BBL Drizzy
Coffee
N00ds
Old Man Angel
I suck pp
100

Managers can help their organizations gain _____ through cost leadership, differentiation, or focus.

technology infrastructure
information systems expertise
a set of procedures
a competitive advantage


a competitive advantage

100

Which type of information system do organizations use to define structured interactions among employees or between the organizational
and external customers, suppliers, or business partners?

workgroup information system
interorganizational information system
enterprise information system
personal information system

enterprise information system

100

Fabiola's IS management team is formulating their IS strategic plan. Fabiola reminds them that they must consider __.

limiting communication with lower-level managers
corporate strategy and business unit strategies
the IS organization isolated from the rest of the organization
previous but not future IT investments

corporate strategy and business unit strategies

100

In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________.

a personal information system
an organizational complement
a workgroup information system
an enterprise information system

a workgroup information system



100

Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

The network router sends traffic to the firewall as well as to the IDS.
Messages from the IDS are routed to the network security team.
The network security team decides to block traffic from that IP address.
The IDS warns the firewall of suspicious traffic.

The network router sends traffic to the firewall as well as to the IDS.

200

Franklin is responsible for helping to ensure that his organization meets the Payment Card Industry Data Security Standard when handling customers' credit card information. Franklin maintains information systems with influence within the _____.

workgroup sphere
personal sphere
enterprise sphere
interorganizational sphere

enterprise sphere

200

Which of the following components forms the foundation of every computer-based information system and includes resources such as
hardware, software, and data center facilities?

people
processes
structure
technology infrastructure

technology infrastructure

200

An IS manager recommends that his organization invest in improving its customer information system so as to more clearly define the target market and improve service to that market. What business strategy does this represent?

focus
high standards
differentiation
cost leadership

focus

200

To improve his score on a security self-assessment, Saul set up his laptop so that the first thing he must do when he turns it on is _____.

run a file backup procedure.
log in to his employer's VPN.
install new software updates.
enter a strong security password.

enter a strong security password.



200

You work for a company that is growing. Originally, all the users in all
departments had access to all the data in the database. It is considered a
security risk. What is an appropriate action to reduce the risk?

Assign roles and privileges to users so that only job-relevant data is
accessible to the user.
Tweak the firewall parameters so that outgoing traffic can be better
controlled.
Install and provide stronger anti-virus software on the users' computers.
Install a two-step login procedure, where the user has to key in additional
information for logging in.

Assign roles and privileges to users so that only job-relevant data is accessible to the user.

300

Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by _____.

reacting passively
being proactive
staying focused on costs
remaining in state of flux

being proactive

300

Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____.

interorganizational information system
workgroup information system
personal information system
enterprise information system

interorganizational information system

300

Janelle is helping create a strategic plan for her organization. What should she anticipate will be stable--that is, change little, if at all--over time?

economic growth
suppliers
importance of planning
competitiors

importance of planning

300

Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate
for _____.

computer forensics the CIA security triadmanaged security service providersa security dashboard

computer forensics

300

You wish to use your personal laptop computer at work, but the IT
department folks will not allow this. The likely reason is that ______.

your productivity could not be accurately measured.
you will use your laptop for non-work-related activities.
your non-work-related use of the laptop could increase vulnerability.
your activities could not be monitored.

your non-work-related use of the laptop could increase vulnerability.

400

When entering a customer order, Josie ensures that the desired end result is achieved and any problems are reported to the correct person by following a(n) _____.

procedure
EDI standard
supply chain
process

procedure

400

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?

focus
differentiation
cost leadership
high standards

cost leadership



400

Companies that share data with other organizations in a manner that conforms to rigidly defined industry standards are using a type of ________.

workgroup information system
interorganizational information system
personal information system
enterprise information system

interorganizational information system

400

A data breach at your business resulted in the loss of some customer
data. Several angry customers have filed charges. What is a
recommended course of action to prepare for future events?

meet with your lawyers to prepare to counter-sue the customers
activate the forensics analysis team and prepare documentation
release a media statement denying the customer allegations and asserting
that all customer data is safe
settle with the customers, however much it may cost

activate the forensics analysis team and prepare documentation

400

Kenneth is assisting with step 7 of his organization's security risk
assessment. He and his team compare the risks of potential security
breaches against the estimated costs of preventing them from happening.
Why is this an important step?

Data availability requires implementing products, services, policies, and procedures to ensure that data are accessible.
No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs.
Taking action to prevent cyberattacks, such as installing protective software, makes them much less likely to occur.
Periodic security audits are needed to ensure that individuals are following established policies.

No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs.

500

Jude, a senior executive, and the managers who report to him must make many decisions for their business units. To assist them with
this, they rely on strategic planning to provide _____.

new and loyal customers
a reactive approach to market changes
a framework and a clearly defined direction
the human and material resources they need

a framework and a clearly defined direction

500

A senior IS manager implements a vendor-managed inventory system that reduces both the administrative costs of managing inventory and inventory holding costs. What business strategy does this represent?

focus
high standards
cost leadership
differentiation

cost leadership

500

What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in?

information system strategic plan
high-demand certifications list
procedural certifications list
enterprise information system

information system strategic plan

500

Samantha owns a small business that handles a lot of sensitive customer
data and would be devastated by a data breach. Her IS department,
which consists of one part-time consultant named Nikki, is overwhelmed
by the number of alerts and false alarms constantly issued by her
security-monitoring systems and expresses concerns about their data
security. What should Samantha do about this?

research different security software options
ask Nikki to disable the alerts and alarms
change her passwords more often
consider a managed security service provider

consider a managed security service provider

500

Which of the following is considered the most likely source of cyberattacks, based on a poll of global executives, information security
managers, and IT leaders?

careless insiders
lone wolf attackers
MSSPs
cyberterrorists

careless insiders