Project #34975 - ifsm 2.3

 

Question 1 (1 point)

 Question 1 Unsaved
 

Data generated by business apps, sensors, and transaction processing systems (TPS) are typically stored first in a ______________.

 
Question 1 options:
A) 

Database

B) 

Data warehouse

C) 

Data mart

D) 

Data silo

Save

 

Question 2 (1 point)

 Question 2 Unsaved
 

_______________________ integrate data from multiple databases and data silos and organize them for complex analysis, knowledge discovery, and to support decision making.

 
Question 2 options:
A) 

Databases

B) 

Data warehouses

C) 

Data collectors

D) 

Data silos

Save

 

Question 3 (1 point)

 Question 3 Unsaved
 

Data warehouses and data marts are optimized for all of the following except:

 
Question 3 options:
A) 

OLTP – Online Transaction Processing

B) 

Data mining

C) 

Business Intelligence (BI)

D) 

Decision support

Save

 

Question 4 (1 point)

 Question 4 Unsaved
 

_________________ are small-scale data warehouses that support a single function or department.

 
Question 4 options:
A) 

Databases

B) 

Data warehouses

C) 

Data marts

D) 

Data silos

Save

 

Question 5 (1 point)

 Question 5 Unsaved
 

What is the key advantage of an active data warehouse (ADW) compared to a traditional data warehouse?

 
Question 5 options:
A) 

The ADW is less expensive to install and operate

B) 

Data from an ADW can be used for DSS, report generation and Business Intelligence

C) 

Data in an ADW is constantly updated, providing more current information than a traditional data warehouse

D) 

The ADW is more widely available from a larger number of vendors

Save

 

Question 6 (1 point)

 Question 6 Unsaved
 

________________ unites data, technology, analytics, and human knowledge to optimize business decisions by transforming data into usable, actionable business information.

 
Question 6 options:
A) 

Strategic business analysis

 

B) 

Strategic planning

C) 

Business Intelligence (BI)

D) 

Strategic modeling

Save

 

Question 7 (1 point)

 Question 7 Unsaved
 

Which of the following was not listed in your text as a benefit experienced by organizations that use a Document Management System (DMS)?

 
Question 7 options:
A) 

Enables the company to access and use the content contained in the documents

B) 

Cuts labor costs by automating business processes

C) 

Significantly reduces the use of paper documents and physical records

D) 

Reduces the time and effort required to locate information the business needs to support decision making

Save

 

Question 8 (1 point)

 Question 8 Unsaved
 

According to your text, mashup apps are designed based on three “tiers”.  Which of the following is not one of the three tiers or layers of a mashup app?

 
Question 8 options:
A) 

Presentation tier

B) 

Media tier

C) 

Logic tier

D) 

Data tier

Save

 

Question 9 (1 point)

 Question 9 Unsaved
 

A(n) ______________ is a technique for building applications that combine data from multiple sources to create an integrated experience.

 
Question 9 options:
A) 

Integrated data graphic

B) 

Mashup

C) 

Multi-media presentation

D) 

Enterprise graphic

Save

 

Question 10 (1 point)

 Question 10 Unsaved
 

____________________ give visual snapshots of an organization’s critical operational data or key performance indicators (KPIs) to spot problems, trends, outliers, opportunities, and patterns.

 
Question 10 options:
A) 

Enhanced spreadsheets

B) 

Business dashboards

C) 

Cloud based graphics

D) 

Enterprise graphics

Save

 

Question 11 (1 point)

 Question 11 Unsaved
 

Which of the following is not a benefit of enterprise mashup apps identified in your textbook?

 
Question 11 options:
A) 

Dramatically reduces time and effort needed to combine disparate data sources

B) 

Users can define their own data mashups by combining fields from different data sources that were not previously modeled

C) 

Users can access data from multiple competitor data warehouses to gain business intelligence (BI)

D) 

Enables the building of complex queries by non-experts with a drag-and-drop query-building tool

Save

 

Question 12 (1 point)

 Question 12 Unsaved
 

People wanting to use their mobile devices at work is part of a trend called _____________.

 
Question 12 options:
A) 

Personal devices at work (PDAW)

B) 

Bring your own device (BYOD)

C) 

Consumer /Enterprise Equipment (CEE)

D) 

Non-Approved Devices (NAD)

Save

 

Question 13 (1 point)

 Question 13 Unsaved
 

Which of the following represents the chief concern about employees using their own smartphones for work purposes?

 
Question 13 options:
A) 

Employees will spend too much time playing games or using entertainment and recreation apps, thus reducing productivity.

B) 

Managers will be unable to monitor phone calls or police the volume of personal calls made during work hours.

C) 

Many personal smartphones do not have anti-malware or data encryption apps, creating a security problem with respect to any confidential business data stored on the device.

D) 

Consumer quality equipment is more likely to break or malfunction than enterprise quality devices.

Save

 

Question 14 (1 point)

 Question 14 Unsaved
 

Which of the following factors was not listed in your text as a challenge related to managing employee owned mobile devices used for work related purposes?

 
Question 14 options:
A) 

Increase costs of managing new and existing mobile devices

B) 

Security threats – employee owned devices may not be properly protected with strong passwords or encryption software.

C) 

Compliance – employee owned devices may not meet regulatory standards for how data must be collected, stored, or made available in the event of audit or legal action.

D) 

Impact on productivity – managers must trade-off gains related to employees having 24/7 access to work related data against losses related to employees using non-work related apps (e.g. personal social media, texting, personal phone calls) while on the job.

Save

 

Question 15 (1 point)

 Question 15 Unsaved
 

____________________is a type of attack where a web site or network is bombarded with traffic to make them crash.

 
Question 15 options:
A) 

Advanced Persistent Threat (APT)

B) 

Malware intrusion

C) 

Denial of service (DoS)

D) 

System Overload Attack (SOA)

Save

 

Question 16 (1 point)

 Question 16 Unsaved
 

In Cybersecurity terminology, a threat is defined as:

 
Question 16 options:
A) 

A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset

B) 

Something or someone that may result in harm to an asset

C) 

Estimated cost, loss, or damage that can result from an exploited  vulnerability

D) 

Tool or technique that takes advantage of a vulnerability

Save

 

Question 17 (1 point)

 Question 17 Unsaved
 

In Cybersecurity terminology, a vulnerability is defined as:

 
Question 17 options:
A) 

A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset

B) 

Something or someone that may result in harm to an asset

C) 

Estimated cost, loss, or damage that can result from a cybersecurity breach

D) 

Tool or technique that threatens the confidentiality, integrity, or availability (CIA) of an asset

Save

 

Question 18 (1 point)

 Question 18 Unsaved
 

Most organizations use a software or hardware device that controls access to their private network from the Internet by analyzing data packets entering or exiting it.  These devices are called ________________.

 
Question 18 options:
A) 

Secure channels

B) 

Botnets

C) 

Virus Blockers

D) 

Firewalls

Save

 

Question 19 (1 point)

 Question 19 Unsaved
 

__________________ contain a combination of upper- and lower-case letters, numbers, and punctuation marks, and at least eight characters long although ten characters is better.

 
Question 19 options:
A) 

Secret codes

B) 

Digital keys

C) 

Strong passwords

D) 

Unbreakable passcodes

Save

 

Question 20 (1 point)

 Question 20 Unsaved
 

The objective of IT security management practices is to defend __________.

 
Question 20 options:
A) 

Data and data processing capabilities

B) 

Hardware and software applications and wireless devices

C) 

Data and networks

D) 

Data, hardware, software applications, and networks

Subject General
Due By (Pacific Time) 07/11/2014 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy