Correct Answer:
The user's identity with his public key
Note: This Question is unanswered, help us to find answer for this one
2. _______________ enables you to prevent a party from denying a previous statement or action.
Answer
Correct Answer:
Nonrepudiation
Note: This Question is unanswered, help us to find answer for this one
3. Transmitted data stored locally are referred to as __________ .
Answer
Correct Answer:
Data at rest
Note: This Question is unanswered, help us to find answer for this one
4. The successor to 3des is the ____________________ encryption standard.
Answer
Correct Answer:
Advanced
Note: This Question is unanswered, help us to find answer for this one
5. The number of possible keys to a cipher is a ___________.
Answer
Correct Answer:
Keyspace.
Note: This Question is unanswered, help us to find answer for this one
6. The __________ approach is vulnerable to man-in-the-middle attacks.
Answer
Correct Answer:
Anonymous Diffie-Hellman
Note: This Question is unanswered, help us to find answer for this one
7. On wireless networks, ____ attacks are commonly done by attackers setting up an evil twin.
Answer
Correct Answer:
Man-in-the-middle
Note: This Question is unanswered, help us to find answer for this one
8. Its essential to match your organizations required __________ with its security structure.
Answer
Correct Answer:
Permission level
Note: This Question is unanswered, help us to find answer for this one
9. Collecting in-depth information about an individual is known as ____.
Answer
Correct Answer:
Electronic profiling
Note: This Question is unanswered, help us to find answer for this one
10. Each of these is a reason why adware is scorned except _____.
Answer
Correct Answer:
It displays the attackers programming skills
Note: This Question is unanswered, help us to find answer for this one
11. Each of the following can be classified as an "insider" except _______.
Answer
Correct Answer:
Cybercriminals
Note: This Question is unanswered, help us to find answer for this one
12. Digital signatures should be created using processes and products that are based on the __________.
Answer
Correct Answer:
DSS
Note: This Question is unanswered, help us to find answer for this one
13. A centralized directory of digital certificates is called a(n) _____.
Answer
Correct Answer:
Certificate Repository (CR)
Note: This Question is unanswered, help us to find answer for this one
14. A ____ virus mutates with every infection, thus making them difficult to locate.
Answer
Correct Answer:
Polymorphic
Note: This Question is unanswered, help us to find answer for this one
15. ____________________ may be defined as confidence in or reliance on another person or entity.
Answer
Correct Answer:
Trust
Note: This Question is unanswered, help us to find answer for this one
16. _________ ensures that any changes to a production system are tested, documented, and approved.
Answer
Correct Answer:
Change control
Note: This Question is unanswered, help us to find answer for this one
17. Clerical workers using computers for word-processing tasks is an example of job _____.
Answer
Correct Answer:
Up grading
Note: This Question is unanswered, help us to find answer for this one
18. For longer video clips, the time in the cue is written in the form _____.
Answer
Correct Answer:
Hh:mm:ss.ms
Note: This Question is unanswered, help us to find answer for this one
19. The sscp exam consists of ____ multiple-choice questions, and must be completed within three hours.
Answer
Correct Answer:
125
Note: This Question is unanswered, help us to find answer for this one
20. Symmetric algorithms are typically known for their ability to maintain _______________.
Answer
Correct Answer:
Confidentiality
Note: This Question is unanswered, help us to find answer for this one
21. For computer access, a false ________ means that a legitimate user is denied access to a resource.
Answer
Correct Answer:
Rejection
Note: This Question is unanswered, help us to find answer for this one
22. Developing a seamless integration of databases with the internet is something called a(n) ______.
Answer
Correct Answer:
Semantic web
Note: This Question is unanswered, help us to find answer for this one
23. Government agencies have not supported cloud computing due to the lack of ____.
Answer
Correct Answer:
Privacy and security
Note: This Question is unanswered, help us to find answer for this one
24. Commerce service providers are also called _____ service providers.
Answer
Correct Answer:
Managed
Note: This Question is unanswered, help us to find answer for this one
25. According to the disruptive growth engine, executive leadership will allow a firm to ________.
Answer
Correct Answer:
Gain credibility and to bridge sustaining and disruptive product development
Note: This Question is unanswered, help us to find answer for this one
26. A systems request form should not ____.
Answer
Correct Answer:
Have complex instructions
Note: This Question is unanswered, help us to find answer for this one
27. A social bookmarking site is dedicated to providing all of the following except ________.
Answer
Correct Answer:
To reconnect with colleagues for business progress
Note: This Question is unanswered, help us to find answer for this one
28. A project triangle shows three legs: _____.
Answer
Correct Answer:
Project cost, scope, and time
Note: This Question is unanswered, help us to find answer for this one
29. A professional who specializes in analyzing and designing business systems is called a(n) ____.
Answer
Correct Answer:
Systems analyst
Note: This Question is unanswered, help us to find answer for this one
30. A popular technique for investigating causes and effects is called a _____ diagram.
Answer
Correct Answer:
Fishbone
Note: This Question is unanswered, help us to find answer for this one
31. A major challenge in the successful implementation of an erp system is _____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
32. ________ conversion is the riskiest type of conversion process.
Answer
Correct Answer:
Direct
Note: This Question is unanswered, help us to find answer for this one
33. ______ compares data with a set of rules or values to determine if the data meets certain criteria.
Answer
Correct Answer:
Validation
Note: This Question is unanswered, help us to find answer for this one
34. The hashed message authentication code (hmac) _____.
Answer
Correct Answer:
Encrypts the key and the message
Note: This Question is unanswered, help us to find answer for this one
35. Radius and tacacs belong to a category of protocols known as aaa (____).
Answer
Correct Answer:
Authentication, authorization, and accounting
Note: This Question is unanswered, help us to find answer for this one
36. The most reliable nmap scan is ____________ scan.
Answer
Correct Answer:
Connect
Note: This Question is unanswered, help us to find answer for this one
37. Digital certificates can be used for each of these except _____.
Answer
Correct Answer:
To verify the authenticity of the Registration Authorizer
Note: This Question is unanswered, help us to find answer for this one
38. In ipsec ____________________ mode, only the ip data is encrypted, not the ip headers.
Answer
Correct Answer:
Transport
Note: This Question is unanswered, help us to find answer for this one
39. In a ____ attack, a person redirects or captures secure transmissions as they occur.
Answer
Correct Answer:
Man in the middle
Note: This Question is unanswered, help us to find answer for this one
40. In ____, a hacker forges name server records to falsify his hosts identity.
Answer
Correct Answer:
DNS Spoofing
Note: This Question is unanswered, help us to find answer for this one
41. Aes implements a block cipher called the rijndael block cipher. _________________________
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
42. __________ was developed by phil zimmermann and uses the idea cipher for message encoding.
Answer
Correct Answer:
Pretty Good Privacy (PGP)
Note: This Question is unanswered, help us to find answer for this one
43. __________ are encrypted messages that can be mathematically proven to be authentic.
Answer
Correct Answer:
Digital signature
Note: This Question is unanswered, help us to find answer for this one
44. ____ is a method of encrypting tcp/ip transmissions above the network layer.
Answer
Correct Answer:
SSL
Note: This Question is unanswered, help us to find answer for this one
45. Ultraportables conforming to intels standards can be marketed as ____.
Answer
Correct Answer:
Ultrabooks
Note: This Question is unanswered, help us to find answer for this one
46. An executive information system (eis) is a branch of ____.
Answer
Correct Answer:
DSS
Note: This Question is unanswered, help us to find answer for this one
47. __________ is the first function in the propagation phase for a network worm.
Answer
Correct Answer:
Fingerprinting
Note: This Question is unanswered, help us to find answer for this one
48. The umls ___________ contains the terminology, classification and code system standards.
Answer
Correct Answer:
Metathesaurus
Note: This Question is unanswered, help us to find answer for this one
49. The primary disadvantage of centralized database systems is ________.
Answer
Correct Answer:
Transmission delay when users are geo-dispersed
Note: This Question is unanswered, help us to find answer for this one
50. The information about invoices to customers is tracked by ____ system.
Answer
Correct Answer:
Transaction processing system
Note: This Question is unanswered, help us to find answer for this one
51. The ________ houses the power supply, memory, and drive bays of the computer.
Answer
Correct Answer:
System unit
Note: This Question is unanswered, help us to find answer for this one
52. The firewall device must never be accessible directly from the ____________________ network.
Answer
Correct Answer:
Public
Note: This Question is unanswered, help us to find answer for this one
53. The architecture of a(n) ____________________ firewall provides a dmz.
Answer
Correct Answer:
Screened Subnet
Note: This Question is unanswered, help us to find answer for this one
54. In an information systems department, the enterprise systems subunit is responsible for ________.
Answer
Correct Answer:
Developing, installing, maintaining, and overseeing the organization's mission-critical software applications
Note: This Question is unanswered, help us to find answer for this one
55. Hybrid notebook-tablet computers are also called convertible tablets or ____.
Answer
Correct Answer:
2-in-1 computers
Note: This Question is unanswered, help us to find answer for this one
56. ____ is a valuable resource for additional information on building and staffing csirts.
Answer
Correct Answer:
NIST
Note: This Question is unanswered, help us to find answer for this one
57. A(n) ____ is like a locked door on your computer.
Answer
Correct Answer:
Firewall
Note: This Question is unanswered, help us to find answer for this one
58. The us-cert incident reporting system is used to ____.
Answer
Correct Answer:
alert the Department of Homeland Security about information security incidents
Note: This Question is unanswered, help us to find answer for this one
59. Hardware-based security controls include ____.
Answer
Correct Answer:
None of the above.
Note: This Question is unanswered, help us to find answer for this one
60. Activity trackers and smartwatches are two types of ______ devices.
Answer
Correct Answer:
Wearable
Note: This Question is unanswered, help us to find answer for this one
61. Each of the following is true regarding a keylogger except _______.
Answer
Correct Answer:
Hardware keyloggers are installed between the keyboard connector and computer keyboard or USB port
Note: This Question is unanswered, help us to find answer for this one
62. The threats to information security are _____, and the greatest threat is _____.
Answer
Correct Answer:
Increasing; human
Note: This Question is unanswered, help us to find answer for this one
63. One of the first vendor-specific certification programs was offered by ____.
Answer
Correct Answer:
Novell
Note: This Question is unanswered, help us to find answer for this one
64. In dblc, the phase after the database initial study is _____.
Answer
Correct Answer:
Database design
Note: This Question is unanswered, help us to find answer for this one
65. Data in a multidimensional database is organized in a ________ format
Answer
Correct Answer:
Cube
Note: This Question is unanswered, help us to find answer for this one
66. Behavioral models of management see managers as being ________ than does the classical model.
Answer
Correct Answer:
More informal
Note: This Question is unanswered, help us to find answer for this one
67. A(n) ________ check determines whether a required field such as lastname was filled in.
Answer
Correct Answer:
Completeness
Note: This Question is unanswered, help us to find answer for this one
68. A tool used by installers to remove the case from a desktop pc is a ____.
Answer
Correct Answer:
Nut driver.
Note: This Question is unanswered, help us to find answer for this one
69. Transaction data for a crm system might be gathered using ____.
Answer
Correct Answer:
Grocery store loyalty cards
Note: This Question is unanswered, help us to find answer for this one
70. In a data flow diagram (dfd), a spontaneous generation process is a process that has _____.
Answer
Correct Answer:
no input
Note: This Question is unanswered, help us to find answer for this one
71. A(n) _____ is a group of similar objects.
Answer
Correct Answer:
Class
Note: This Question is unanswered, help us to find answer for this one
72. When ppp is used over an ethernet network, it is known as ________________.
Answer
Correct Answer:
Point to Point over Ethernet
Note: This Question is unanswered, help us to find answer for this one
73. A ________ is an encryption key used to encrypt other keys before transmitting them.
Answer
Correct Answer:
Key-encrypting key
Note: This Question is unanswered, help us to find answer for this one
74. A(n) ____ attack is a hacker using a personal computer to break into a system.
Answer
Correct Answer:
Direct
Note: This Question is unanswered, help us to find answer for this one
75. The cto heads the ________ group in the is department.
Answer
Correct Answer:
Technology.
Note: This Question is unanswered, help us to find answer for this one
76. Unlike an executive information system, a decision support system (dss) ____.
Answer
Correct Answer:
Helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models
Note: This Question is unanswered, help us to find answer for this one
77. The microsoft office suite is a tempting target for viruses because ___________.
Answer
Correct Answer:
It is designed so that programmers can access its internal objects
Note: This Question is unanswered, help us to find answer for this one
78. Is the result of optimizing operations and supplier processes.
Answer
Correct Answer:
Cost Reduction
Note: This Question is unanswered, help us to find answer for this one
79. A(n) ________ is a dedicated computer in a client/server environment that hosts a dbms.
Answer
Correct Answer:
Database server
Note: This Question is unanswered, help us to find answer for this one
80. A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.
Answer
Correct Answer:
Business ecosystem
Note: This Question is unanswered, help us to find answer for this one
81. ________ is the security guarantee that people who intercept messages cannot read them.
Answer
Correct Answer:
Confidentiality
Note: This Question is unanswered, help us to find answer for this one
82. Qr or ________ codes let any piece of print host a link to online information
Answer
Correct Answer:
Quick response
Note: This Question is unanswered, help us to find answer for this one
83. Online analytical processing is the foundation of the ________ module in erp.
Answer
Correct Answer:
Business intelligence
Note: This Question is unanswered, help us to find answer for this one
84. In fisma, ________ is done internally by the organization.
Answer
Correct Answer:
Both A and B
Note: This Question is unanswered, help us to find answer for this one
85. The ____ view involves how data is stored on and retrieved from storage media.
Answer
Correct Answer:
Physical
Note: This Question is unanswered, help us to find answer for this one
86. ________ is our normal sense of the world around us enhanced with digital information.
Answer
Correct Answer:
Augmented reality
Note: This Question is unanswered, help us to find answer for this one
87. ____ is the formal term for combining two or more columns to form a primary key.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
88. A(n) ____ is an extension of an organization?s intranet into cloud computing.
Answer
Correct Answer:
Private cloud.
Note: This Question is unanswered, help us to find answer for this one
89. A subform may be added to a main form by using the subform/subreport tool or by using the ____.
Answer
Correct Answer:
Subform Wizard
Note: This Question is unanswered, help us to find answer for this one
90. A high-end graphics card is sometimes called a ____ card.
Answer
Correct Answer:
Video
Note: This Question is unanswered, help us to find answer for this one
91. In mpls, the ________ adds the label to the packet.
Answer
Correct Answer:
First label-switching router
Note: This Question is unanswered, help us to find answer for this one
92. Supply chain execution ________.
Answer
Correct Answer:
Involves the management of information flow
Note: This Question is unanswered, help us to find answer for this one
93. E-hubs are more ________ than private industrial networks.
Answer
Correct Answer:
Transaction-oriented
Note: This Question is unanswered, help us to find answer for this one
94. In biometric, a match occurs when a ________ meets the decision criteria.
Answer
Correct Answer:
Match index
Note: This Question is unanswered, help us to find answer for this one
95. Sophisticated attacks often are difficult to identify amid the ""noise"" of many ________ attacks.
Answer
Correct Answer:
Script kiddie
Note: This Question is unanswered, help us to find answer for this one
96. Smartphones use ________ technology, allowing users to perform several functions with one device.
Answer
Correct Answer:
Convergence or integration
Note: This Question is unanswered, help us to find answer for this one
97. Porter defined value as the ________.
Answer
Correct Answer:
Amount of money that a customer is willing to pay for an offering
Note: This Question is unanswered, help us to find answer for this one
98. Benchmark tests on competing products can be used to select ____.
Answer
Correct Answer:
Both hardware and software products
Note: This Question is unanswered, help us to find answer for this one
99. During the early 1980s, ____ word processors competed for market share.
Answer
Correct Answer:
Several
Note: This Question is unanswered, help us to find answer for this one
100. During the 1980s, incompatible computer products resulted in ____.
Answer
Correct Answer:
Excessive spare parts inventories, a lack of transferable employee skills, increased support costs.
Note: This Question is unanswered, help us to find answer for this one
101. _________ is the most difficult, radical, lengthy, and comprehensive strategy.
Answer
Correct Answer:
BPR
Note: This Question is unanswered, help us to find answer for this one
102. To request a web page or other resource located on the internet, use its ____.
Answer
Correct Answer:
Both
Note: This Question is unanswered, help us to find answer for this one
103. Products and services designed to target a specific industry are known as _____.
Answer
Correct Answer:
None of these
Note: This Question is unanswered, help us to find answer for this one
104. A comparison is correct only when the correct ____ and operator are used.
Answer
Correct Answer:
Operands
Note: This Question is unanswered, help us to find answer for this one
105. Ipv6 was introduced when ipv4 ________.
Answer
Correct Answer:
No longer had enough unique addresses
Note: This Question is unanswered, help us to find answer for this one
106. The use of certificate authorities to associate public keys with certain users is known as ____.
Answer
Correct Answer:
PKI
Note: This Question is unanswered, help us to find answer for this one
107. The need for collaboration is greatest for ________ decisions.
Answer
Correct Answer:
Strategic
Note: This Question is unanswered, help us to find answer for this one
108. One characteristic of a structured problem is that _____.
Answer
Correct Answer:
It is straightforward, requiring known facts and relationships
Note: This Question is unanswered, help us to find answer for this one
109. In the context of the data component of an information system, external data sources include _____.
Answer
Correct Answer:
Labor statistics
Note: This Question is unanswered, help us to find answer for this one
110. Amazon.com uses ____ to provide customized book recommendations based on past purchases.
Answer
Correct Answer:
Cookies
Note: This Question is unanswered, help us to find answer for this one
111. A computer ____ is a person who has been hired to break into a computer and steal information.
Answer
Correct Answer:
Spy
Note: This Question is unanswered, help us to find answer for this one
112. In a cost-benefit analysis, operating costs are ____ costs.
Answer
Correct Answer:
Ongoing
Note: This Question is unanswered, help us to find answer for this one
113. The _____ is not a component of the typical dss.
Answer
Correct Answer:
Inference engine
Note: This Question is unanswered, help us to find answer for this one
114. The _____ standard can transmit up to 75 mbps and has a range of 31 miles.
Answer
Correct Answer:
WiMAX
Note: This Question is unanswered, help us to find answer for this one
115. A planned series of actions in a corporation is a(n) ________.
Answer
Correct Answer:
Process
Note: This Question is unanswered, help us to find answer for this one
116. _____ refers to efforts by unauthorized users to access data traveling over wireless networks.
Answer
Correct Answer:
Eavesdropping
Note: This Question is unanswered, help us to find answer for this one
117. _____ connect buyers and sellers across many industries and are used mainly for indirect materials.
Answer
Correct Answer:
Horizontal exchanges
Note: This Question is unanswered, help us to find answer for this one
118. ____ is text that has no formatting (such as bolding or underlining) applied.
Answer
Correct Answer:
Plain text
Note: This Question is unanswered, help us to find answer for this one
119. With respect to the general classes of computers, a ________ is used for small business computing.
Answer
Correct Answer:
Personal computer
Note: This Question is unanswered, help us to find answer for this one
120. _________ tags make it possible to search for photos or videos using keywords.
Answer
Correct Answer:
Metadata
Note: This Question is unanswered, help us to find answer for this one
121. The ________characteristic of high-quality information ensures that all the values are correct.
Answer
Correct Answer:
Accuracy
Note: This Question is unanswered, help us to find answer for this one
122. _____ feasibility is concerned with whether a new system can be completed on time.
Answer
Correct Answer:
Economic
Note: This Question is unanswered, help us to find answer for this one
123. The goal of the planning phase for an information system project is to create a(n) ____________.
Answer
Correct Answer:
Project development plan
Note: This Question is unanswered, help us to find answer for this one
124. During the implementation phase of the systems development life cycle (sdlc), _____.
Answer
Correct Answer:
Phased-in-phased-out
Note: This Question is unanswered, help us to find answer for this one
125. A __________ is a system that protects the computer network from unauthorized access.
Answer
Correct Answer:
Firewall.
Note: This Question is unanswered, help us to find answer for this one
126. A key feature on an enterprise resource planning system is that _____.
Answer
Correct Answer:
It employs a database of key operational and planning data that can be shared by all
Note: This Question is unanswered, help us to find answer for this one
127. A key feature of an enterprise system is that _________.
Answer
Correct Answer:
It employs a database of key operational and planning data that can be shared by all
Note: This Question is unanswered, help us to find answer for this one
128. The temperature of ignition is called the _________________________ of a material.
Answer
Correct Answer:
Flame
Note: This Question is unanswered, help us to find answer for this one
129. If you determine a virus has struck a system, the first step is to _________.
Answer
Correct Answer:
Unplug the machines from the network
Note: This Question is unanswered, help us to find answer for this one
130. Besides its regular display, almost every font has ____ common stylistic sets.
Answer
Correct Answer:
Three
Note: This Question is unanswered, help us to find answer for this one
131. A user name ________ a user.
Answer
Correct Answer:
Identifies.
Note: This Question is unanswered, help us to find answer for this one
132. In a(n) ________ system, each step is dependent on the previous step being completed.
Answer
Correct Answer:
Waterfall
Note: This Question is unanswered, help us to find answer for this one
133. The best password will use ________.
Answer
Correct Answer:
Upper- and lowercase letters of the alphabet with no words in any language, some special characters and some numbers, and will be at least 10 characters long
Note: This Question is unanswered, help us to find answer for this one
134. ________ often get their authentication information from ________.
Answer
Correct Answer:
Central authentication servers, metadirectory servers
Note: This Question is unanswered, help us to find answer for this one
135. Most encryption for data stored on a laptop uses ____ cryptography.
Answer
Correct Answer:
Private key
Note: This Question is unanswered, help us to find answer for this one
136. In an if...then statement, the ____ symbol is used to test for inequality.
Answer
Correct Answer:
<>
Note: This Question is unanswered, help us to find answer for this one
137. The most basic type of cryptographic algorithm is a ____ algorithm.
Answer
Correct Answer:
Hash
Note: This Question is unanswered, help us to find answer for this one
138. Public key infrastructure (pki) _____.
Answer
Correct Answer:
Is the management of digital certificates
Note: This Question is unanswered, help us to find answer for this one
139. An entity that issues digital certificates is a _____.
Answer
Correct Answer:
Certificate Authority (CA)
Note: This Question is unanswered, help us to find answer for this one
140. If the expression is false, the ________ operator will return true.
Answer
Correct Answer:
NOT
Note: This Question is unanswered, help us to find answer for this one
141. The protocols pop3 and __________ can be used to manage your incoming mail.