition
|
|
Term
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment? |
|
Definition
|
|
Term
Which of the following describes privacy? |
|
Definition
C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent |
|
|
Term
Which of the following describes privacy? |
|
Definition
C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent |
|
|
Term
Which of the following describes epolicies? |
|
Definition
B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment |
|
|
Term
47. Which of the following is not considered an epolicy? |
|
Definition
D. Anti-hacker use policy |
|
|
Term
Which of the following is included in the four quadrants of ethical and legal behavior? |
|
Definition
|
|
Term
What is the ideal type of decisions for people in an organization to make? |
|
Definition
|
|
Term
What was the primary problem Saab encountered with one of its marketing companies? |
|
Definition
C. Contacted customers regardless of their opt-out or opt-in decision |
|
|
Term
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer? |
|
Definition
|
|
Term
Which act allows any person to examine government records unless it would cause an invasion of privacy? |
|
Definition
C. Freedom of Information Act |
|
|
Term
Which act restricts what information the federal government can collect? |
|
Definition
|
|
Term
. Which act protects investors by improving the accuracy and reliability of corporate disclosures? |
|
Definition
|
|
Term
Which act strengthened criminal laws against identity theft? |
|
Definition
|
|
Term
Which of the following is not one of the six principles for ethical information management according to CIO magazine? |
|
Definition
D. The CIO is responsible for how outsiders view and analyze corporate information |
|
|
Term
What is the policy that contains general principles to guide computer user behavior? |
|
Definition
|
|
Term
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions? |
|
Definition
D. Ethical computer use policy |
|
|
Term
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules. |
|
Definition
|
|
Term
If an organization were to have only one policy, which one would it want? |
|
Definition
D. Ethical computer use policy |
|
|
Term
Which policy contains general principles regarding information privacy? |
|
Definition
A. Information privacy policy |
|
|
Term
Which of the following represents the classic example of unintentional information reuse? |
|
Definition
B. Social Security number |
|
|
Term
What is one of the guidelines an organization can follow when creating an information privacy policy? |
|
Definition
|
|
Term
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet? |
|
Definition
|
|
Term
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions? |
|
Definition
|
|
Term
Which policy typically contains a nonrepudiation clause? |
|
Definition
|
|
Term
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID? |
|
Definition
|
|
Term
What is one of the major problems with email? |
|
Definition
C. User's expectation of privacy |
|
|
Term
Which of the following is part of the acceptable use policy stipulations? |
|
Definition
|
|
Term
|
Definition
A. Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space |
|
|
Term
Which policy details the extent to which email messages may be read by others? |
|
Definition
|
|
Term
Which of the following is not a part of the email privacy policy stipulations? |
|
Definition
D. It informs people that the organization has full control over email once it is transmitted outside the organization |
|
|
Term
Which of the following represents the estimated percentage that spam accounts for in an organizations' email traffic? |
|
Definition
|
|
Term
76. Which of the following describes information technology monitoring? |
|
Definition
|
|
Term
What is a program, when installed on a computer, records every keystroke and mouse click? |
|
Definition
|
|
Term
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard? |
|
Definition
|
|
Term
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities? |
|
Definition
|
|
Term
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets? |
|
Definition
C. Enterprise architecture |
|
|
Term
Which organization did a 66-hour database failure allow consumers to purchase guns without background checks? |
|
Definition
|
|
Term
A unified enterprise architecture will perform all of the following, except? |
|
Definition
B. Provide looser links to the business strategy allowing the organization additional flexibility |
|
|
Term
What are the four different lenses a business must use to look at an enterprise architecture plan? |
|
Definition
A. Business, data, applications, and technology architecture |
|
|
Term
Which of the following represents a person grounded in technology, fluent in business, and provides the important bridge between IT and the business? |
|
Definition
|
|
Term
Which company's EAs found software already written to allow its subscribers to customize the ring sounds on their cell phones? |
|
Definition
|
|
Term
What determines how applications integrate and relate to each other? |
|
Definition
A. Application architecture |
|
|
Term
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals? |
|
Definition
D. Infrastructure architecture |
|
|
Term
Which of the following is not one of the three components of an enterprise architecture? |
|
Definition
|
|
Term
10. Which of the following is not a component of an information architecture? |
|
Definition
|
|
Term
Which architecture supports managing user access and using up-to-date antivirus software and patches? |
|
Definition
B. Information architecture |
|
|
Term
What are the primary differences between types of backup/recovery media such as DVDs and redundant storage servers? |
|
Definition
B. Speed and associated costs |
|
|
Term
How frequently should a large organization that deals with large volumes of critical information backup? |
|
Definition
|
|
Term
FirstEnergy missed signs that there were potential problems in its portion of North America's electrical grid. The events that followed left an estimated 50 million people in the Northeast and Canada in the dark. A joint task force between Canada and the US investigated the causes and recommended all of the following to avoid big-scale outages, except? |
|
Definition
C. Ensure the networks have a quick backup system in case of downtime |
|
|
Term
What is a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? |
|
Definition
D. Business continuity planning |
|
|
Term
Which company used its continuity planning group to safeguard against earthquakes and other natural disasters? |
|
Definition
C. Union Bank of California |
|
|
Term
Good information architectures include all of the following, except? |
|
Definition
B. Ensuring scalability to meet increased demand |
|
|
Term
|
Definition
D. A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time |
|
|
Term
|
Definition
C. A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service |
|
|
Term
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business? |
|
Definition
|
|
Term
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? |
|
Definition
D. Disaster recovery plan |
|
|
Term
What refers to how well a system can adapt to increased demands? |
|
Definition
|
|
Term
What determines the future IT infrastructure requirements for new equipment and additional network capacity? |
|
Definition
|
|
Term
What addresses when systems can be accessed by employees, customers, and partners |
|
Definition
|
|
Term
Which website was inundated with more than 91 million page views on September 11, 2001? |
|
Definition
|
|
Term
Which company created its website to parallel the same sleek but simple design of its quarterly flagship magazine? |
|
Definition
|
|
Term
Which of the following is not a component of an application architectur |
|
Definition
|
|
Term
|
Definition
C. A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them |
|
|
Term
What is interoperability? |
|
Definition
B. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers |
|
|
Term
|
Definition
A. Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services |
|
|
Term
Which of the following is not an primary business goal of enterprise architectures? |
|
Definition
|
|
Term
Which of the following is a type of backup/recovery media? |
|
Definition
|
|
Term
Which of the following is a type of backup/recovery media? |
|
Definition
|
|
Term
What is the primary difference between the different types of backup/recovery media? |
|
Definition
|
|
Term
What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information? |
|
Definition
|
|
Term
What does the disaster recovery cost curve chart? |
|
Definition
|
|
Term
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster. |
|
Definition
|
|
Term
Which of the following is not a characteristic of a solid infrastructure architecture? |
|
Definition
|
|
Term
What ensures all systems are functioning correctly and providing accurate information? |
|
Definition
|
|
Term
What addresses the timeframes when systems can be accessed by employees, customers, and partners? |
|
Definition
|
|
Term
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput? |
|
Definition
|
|
Term
What is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services? |
|
Definition
C. Service oriented architecture |
|
|
Term
Which of the following does not apply to SOA? |
|
Definition
A. A concrete tool or framework that can be purchased |
|
|
Term
Which of the following is not a component in an SOA architecture? |
|
Definition
|
|
Term
What are the key technical concepts of SOA? |
|
Definition
A. Processes, integration, tight coupling |
|
|
Term
|
Definition
A. A simple business task |
|
|
Term
Which of the following is not part of a typical SOA solution? |
|
Definition
D. Improve customer retention and deliver new products and services through reuse of current investments |
|
|
Term
What is extensible markup language (XML)? |
|
Definition
A. A markup language for documents containing structured information |
|
|
Term
|
Definition
C. The capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components |
|
|
Term
What is a framework for dividing the resources of a computer into multiple execution environments? |
|
Definition
|
|
Term
Which of the following is a great example of loose coupling? |
|
Definition
C. The capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components |
|
|
Term
What is a framework for dividing the resources of a computer into multiple execution environments? |
|
Definition
|
|
Term
Which of the following is a great example of loose coupling? |
|
Definition
A. Conversion of currency |
|
|
Term
Which of the following is an example of loose coupling? |
|
Definition
A. Common customer identification |
|
|
Term
Which of the following is considered virtualization? |
|
Definition
B. Partitioning a hard drive |
|
|
Term
What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system? |
|
Definition
|
|
Term
Which of the following is a trend responsible for moving virtualization into the spotlight? |
|
Definition
|
|
Term
Which of the following reflects Moore's Law? |
|
Definition
A. New generations of chips deliver double the processing power as the previous generation |
|
|
Term
Which of the following is not an additional benefit of virtualization |
|
Definition
C. Ease of use for customer relationship management system |
|
|
Term
What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data? |
|
Definition
|
|
Term
What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration? |
|
Definition
|
|
Term
Business benefits for using grid computing include? |
|
Definition
|
|
Term
What is often referred to as being the world's single and most powerful computer solution? |
|
Definition
|
|
Term
t/f: Enterprise architectures are always static; they never change. |
|
Definition
|
|
Term
t/f: A system should not be designed to include the ability to handle multiple currencies and languages if the company is not currently performing business in other countries. |
|
Definition
|
|
Term
t/f: SOA is not a concrete architecture; it is something that leads to a concrete architecture. |
|
Definition
|
|
Term
t/f: SOA provides the technology underpinnings for working with services that are not just software or hardware, but rather business tasks. |
|
Definition
|
|
Term
t/f: Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput. |
|
Definition
|
|
Term
t/f: Web services are the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. |
|
Definition
|
|
Term
t/f: Infrastructure architecture identifies where and how important information, like customer records, is maintained and secured. |
|
Definition
|
|
Term
t/f: Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination |
|
Definition
|
|
Term
t/f: Historically, the makers of proprietary software have generally not made source code available. |
|
Definition
|
|
Term
t/f: The primary characteristics of a solid infrastructure include flexibility, scalability, reliability, availability, and performance. |
|
Definition
|
|
Term
SOA is not a concrete architecture; it is something that leads to a ___________ architecture. |
|
Definition
|
|
Term
Loose coupling is simply a way of ensuring that the technical details such as language, platform and so on are _____________ from the service. |
|
Definition
|
|
Term
In a virtualized environment, the logical functions of computing, storage, and network elements are separated from their ____________ functions. |
|
Definition
|
|
Term
The bandwidth required to transport the __________ services will continue to increase and the possibility of __________ degradation will become more challenging since ________ cannot tolerate packet loss. (Please note the same word fits in all of these blanks - you only need one word for the answer to fit all 3 blanks) |
|
Definition
|
|
Term
___________ architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets. |
|
Definition
|
|
Term
____________ architecture determines how applications integrate and relate to each other. |
|
Definition
|
|
Term
A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. |
|
Definition
|
|
Term
A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster. |
|
Definition
|
|
Term
_________ ensures all systems are functioning correctly and providing accurate information. |
|
Definition
|
|
Term
____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. |
|
Definition
|
|
Term
Managing ___________ access to information is a critical piece of the information architecture. |
|
Definition
|
|
Term
A(n) _______________ is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. |
|
Definition
|
|
Term
Service oriented architecture begins with a(n) ______________. |
|
Definition
|
|