Professional Documents
Culture Documents
Af302 Quiz
Af302 Quiz
Af302 Quiz
Those
layers consist of each of the following except:
Select one:
a. Authentication layer to verify the identity of the person requesting access to the network
d. Authorization layer to control what authenticated users can do once they are given access
to the network.
Feedback
The correct answer is: Biometrics layer to monitor network usage
Question 2
Incorrect
Flag question
Question text
Bandwidth- intensive apps are important to business processes but they also strain
network capabilities and resources. One strategy for regulating network use is to
"prioritize traffic" which means:
Select one:
b. Data and apps that are timely-delay sensitive, such as voice and video are given priority on
the network.
c. Restricting the use of apps, such as voice and video that disproportionally use network
bandwidth to certain times of the day when demand for network resources is low.
Feedback
The correct answer is: Data and apps that are timely-delay sensitive, such as voice and
video are given priority on the network.
Question 3
Incorrect
Flag question
Question text
The five basic categories or components in a telecommunications network include:
Select one:
Feedback
The correct answer is: Terminals, telecommunications processors, telecommunications
channels and media, computers and telecommunications control software
Question 4
Incorrect
Flag question
Question text
Facebook’s rapid growth and its making as number one is an interesting and informative
business case because:
Select one:
b. It shows the power of IT to disrupt the status quo and transform industries.
Feedback
The correct answer is: It shows the power of IT to disrupt the status quo and transform
industries.
Question 5
Incorrect
Flag question
Question text
The internet of Things describes a network of:
Select one:
Feedback
The correct answer is: Equipment or devices connected to the internet or networked via
sensors
Question 6
Incorrect
Flag question
Question text
Which of the following key terms relating to organizational strategy involves the SMART
criteria?
Select one:
a. Targets
b. Strategy
c. Objectives
Feedback
The correct answer is: Objectives
Question 7
Incorrect
Flag question
Question text
________ is the elapsed time between when vulnerability is discovered and when it's
exploited and has shrunk from months to ___________.
Select one:
b. Time-to-exploitations; weeks
d. Time-to-exploitations; minutes
Feedback
The correct answer is: Time-to-exploitations; minutes
Question 8
Correct
Flag question
Question text
A scaled down, lower cost version of a data warehouse is a ______________.
Select one:
a. Smaller warehouse
b. Database
c. Mini warehouse
d. Data mart
Feedback
The correct answer is: Data mart
Question 9
Incorrect
Flag question
Question text
KD Company is looking to expand its business operations into a developing country. As
part of SWOT analysis, KD needs to investigate that country’s:
Select one:
b. Economic stability
c. Political stability
d. Critical infrastructure
Feedback
The correct answer is: All of the above
Question 10
Correct
Flag question
Question text
Which of the following descriptions about enterprises architecture (EA) is false?
Select one:
b. EA is the blueprint that guides and governs software add-ons, upgrades, hardware,
systems, networks, cloud services and other IT
Feedback
The correct answer is: EA is the blueprint that guides and governs software add-ons,
upgrades, hardware, systems, networks, cloud services and other IT
Question 11
Incorrect
Flag question
Question text
Which is not one of the general types or mobile networks?
Select one:
a. Bluetooth
c. WiMAX
Feedback
The correct answer is: Bluetooth
Question 12
Incorrect
Flag question
Question text
Protecting data and business operations involves all of the following efforts except:
Select one:
a. Storing and archiving all databases and data warehouses on-site protected by firewalls.
b. Making data and documents available accessible 24x7 while also restricting access.
d. Implementing and enforcing procedures and acceptable use policies for company- owned
data, hardware, software and networks.
Feedback
The correct answer is: Storing and archiving all databases and data warehouses on-site
protected by firewalls.
Question 13
Correct
Flag question
Question text
A majority of data breaches involve:
Select one:
a. Inside error or action that is either intentional or unintentional
b. Hackers
Feedback
The correct answer is: Inside error or action that is either intentional or unintentional
Question 14
Correct
Flag question
Question text
According to your text, developing software for wireless devices had been challenging
because ________________.
Select one:
b. There has not been a widely accepted standard for wireless devices
c. Until recently, the market was not large enough to justify large scale investment in the
development of software apps
d. Wireless devices are significantly more complex than traditional computing devices
Feedback
The correct answer is: There has not been a widely accepted standard for wireless devices
Question 15
Correct
Flag question
Question text
Your textbook differentiates the term data, information and knowledge. With regard to a
customer satisfaction application for the automobile industry, which of the following is an
example of data?
Select one:
a. The ability to create a program that provides rewards for dealerships with high levels of
customer satisfaction and corrective action plans for dealerships that have low levels of
satisfaction
b. Records containing numerical ratings from customer surveys completed online after each
visit to a dealership.
c. The web-based application that collects and stores records of customer satisfaction surveys
and allows dealerships to view their data.
d. Reports that summarize ratings for a specific dealership including a calculation of the
average rating across all survey questions and a calculation of summary statistics for
groups of questions that correspond to important dimensions such as dealership staff,
satisfaction with product, quality of service and so on.
Feedback
The correct answer is: Records containing numerical ratings from customer surveys
completed online after each visit to a dealership.
Question 16
Incorrect
Flag question
Question text
Enterprises can acquire the latest business apps and digital services as they are needed
and without large upfront investments by switching from owning IT resources to
_____________.
Select one:
a. Cloud computing
c. Machine-to-machine technology
d. Data synchronization
Feedback
The correct answer is: Machine-to-machine technology
Question 17
Correct
Flag question
Question text
According to Porter’s competitive forces model, there are fine major forces in an industry
that affect the degree of competition. Those five forces impact:
Select one:
a. Profit margin
b. Expenses
c. Sales
d. Marketing
Feedback
The correct answer is: Profit margin
Question 18
Incorrect
Flag question
Question text
Network __________ are devices that transmit __________ from their source to their
destination based on IP addresses.
Select one:
Feedback
The correct answer is: Switches and routers; data packets
Question 19
Correct
Flag question
Question text
Facebook, YouTube, Twitter, LinkedIn and other social networks are making IT security
dangers worse. Why?
Select one:
a. E-mail viruses and malware have been increasing for years even though e-mail security has
improved
b. Users invite in and build relationships with others. Cybercriminals hack into these trusted
relationships using stolen log-in.
d. Web filtering, user education and strict policies cannot help prevent IT security dangers on
Facebook and other social networks.
Feedback
The correct answer is: Users invite in and build relationships with others. Cybercriminals
hack into these trusted relationships using stolen log-in.
Question 20
Correct
Flag question
Question text
Price wars or other fierce reactions by competitors are examples of:
Select one:
a. Opportunities
b. Threats
c. Strengths
d. Weaknesses
Feedback
The correct answer is: Threats
Question 21
Correct
Flag question
Question text
The difference between a database and date warehouse is that:
Select one:
a. Databases are designed to detect trends in the data whereas data warehouses designed to
support supply chains
b. Databases are designed to support traditional commerce whereas data warehouses are
designed to support e-commerce
c. Databases are designed and optimized to analyze data whereas data warehouses are
designed and optimized to store data for sharing
d. Databases are designed and optimized to store data whereas data warehouse are designed
and optimized to respond to analysis questions that are critical for a business
Feedback
The correct answer is: Databases are designed and optimized to store data whereas data
warehouse are designed and optimized to respond to analysis questions that are critical
for a business
Question 22
Incorrect
Flag question
Question text
Attacks _________ could significantly disrupt the functioning of government and
business- and trigger cascading effects far beyond the targeted sector and physical
location of the incident.
Select one:
a. On industrial control systems
c. By hacktivists
d. By hackers
Feedback
The correct answer is: On critical infrastructure
Question 23
Incorrect
Flag question
Question text
Multiple networks were needed to transmit documents, voice and video because:
Select one:
c. Outdated IP networks
Feedback
The correct answer is: Of limited bandwidth
Question 24
Incorrect
Flag question
Question text
All of the following are characteristics of firewalls except:
Select one:
a. Firewalls must be configured to enforce the company's security procedures and policies
b. Firewalls are a barrier between a corporate intranet or other internal networks and the
internet
c. Network firewalls stop all viruses and most other types of malware.
d. Firewalls function by deciding what traffic to allow into and out of the network and what
traffic to block
Feedback
The correct answer is: Network firewalls stop all viruses and most other types of malware.
Question 25
Incorrect
Flag question
Question text
A ___________ is a private, company owned network that uses IP technology to
securely share part of business's information with others.
Select one:
a. Extranet
b. Internet
d. Intranet
Feedback
The correct answer is: Leased telephone line
Question 26
Incorrect
Flag question
Question text
Which of the following is not an impact of the mass migration of users from PC’s to mobile
devices?
Select one:
a. It has expanded the scope of information systems beyond traditional organizational
boundaries.
c. It has improved the privacy of users and security of corporate networks.
d. It has torn down the walls between business, professional and personal lives.
Feedback
The correct answer is: It has improved the privacy of users and security of corporate
networks.
Question 27
Incorrect
Flag question
Question text
Internal fraud prevention and detection measures are based on _________ and
_________.
Select one:
Feedback
The correct answer is: Perimeter defense technologies; human resources procedures
Question 28
Correct
Flag question
Question text
Stan Marsh is V.P. of sales at Ski Warehouse, a chain of snow sports equipment outlets
throughout the rocky mountain and northwest regions of the United States. The company
was built over time by purchasing successful independent sporting equipment retailers.
Stan now find it difficult to evaluate some of his store locations because they report their
sales figures on a quarterly basis rather than monthly as do the stores in the rest of the
company. This is an example of which of the following factors that cause information
deficiencies cited in your text?
Select one:
a. User-fierce interfaces
b. Non-standardized data
d. Data silos
Feedback
The correct answer is: Non-standardized data
Question 29
Correct
Flag question
Question text
All of the following are factors contributing to the increased use of business
intelligence (BI), except:
Select one:
Feedback
The correct answer is: Cloud-enabled BI and analytics
Question 30
Incorrect
Flag question
Question text
The effectiveness of social media activities are evaluated with
Select one:
a. standard metrics that are used for many traditional business activities
b. phone surveys
Feedback
The correct answer is: mashups such as dashboards and score cards