Which level of management is concerned with updating inventory, scheduling
production, and coordinating shipping? - ANS IS Operational managers
Which of the following is used to ensure that the person accessing a system is, indeed,
who they present themselves to be? - ANS IS authentication
Which of the following is one of the most common ways thieves steal corporate
information? - ANS IS stealing employees laptops while employees are traveling
True or false: A relational database is one in which every data item is related to every
other data item. - ANS IS false
Which of the following make up the security triad? - ANS IS Confidentiality, Integrity,
Availability
True or false: For simple uses, a spreadsheet can substitute for a database quite well. -
ANS IS true
Which of the following is not true about firewalls? - ANS IS they only filter data packets
coming into the network or system
True or false: An Intrusion Detection System (IDS), in and of itself, does not add any
additional security. - ANS IS true
When looking to secure information resources, organizations must balance the need for
security with which of the following? - ANS IS the users' need to effectively access and
use these resources
Which of the following is the process of formalizing the capture, indexing, and storing of
the company's knowledge in order to benefit from the experiences and insights that the
company has captured during its existence? - ANS IS knowledge management
Which of the following should be included in a good backup plan? (select all that apply)
- ANS IS all of the above
Which of the following is the process of analyzing data to find previously unknown
trends, patterns, and associations in order to make decisions? - ANS IS data mining
Which of the following are true of a data warehouse? (select all that apply) - ANS IS all
of the above
Which level of management is concerned with profitability and market share? - ANS IS
strategic managers