What should a company store off premise preferably in a remote location?
backup copies of data
A ________ is a plastic card that has a microchip loaded with identifying data.
smart card
Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?
responsibility, accountability, and compliance
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.
perimeter firewall
________ are small files that browsers store on users' computers when they visit Web sites.
Cookies
________ a site means to take extraordinary measures to reduce a system's vulnerability.
Hardening
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.
hacking
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
Usurpation
Which of the following is the most expensive consequence of computer crime?
information loss
Which of the following is a synonym for phishing?
email spoofing
A ________ a string of bits used to encrypt the data.
key
The results generated in the map phase are combined in the ________ phase.
reduce
Regression analysis is used in ________.
supervised data mining
Which of the following problems is particularly common for data that have been gathered over time?
lack of consistency
Which of the following statements is TRUE of business intelligence (BI) systems?
Business intelligence systems analyze an organization's past performance to make predictions.
In the case of ________, data miners develop models prior to conducting analyses and then apply statistical techniques to data to estimate parameters of the models.
supervised data mining
Users in a data mart obtain data that pertain to a particular business function from a ________.
data warehouse
A ________ is a facility for managing an organization's business intelligence data.
data warehouse
Which of the following statements is TRUE of BigData?
BigData refers to data sets that are at least a petabyte in size.
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
Data mining
The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon?
the curse of dimensionality
________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
Reporting analysis
Which of the following statements is TRUE of a data warehouse?
A data warehouse is larger than a data mart.
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
Data acquisition
The ________ of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users.
management function
Which BI activity would a company be participating in if they used data mining to determine when to place rain boots on the shelves?
Performing analysis
The use of an organization's operational data as the source data for a business intelligence system is not usually recommended because it ________.
requires considerable processing and can drastically reduce system performance
________ is the process of delivering business intelligence to users without any request from the users.
Push publishing
All of the following are factors in incident response EXCEPT ________.
take your time responding to the incident
A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.
packet-filtering firewall
Which of the following statements is TRUE of position sensitivity?
It enables security personnel to prioritize their activities in accordance with the possible risk and loss.
Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.
data safeguards
________ take computers with wireless connections through an area and search for unprotected wireless networks.
Wardrivers
________ is used to measure the impact of a set of variables on another variable during data mining.
Regression analysis
The goal of ________, a type of business intelligence analysis, is to create information about past performance.
reporting analyses
________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning.
Data mining
________ are business intelligence documents that are updated at the time they are requested.
Dynamic reports
________ are business intelligence documents that are fixed at the time of creation and do not change.
Static reports
________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce.
Hadoop
Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?
publish results
________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics.
Cluster analysis
Which of the following statements is TRUE of business intelligence (BI) publishing alternatives?
It is more difficult to publish dynamic BI than to publish static content.
________ requires users to request business intelligence results.
Pull publishing
The source, format, assumptions and constraints, and other facts concerning certain data are called ________.
metadata
What is the query language used in Hadoop?
Pig
________ process operational and other data in organizations to analyze past performance and make predictions.
Business intelligence systems
A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.
advanced persistent threat
________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.
Trojan horses
In terms of password management, when an account is created, users should ________.
immediately change the password they are given to a password of their own
Which of the following is a data safeguard against security threats?
physical security
Which of the following type of password guidelines are the easiest to crack?
a six-letter password with upper and lower-case letters
Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the follow
brute force attack
After Equifax was hacked, they went through ________ process to reduced the system's vulnerability.
a hardening
Which of the following is an example of a data safeguard?
Physical security
Jack installed the incorrect security patch on the server. This is an example of what type of security problem?
faulty service
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
biometric authentication
Which of the following types of encryption is used by the secure sockets layer protocol?
public key encryption
Which of the following is a human safeguard against security threats?
Procedure design
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared
Phishing
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
Data administration
Which of the following is a technical safeguard against security threats?
Firewall
A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset
Safeguard
The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems.
development
Which of the following staff functions is at the top-most level of a typical senior-level reporting relationship?
chief operating officer (COO)
Which of the following is a responsibility of an information systems (IS) user?
following security and backup procedures
A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude.
consultant
If a company's information systems (IS) related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________.
systems analysts
Which of the following is TRUE if the development group of a company's information systems (IS) department is staffed primarily by programmers, test engineers, technical writers, and other development personnel?
The company develops programs in-house.
In an organization, the IS department's principal manager is called the ________.
chief information officer
In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________.
competitive strategy
Which of the following statements is TRUE of the development group of a company's information systems (IS) department?
The size and structure of the group depends on whether programs are developed in-house or outsourced.
Which of the following is an advantage of outsourcing information systems?
It can be an easy way to gain expertise otherwise not known.
The ________ evaluates new technologies, new ideas, and new capabilities and identifies those that are most relevant to the organization.
chief technology officer
A(n) ________ committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives.
steering
Which of the following is a responsibility of a small-scale project manager?
initiate, plan, manage, monitor, and close down projects
Which of the following is a risk of outsourcing information systems?
Vendors can gain access to critical knowledge of the outsourcing company.
The chief information security officer (CISO) reports to the ________.
chief information officer
A ________ monitors, maintains, fixes, and tunes computer networks.
Network administrator
In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the chief information officer reports to the ________ is more common and effective.
CEO
The ________ group investigates new information systems and determines how the organization can benefit from them.
Technology
Bake a lot, Inc has decided they need someone to manage the security for organization's information systems and information. They decide to hire a _______ to handle this task.
Chief information security officer
If a company's information systems (IS) related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________.
System analysts
________ is a title given to the principal manager of an organization's IS department.
CIO
The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.
Data administration
________ refers to the leasing of hardware with preinstalled operating systems
Platform as a service (PaaS)
In ________, hardware and both operating system and application software are leased.
software as a service (SaaS)
Software vendors usually bundle fixes of low-priority problems into larger groups called ________.
service packs
In a ________ installation, an organization implements an entire system on a limited portion of the business.
pilot
According to Brooks' Law, which of the following is a consequence of adding more people to late projects?
The costs of training new people can overwhelm the benefits of their contribution.
If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________.
data model
________ testing is the process of allowing future system users to try out a new system on their own.
Beta
In a ________ installation, a new system runs alongside the old one until the new one has been tested and is fully operational.
parallel
Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?
assess the project feasibility
Which of the following is a major concern for developers in a systems development life cycle process?
performing repetitive tasks of a completed phase
A design team decides the requirements of a new system are very complicated. They want to show a ________ to the users so they can interact with the new features before the full system is built. This process will also allow users to remember any features
prototype
The process of creating and maintaining information systems is called ________.
systems development
According to Brooks' Law, adding more people to a late project ________.
makes the project later
Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementin
parallel
In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system?
requirements analysis
Procedures for a business information system are designed usually by ________.
systems analysts
While designing ________, a development team must produce design documentation for writing program code.
custom-developed programs
When developing a budget for a large, multi-year projects estimations are ________.
so approximate they are not real
Which of the following is the first step in defining a new information system?
explain the goals and scope of the project
The single most important criterion for information systems success is ________.
users to take ownership of their systems
Which of the following is the most important phase in the SDLC?
determine the system's requirements
All of these statements are true about the maintenance phase EXCEPT ________.
system test happens during this phase
________ is the most common process for systems development.
Systems development life cycle (SDLC)
Which of the following statements is TRUE of system maintenance?
All commercial software products are shipped with known failures.
Which of the following personnel in a development team has the final say on whether a system is ready for use?
users
________ feasibility concerns whether a new information system fits within a company's customs, culture, charter, or legal requirements.
Organizational