IFSM300 quiz 4

Question # 00076854 Posted By: solutionshere Updated on: 06/21/2015 01:06 AM Due on: 06/21/2015
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image

Your quiz has been submitted successfully.

Question 1

1 / 1 point

Which level of management is concerned with updating inventory, scheduling production, and coordinating shipping?

A)

Strategic managers

B)

Middle managers

C)

Operational managers

D)

None of the above

Question 2

1 / 1 point

Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?

A)

Authentication

B)

User identification

C)

Encryption

D)

Authorization

https://learn..edu/d2l/img/0/Shared.Main.actShow.png?v=10.3.0.791-144

Question 3

1 / 1 point

Which of the following is one of the most common ways thieves steal corporate information?

A)

stealing employee laptops while employees are traveling

B)

breaking into the data center building

C)

using employees' computers while they are away from their desks

D)

picking up transmissions in unsecured wireless hot spots

Question 4

1 / 1 point

True or false: A relational database is one in which every data item is related to every other data item.

True

False

Question 5

1 / 1 point

Which of the following make up the security triad?

A)

Confidentiality, Integrity, Accuracy

B)

Integrity, Privacy, Accuracy

C)

Confidentiality, Integrity, Availability

D)

Privacy, Confidentiality, Integrity

Question 6

1 / 1 point

True or false: For simple uses, a spreadsheet can substitute for a database quite well.

True

False

Question 7

1 / 1 point

Which of the following is not true about firewalls?

A)

They can be a hardware device.

B)

They can be software.

C)

They filter data packets based on a set of rules.

D)

They only filter data packets coming into the network or system.

Question 8

1 / 1 point

Which of the following is described as a measure of the degree to which a set of data satisfies a set of contstraints?

A)

Data accuracy

B)

Data quality

C)

Data consistency

D)

Data completeness

Question 9

1 / 1 point

True or false: An Intrusion Detection System (IDS) does not add any additional security.

True

False

Question 10

1 / 1 point

When looking to secure information resources, organizations must balance the need for security with which of the following?

the cost of replacing the data if it is stolen

the potential damage to the company' reputation if the data is stolen

the users’ need to effectively access and use these resources

the customers' expectation that their data will be protected

https://learn..edu/d2l/img/0/Shared.Main.actShow.png?v=10.3.0.791-144

Question 11

1 / 1 point

Which of the following are characteristics of Big Data? (select all that apply)

A)

fast-changing

B)

massive in volume

C)

great variety

D)

diverse

Question 12

1 / 1 point

Which of the following is the process of formalizing the capture, indexing, and storing of the company’s knowledge in order to benefit from the experiences and insights that the company has captured during its existence?

Knowledge warehousing.

Corporate knowledge history.

Knowledge management.

None of the above.

Question 13

1 / 1 point

Which of the following is the most popular business social network in the world, according to this week's reading on Business Social Networks?

Facebook

Konnects

DOOSTANG

LinkedIn

https://learn..edu/d2l/img/0/Shared.Main.actShow.png?v=10.3.0.791-144

Question 14

1 / 1 point

Which of the following should be included in a good backup plan? (select all that apply)

A)

a full inventory of all of the information that needs to be backed up

B)

Regular backups of all data

C)

Offsite storage of backup data sets

D)

Test of data restoration

https://learn..edu/d2l/img/0/Shared.Main.actShow.png?v=10.3.0.791-144

Question 15

1 / 1 point

Which of the following is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions?

Data processing.

Data mining.

Data warehousing.

Data marketing.

Question 16

0.5 / 1 point

Which of the following are true of a data warehouse? (select all that apply)

A)

The data is time-stamped for comparison over time.

B)

The data is standardized.

C)

The data is operational and is used for day-to-day transactions.

D)

It is a database.

https://learn..edu/d2l/img/0/Shared.Main.actShow.png?v=10.3.0.791-144

Question 17

1 / 1 point

Which level of management is concerned with profitability and market share?

A)

Middle managers.

B)

Strategic managers.

C)

Operational managers.

D)

All of the above.

Question 18

1 / 1 point

Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?

A)

Public key infrastructure

B)

Encryption

C)

Secret code

D)

None of the above

Question 19

1 / 1 point

Which of the following is used to transform data into information in order to generate knowledge
that can be used for decision making?

Knowledge system

Decision-making system

Database

File

Question 20

1 / 1 point

Which of the following is described as the assurance that the information being accessed has not been altered and truly represents
what is intended?

Correctness

Completeness

Integrity

Assurance

Dot Image
Tutorials for this Question
  1. Tutorial # 00071548 Posted By: solutionshere Posted on: 06/21/2015 01:07 AM
    Puchased By: 6
    Tutorial Preview
    They can be a hardware device. B) They can be ...
    Attachments
    Your_quiz_has_been_submitted_successfull1.docx (101.3 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    kd...e07 Rating Tutorial editing is done with care 12/12/2015
    Ju...ony Rating Tutorials helped score A+ in exams 11/03/2015
    dw...982 Rating Tutorials helped score A+ in exams 08/11/2015
    jus...e80 Rating Amazed with their instant service support 07/24/2015

Great! We have found the solution of this question!

Whatsapp Lisa