Af302 Quiz

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

Network security involves three types of defenses, which are referred to as layers.

Those
layers consist of each of the following except:

Select one:

a. Authentication layer to verify the identity of the person requesting access to the network

b. Perimeter security layer to control access to the network

c. Biometrics layer to monitor network usage

d. Authorization layer to control what authenticated users can do once they are given access
to the network. 

Feedback
The correct answer is: Biometrics layer to monitor network usage

Question 2
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Bandwidth- intensive apps are important to business processes but they also strain
network capabilities and resources. One strategy for regulating network use is to
"prioritize traffic" which means:

Select one:

a. Allocating network resources to users based on seniority in the organization

b. Data and apps that are timely-delay sensitive, such as voice and video are given priority on
the network.

c. Restricting the use of apps, such as voice and video that disproportionally use network
bandwidth to certain times of the day when demand for network resources is low.

d. Giving priority to users who have faster computer to avoid bottlenecks 

Feedback
The correct answer is: Data and apps that are timely-delay sensitive, such as voice and
video are given priority on the network.

Question 3
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
The five basic categories or components in a telecommunications network include:

Select one:

a. Protocols, telecommunications channels and media, computers, telecommunications control


software and modems
b. Terminals, telecommunications processors, computers, modems and protocols

c. Terminals, telecommunications processors, telecommunications channels and media,


computers and telecommunications control software

d. Terminals, telecommunications channels and media, computers, simplexes and modems 

Feedback
The correct answer is: Terminals, telecommunications processors, telecommunications
channels and media, computers and telecommunications control software

Question 4
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Facebook’s rapid growth and its making as number one is an interesting and informative
business case because:

Select one:

a. It has positioned itself solely as a social network

b. It shows the power of IT to disrupt the status quo and transform industries.

c. It is a public company with an immensely-profitable business model

d. All of the above 

Feedback
The correct answer is: It shows the power of IT to disrupt the status quo and transform
industries.

Question 5
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
The internet of Things  describes a network of:

Select one:

a. The listing of URL addresses compiled by search engines 

b. Equipment or devices connected to the internet or networked via sensors

c. An online directory or global IT vendors

d. Personal connections- people from around the world

Feedback
The correct answer is: Equipment or devices connected to the internet or networked via
sensors
Question 6
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which of the following key terms relating to organizational strategy involves the SMART
criteria?

Select one:

a. Targets

b. Strategy

c. Objectives

d. Vision and mission statements 

Feedback
The correct answer is: Objectives

Question 7
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
________ is the elapsed time between when vulnerability is discovered and when it's
exploited and has shrunk from months to ___________.

Select one:

a. Denial of services; days

b. Time-to-exploitations; weeks 

c. Denial of services; seconds

d. Time-to-exploitations; minutes

Feedback
The correct answer is: Time-to-exploitations; minutes

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A scaled down, lower cost version of a data warehouse is a ______________.

Select one:
a. Smaller warehouse

b. Database

c. Mini warehouse

d. Data mart 

Feedback
The correct answer is: Data mart

Question 9
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
KD Company is looking to expand its business operations into a developing country. As
part of SWOT analysis, KD needs to investigate that country’s:

Select one:

a. All of the above

b. Economic stability 

c. Political stability

d. Critical infrastructure

Feedback
The correct answer is: All of the above

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following descriptions about enterprises architecture (EA) is false?

Select one:

a. EA starts with the organization's target-vision of the future

b. EA is the blueprint that guides and governs software add-ons, upgrades, hardware,
systems, networks, cloud services and other IT 

c. EA is a well-thought out IT growth plan

d. EA is needed for simple, single-user, non-distributed systems as well as complex


distributed systems.

Feedback
The correct answer is: EA is the blueprint that guides and governs software add-ons,
upgrades, hardware, systems, networks, cloud services and other IT
Question 11
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which is not one of the general types or mobile networks?

Select one:

a. Bluetooth

b. Local area network (LANs)

c. WiMAX

d. Wide area networks (WANs) 

Feedback
The correct answer is: Bluetooth

Question 12
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Protecting data and business operations involves all of the following efforts except:

Select one:

a. Storing and archiving all databases and data warehouses on-site protected by firewalls.

b. Making data and documents available accessible 24x7 while also restricting access.

c. Recovering from business disasters and disruptions quickly 

d. Implementing and enforcing procedures and acceptable use policies for company- owned
data, hardware, software and networks.

Feedback
The correct answer is: Storing and archiving all databases and data warehouses on-site
protected by firewalls.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A majority of data breaches involve:

Select one:
a. Inside error or action that is either intentional or unintentional 

b. Hackers

c. Insider action that is intentional

d. Former employees and IT staff

Feedback
The correct answer is: Inside error or action that is either intentional or unintentional

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
According to your text, developing software for wireless devices had been challenging
because ________________.

Select one:

a. Restrictions imposed by 2 or 3 dominate hardware manufacturers

b. There has not been a widely accepted standard for wireless devices 

c. Until recently, the market was not large enough to justify large scale investment in the
development of software apps

d. Wireless devices are significantly more complex than traditional computing devices

Feedback
The correct answer is: There has not been a widely accepted standard for wireless devices

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Your textbook differentiates the term data, information and knowledge. With regard to a
customer satisfaction application for the automobile industry, which of the following is an
example of data?

Select one:

a. The ability to create a program that provides rewards for dealerships with high levels of
customer satisfaction and corrective action plans for dealerships that have low levels of
satisfaction

b. Records containing numerical ratings from customer surveys completed online after each
visit to a dealership. 

c. The web-based application that collects and stores records of customer satisfaction surveys
and allows dealerships to view their data.
d. Reports that summarize ratings for a specific dealership including a calculation of the
average rating across all survey questions and a calculation of summary statistics for
groups of questions that correspond to important dimensions such as dealership staff,
satisfaction with product, quality of service and so on.

Feedback
The correct answer is: Records containing numerical ratings from customer surveys
completed online after each visit to a dealership.

Question 16
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Enterprises can acquire the latest business apps and digital services as they are needed
and without large upfront investments by switching from owning IT resources to
_____________.

Select one:

a. Cloud computing 

b. Private data centers

c. Machine-to-machine technology

d. Data synchronization

Feedback
The correct answer is: Machine-to-machine technology

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
According to Porter’s competitive forces model, there are fine major forces in an industry
that affect the degree of competition. Those five forces impact:

Select one:

a. Profit margin 

b. Expenses

c. Sales

d. Marketing

Feedback
The correct answer is: Profit margin
Question 18
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Network __________ are devices that transmit __________ from their source to their
destination based on IP addresses.

Select one:

a. APIs; data packets

b. Firewalls; digital signals

c. Switches and routers; data packets

d. Routers; digital signals 

Feedback
The correct answer is: Switches and routers; data packets

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Facebook, YouTube, Twitter, LinkedIn and other social networks are making IT security
dangers worse. Why?

Select one:

a. E-mail viruses and malware have been increasing for years even though e-mail security has
improved

b. Users invite in and build relationships with others. Cybercriminals hack into these trusted
relationships using stolen log-in. 

c. Communication has shifted from social networks to smartphones

d. Web filtering, user education and strict policies cannot help prevent IT security dangers on
Facebook and other social networks.

Feedback
The correct answer is: Users invite in and build relationships with others. Cybercriminals
hack into these trusted relationships using stolen log-in.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Price wars or other fierce reactions by competitors are examples of:

Select one:

a. Opportunities

b. Threats 

c. Strengths

d. Weaknesses

Feedback
The correct answer is: Threats

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The difference between a database and date warehouse is that:

Select one:

a. Databases are designed to detect trends in the data whereas data warehouses designed to
support supply chains

b. Databases are designed to support traditional commerce whereas data warehouses are
designed to support e-commerce

c. Databases are designed and optimized to analyze data whereas data warehouses are
designed and optimized to store data for sharing

d. Databases are designed and optimized to store data whereas data warehouse are designed
and optimized to respond to analysis questions that are critical for a business 

Feedback
The correct answer is: Databases are designed and optimized to store data whereas data
warehouse are designed and optimized to respond to analysis questions that are critical
for a business

Question 22
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Attacks _________ could significantly disrupt the functioning of government and
business- and trigger cascading effects far beyond the targeted sector and physical
location of the incident.

Select one:
a. On industrial control systems 

b. On critical infrastructure

c. By hacktivists

d. By hackers

Feedback
The correct answer is: On critical infrastructure

Question 23
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Multiple networks were needed to transmit documents, voice and video because:

Select one:

a. Of the lack of interoperability between devices

b. They used the same transmission protocol

c. Outdated IP networks 

d. Of limited bandwidth

Feedback
The correct answer is: Of limited bandwidth

Question 24
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
All of the following are characteristics of firewalls except:

Select one:

a. Firewalls must be configured to enforce the company's security procedures and policies

b. Firewalls are a barrier between a corporate intranet or other internal networks and the
internet 

c. Network firewalls stop all viruses and most other types of malware.

d. Firewalls function by deciding what traffic to allow into and out of the network and what
traffic to block

Feedback
The correct answer is: Network firewalls stop all viruses and most other types of malware.
Question 25
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
A  ___________ is a private, company owned network that uses IP technology to
securely share part of business's information with others.

Select one:

a. Extranet

b. Internet

c. Leased telephone line

d. Intranet 

Feedback
The correct answer is: Leased telephone line

Question 26
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which of the following is not an impact of the mass migration of users from PC’s to mobile
devices?

Select one:

a. It has expanded the scope of information systems beyond traditional organizational
boundaries.

b. It has made location irrelevant to a large extent. 

c. It has improved the privacy of users and security of corporate networks.

d. It has torn down the walls between business, professional and personal lives.

Feedback
The correct answer is: It has improved the privacy of users and security of corporate
networks.

Question 27
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Internal fraud prevention and detection measures are based on _________ and
_________.
Select one:

a. A detailed recovery plan; containment

b. Physical controls; authentication systems 

c. Perimeter defense technologies; human resources procedures

d. General controls; application controls

Feedback
The correct answer is: Perimeter defense technologies; human resources procedures

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Stan Marsh is V.P. of sales at Ski Warehouse, a chain of snow sports equipment outlets
throughout the rocky mountain and northwest regions of the United States. The company
was built over time by purchasing successful independent sporting equipment retailers.
Stan now find it difficult to evaluate some of his store locations because they report their
sales figures on a quarterly basis rather than monthly as do the stores in the rest of the
company. This is an example of which of the following factors that cause information
deficiencies cited in your text?

Select one:

a. User-fierce interfaces

b. Non-standardized data 

c. Lost or bypassed data

d. Data silos

Feedback
The correct answer is: Non-standardized data

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
All of the following are factors contributing to the increased use of business
intelligence  (BI), except:

Select one:

a. Increased amounts of data

b. Proprietary information systems


c. Cloud-enabled BI and analytics 

d. Smart devices and demand for 24/7 access to insights

Feedback
The correct answer is: Cloud-enabled BI and analytics

Question 30
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
The effectiveness of social media activities are evaluated with

Select one:

a. standard metrics that are used for many traditional business activities

b. phone surveys

c. all of the above 

d. mashups such as dashboards and score cards

Feedback
The correct answer is: mashups such as dashboards and score cards

You might also like