final

What should a company store off premise preferably in a remote location?

backup copies of data

A ________ is a plastic card that has a microchip loaded with identifying data.

smart card

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

responsibility, accountability, and compliance

A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.

perimeter firewall

________ are small files that browsers store on users' computers when they visit Web sites.

Cookies

________ a site means to take extraordinary measures to reduce a system's vulnerability.

Hardening

Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

hacking

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

Usurpation

Which of the following is the most expensive consequence of computer crime?

information loss

Which of the following is a synonym for phishing?

email spoofing

A ________ a string of bits used to encrypt the data.

key

The results generated in the map phase are combined in the ________ phase.

reduce

Regression analysis is used in ________.

supervised data mining

Which of the following problems is particularly common for data that have been gathered over time?

lack of consistency

Which of the following statements is TRUE of business intelligence (BI) systems?

Business intelligence systems analyze an organization's past performance to make predictions.

In the case of ________, data miners develop models prior to conducting analyses and then apply statistical techniques to data to estimate parameters of the models.

supervised data mining

Users in a data mart obtain data that pertain to a particular business function from a ________.

data warehouse

A ________ is a facility for managing an organization's business intelligence data.

data warehouse

Which of the following statements is TRUE of BigData?

BigData refers to data sets that are at least a petabyte in size.

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data mining

The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon?

the curse of dimensionality

________ is the process of sorting, grouping, summing, filtering, and formatting structured data.

Reporting analysis

Which of the following statements is TRUE of a data warehouse?

A data warehouse is larger than a data mart.

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Data acquisition

The ________ of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users.

management function

Which BI activity would a company be participating in if they used data mining to determine when to place rain boots on the shelves?

Performing analysis

The use of an organization's operational data as the source data for a business intelligence system is not usually recommended because it ________.

requires considerable processing and can drastically reduce system performance

________ is the process of delivering business intelligence to users without any request from the users.

Push publishing

All of the following are factors in incident response EXCEPT ________.

take your time responding to the incident

A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

packet-filtering firewall

Which of the following statements is TRUE of position sensitivity?

It enables security personnel to prioritize their activities in accordance with the possible risk and loss.

Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.

data safeguards

________ take computers with wireless connections through an area and search for unprotected wireless networks.

Wardrivers

________ is used to measure the impact of a set of variables on another variable during data mining.

Regression analysis

The goal of ________, a type of business intelligence analysis, is to create information about past performance.

reporting analyses

________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning.

Data mining

________ are business intelligence documents that are updated at the time they are requested.

Dynamic reports

________ are business intelligence documents that are fixed at the time of creation and do not change.

Static reports

________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce.

Hadoop

Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?

publish results

________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics.

Cluster analysis

Which of the following statements is TRUE of business intelligence (BI) publishing alternatives?

It is more difficult to publish dynamic BI than to publish static content.

________ requires users to request business intelligence results.

Pull publishing

The source, format, assumptions and constraints, and other facts concerning certain data are called ________.

metadata

What is the query language used in Hadoop?

Pig

________ process operational and other data in organizations to analyze past performance and make predictions.

Business intelligence systems

A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.

advanced persistent threat

________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.

Trojan horses

In terms of password management, when an account is created, users should ________.

immediately change the password they are given to a password of their own

Which of the following is a data safeguard against security threats?

physical security

Which of the following type of password guidelines are the easiest to crack?

a six-letter password with upper and lower-case letters

Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the follow

brute force attack

After Equifax was hacked, they went through ________ process to reduced the system's vulnerability.

a hardening

Which of the following is an example of a data safeguard?

Physical security

Jack installed the incorrect security patch on the server. This is an example of what type of security problem?

faulty service

Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

biometric authentication

Which of the following types of encryption is used by the secure sockets layer protocol?

public key encryption

Which of the following is a human safeguard against security threats?

Procedure design

Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared

Phishing

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

Data administration

Which of the following is a technical safeguard against security threats?

Firewall

A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset

Safeguard

The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems.

development

Which of the following staff functions is at the top-most level of a typical senior-level reporting relationship?

chief operating officer (COO)

Which of the following is a responsibility of an information systems (IS) user?

following security and backup procedures

A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude.

consultant

If a company's information systems (IS) related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________.

systems analysts

Which of the following is TRUE if the development group of a company's information systems (IS) department is staffed primarily by programmers, test engineers, technical writers, and other development personnel?

The company develops programs in-house.

In an organization, the IS department's principal manager is called the ________.

chief information officer

In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________.

competitive strategy

Which of the following statements is TRUE of the development group of a company's information systems (IS) department?

The size and structure of the group depends on whether programs are developed in-house or outsourced.

Which of the following is an advantage of outsourcing information systems?

It can be an easy way to gain expertise otherwise not known.

The ________ evaluates new technologies, new ideas, and new capabilities and identifies those that are most relevant to the organization.

chief technology officer

A(n) ________ committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives.

steering

Which of the following is a responsibility of a small-scale project manager?

initiate, plan, manage, monitor, and close down projects

Which of the following is a risk of outsourcing information systems?

Vendors can gain access to critical knowledge of the outsourcing company.

The chief information security officer (CISO) reports to the ________.

chief information officer

A ________ monitors, maintains, fixes, and tunes computer networks.

Network administrator

In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the chief information officer reports to the ________ is more common and effective.

CEO

The ________ group investigates new information systems and determines how the organization can benefit from them.

Technology

Bake a lot, Inc has decided they need someone to manage the security for organization's information systems and information. They decide to hire a _______ to handle this task.

Chief information security officer

If a company's information systems (IS) related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________.

System analysts

________ is a title given to the principal manager of an organization's IS department.

CIO

The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.

Data administration

________ refers to the leasing of hardware with preinstalled operating systems

Platform as a service (PaaS)

In ________, hardware and both operating system and application software are leased.

software as a service (SaaS)

Software vendors usually bundle fixes of low-priority problems into larger groups called ________.

service packs

In a ________ installation, an organization implements an entire system on a limited portion of the business.

pilot

According to Brooks' Law, which of the following is a consequence of adding more people to late projects?

The costs of training new people can overwhelm the benefits of their contribution.

If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________.

data model

________ testing is the process of allowing future system users to try out a new system on their own.

Beta

In a ________ installation, a new system runs alongside the old one until the new one has been tested and is fully operational.

parallel

Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?

assess the project feasibility

Which of the following is a major concern for developers in a systems development life cycle process?

performing repetitive tasks of a completed phase

A design team decides the requirements of a new system are very complicated. They want to show a ________ to the users so they can interact with the new features before the full system is built. This process will also allow users to remember any features

prototype

The process of creating and maintaining information systems is called ________.

systems development

According to Brooks' Law, adding more people to a late project ________.

makes the project later

Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementin

parallel

In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system?

requirements analysis

Procedures for a business information system are designed usually by ________.

systems analysts

While designing ________, a development team must produce design documentation for writing program code.

custom-developed programs

When developing a budget for a large, multi-year projects estimations are ________.

so approximate they are not real

Which of the following is the first step in defining a new information system?

explain the goals and scope of the project

The single most important criterion for information systems success is ________.

users to take ownership of their systems

Which of the following is the most important phase in the SDLC?

determine the system's requirements

All of these statements are true about the maintenance phase EXCEPT ________.

system test happens during this phase

________ is the most common process for systems development.

Systems development life cycle (SDLC)

Which of the following statements is TRUE of system maintenance?

All commercial software products are shipped with known failures.

Which of the following personnel in a development team has the final say on whether a system is ready for use?

users

________ feasibility concerns whether a new information system fits within a company's customs, culture, charter, or legal requirements.

Organizational