isys 363 quiz 4 part 3

isys 363 quiz 4 part 3 - Shichun Li h (h ) h iLearn / ►...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Shichun Li h (h ) h iLearn / ► ISYS036301-S10R /►h / ► ISYS 363 Quiz 4 /►h 1h ISYS 363 Quiz 4 h 1h h h h 2010 h 02 h 27 h Saturday 21:49 h 2010 h 02 h 28 h Sunday 18:05 h 20 h 16 h h 25/30 h 83.33 x r ¸ ª l 100(83%) Question 1 h :1 High-availability computing: xr ¸ ª l a. promises continuous availability. b. promises the elimination of recovery time. c. uses online transaction and backup systems. d. helps firms recover quickly from a crash. h xr ¸ª l 1/1h Question 2 h :1 Sobig.F and MyDoom.A are: xr ¸ ª l a. viruses that use Microsoft Outlook to spread to other systems. b. worms attached to e-mail that spread from computer to computer. c. multipartite viruses that can infect files as well as the boot sector of the hard drive. d. Trojan horses used to create bot nets. h x r ª¸ l 1/1h Question 3 h :1 Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: a. are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. b. are not secure because the technology to secure them did not exist at the time the files were created. c. have the potential to be accessed by large numbers of people and by groups outside of the organization. d. are frequently available on the Internet. h XQ é ¸ ª l 0/1h Question 4 h :1 The Internet poses specific security problems because: Qé ¸ ª l X a. it was designed to be easily accessible. b. everyone uses the Internet. c. Internet standards are universal. d. it changes so rapidly. h XQ é ¸ ª l 1/1h Question 5 h :1 Currently, the protocols used for secure information transfer over the Internet are: Qé ¸ ª l X a. TCP/IP and SSL. b. S-HTTP and CA. c. HTTP and TCP/IP. d. SSL, TLS, and S-HTTP. h X Q é ¸ªl 1/1h Question 6 h :1 The Gramm-Leach-Bliley Act: Q é ¸ ªl X a. requires financial institutions to ensure the security of customer data. b. specifies best practices in information systems security and control. c. imposes responsibility on companies and management to safeguard the accuracy of financial information. d. outlines medical security and privacy rules. h gÖ é ¸ªl 1/1h Question 7 h :1 Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called: g ¸ Öª é l a. sniffing. b. social engineering. c. phishing. d. pharming. h gÖ é ¸ªl 1/1h Question 8 h :1 Smaller firms can outsource security functions to: gÖé ¸ ª l a. MISs. b. CSOs. c. MSSPs. d. CAs. h g Ö é lª ¸ 1/1h Question 9 h :1 The most common type of electronic evidence is: gÖ é ¸ ªl a. voice-mail. b. spreadsheets. c. instant messages. d. E-mail. h g Ö é ª¸ l 1/1h Question 10 h :1 You have been hired as a security consultant for a legal firm. Which of the following constitutes the greatest threat, in terms of security, to the firm? g Öé ¸ ªl a. Wireless network b. Employees c. Authentication procedures d. Lack of data encryption h Ø G ë ª¸ l 1/1h Question 11 h :1 Public key encryption uses two keys. h: True False h ØG ë ¸ ª l 1/1h Question 12 h :1 Fault-tolerant computers contain redundant hardware, software, and power supply components. h: True False h ØG ë ¸ ª l 1/1h Question 13 h :1 Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. h: True False h ØG ë ¸ ª l 1/1h Question 14 h :1 Biometric authentication is the use of physical characteristics such as retinal images to provide identification. h: True False h ØG ë ¸ ª l 1/1h Question 15 h :1 Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. h: True False 1/1h Question 16 h :1 Which of the following deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training? X ¸ ×é ª l a. Enterprise systems software b. Employee relationship management software c. Supply chain management software d. Customer relationship management software h X × é ª ¸l 0/1h Question 17 h :1 Customer service modules in CRM systems would provide tools for: × Xé ¸ ª l a. assigning and managing customer service requests. b. sales quote generation. c. identifying profitable and unprofitable customers. d. managing sales prospect and contact information. h X× é l ¸ª 1/1h Question 18 h :1 Which of the following statements about enterprise applications is not true? ×é X¸ ªl a. The total implementation cost of a large system might amount to four to five times the initial purchase price for the software. b. Enterprise applications introduce "switching costs." c. Enterprise applications are based on organization-wide definitions of data. d. Enterprise applications are best implemented when few changes in business processes are required. h X × é¸ª l 1/1h Question 19 h :1 Which of the following would not be considered a touchpoint? ×é X¸ ªl a. E-mail b. Web site c. Intranet d. Retail store h g Ö é ª¸ l 1/1h Question 20 h :1 ________ use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. gÖ é ¸ª l a. SCM modules b. SFA modules c. ERM modules d. PRM modules h gÖ é l ¸ª 1/1h Question 21 h :1 You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? g¸éÖ ª l a. Select the functions of the system you wish to use. b. Select the business processes you wish to automate. c. Map the company's business processes to the software's business processes. d. Map the software's business processes to the company's business processes. h g Ö é ª l¸ 1/1h Question 22 h :1 ________ integrate multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide a greater degree of cross-functional integration than the traditional enterprise applications. g Öé ¸ ª l a. PRM software b. SFA software c. ERP suites d. Service platforms 0/1h Question 23 h :1 Which of the following helped cause the significant problems Invacare experienced with its new ERP system? ë ¸ Iø ª l a. Insufficient real-world testing b. Poor integration with legacy systems c. Lack of support from Oracle d. Poor data cleansing and normalization h ø I ë ¸ª l 0/1h Question 24 h :1 Analytical CRM: ëøI ¸ ª l a. includes tools for marketing automation. b. provides consolidated data for operational CRM applications. c. are based on data warehouses consolidated from operational CRM applications. d. provides customer-facing applications. h øI ë ¸ª l 1/1h Question 25 h :1 Selling a customer with a checking account a home improvement loan is an example of: øI ë ¸ ª l a. operational CRM. b. direct marketing. c. cross-selling. d. cross-channel promotions. h øI ë ¸ ª l 0/1h Question 26 h :1 Enterprise systems use a client/server architecture and have not yet been redesigned to take advantage of the Web. h: True False h 1/1h Question 27 h :1 Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. h: True False h èG ë ¸ ª l 1/1h Question 28 h :1 Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business. h: True False h èG ë ¸ ª l 1/1h Question 29 h :1 Enterprise systems require fundamental changes in the way the business operates. h: True False h èG ë ¸ ª l 1/1h Question 30 h :1 In a push-based model, actual customer orders or purchases trigger events in the supply chain. h: True False h èG ë ¸ ª l h 1/1h h h Shichun Li h (h ) SF State Home Contact 1600 Holloway Avenue, San Francisco, CA 94132 . Tel (415) 338-1111 ...
View Full Document

This note was uploaded on 09/08/2011 for the course ISYS 363 taught by Professor Bmak during the Spring '08 term at S.F. State.

Ask a homework question - tutors are online