ITM 100 EXAM QUESTIONS AND
ANSWERS (100% VERIFIED
ANSWERS)
War driving - Answer-Deliberately searching for Wi-Fi signals while driving by in a
vehicle
SQL injection attack - Answer-occurs when users enter a SQL statement into a form in
which they are supposed to enter a name or other data
Spoofing - Answer-When someone pretends to be someone else with the intent of
obtaining unauthorized data.
Sniffing - Answer-technique for intercepting computer communications
Heuristics - Answer-Mental shortcuts or "rules of thumb" that often lead to a solution
(but not always).
IS Audit - Answer-an audit that collects and evaluates evidence to determine whether
the information systems and related resources adequately safeguard assets, maintain
data and system integrity and availability, provide relevant and reliable information,
achieve organizational goals, consume resources efficiently, and have, in effect, internal
controls that provide reasonable assurance that business, operational and control
objectives will be met
Security Audit - Answer-comprehensive review of organizational security
Profiling - Answer-creating a description of someone based on collected data
Fair Info Practices (FIP) - Answer-Opt in vs. opt out
Conversational commerce - Answer-Dual concepts of conversations and engagement
regarding commerce
Global reach - Answer-The technology reaches across national boundaries, around
Earth
Digital Goods - Answer-goods that can be delivered over a digital network
Types of E-Commerce Business Models - Answer-- B2C
- B2B
,- C2C
E-Commerce Business Models - Answer-Portal, e-tailer, content provider, transaction
broker, market creator, service provider, community provider
portals - Answer-Web pages that users launch when they first log on to the Web
market creator - Answer-builds a digital environment where buyers and sellers can
meet, display products, search for products, and establish a price for products
community provider - Answer-provides an online meeting place where people with
similar interests can communicate and find useful information
Advertising revenue model - Answer-a company provides a forum for advertisements
and receives fees from advertisers
field - Answer-a single characteristic of data that appears in a table as a column
file - Answer-A document that is stored on your computer. In Excel, a file is also known
as a workbook.
record - Answer-A collection of fields that appear as a row in a database or table.
entity - Answer-a person, place, or thing for which data is collected, stored, and
maintained
Transaction fee model - Answer-the company receives a fee for executing a transaction
Affiliate Revenue model - Answer-a company steers business to an affiliate and
receives a referral fee or percentage of the revenue from any resulting sales
long tail marketing - Answer-refers to the ability of firms to profitably market goods to
very small online audiences, largely because of the lower costs of reaching very small
market segments (people who fall into the long tail ends of a bell curve)
Behavioural targeting - Answer-using online consumer tracking data to target
advertisements and marketing offers to specific consumers
Native advertising - Answer-an execution strategy that mimics the content of the
website where the message appears
Wisdom of Crowds - Answer-under the right circumstances, groups are smarter than the
smartest people in them, meaning that large numbers of consumers can predict
successful products
, Electronic Data Interchange (EDI) - Answer-the computer-to-computer exchange of
business documents from a retailer to a vendor and back
Features of social commerce - Answer-1. Newsfeed
2. Timelines
3. Social sign-on
4. Collaborative shopping
5. Network notification
6. Social search
Private industrial networks - Answer-Web-enabled networks linking systems of multiple
firms in an industry for the coordination of trans-organizational business processes
Net marketplace - Answer-brings hundreds to thousands of suppliers and buyers into a
single Internet-based environment to conduct trade
Direct goods - Answer-goods used in a production process
indirect goods - Answer-all other goods not directly involved in the production process
Virus - Answer-A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data
Worm - Answer-a software program capable of reproducing itself that can spread from
one computer to the next over a network
pharming - Answer-Reroutes requests for legitimate websites to false websites
cyberwarfare - Answer-war in which a country's information systems could be paralyzed
from a massive attack by destructive software
Social engineering - Answer-hackers use their social skills to trick people into revealing
access credentials or other valuable information
Risk Assessment - Answer-evaluation of the short-term and long-term risks associated
with a particular activity or hazard
Information Systems Controls - Answer-the procedures, devices, or software aimed at
preventing a compromise to a system
Business Continuity Planning - Answer-outlines procedures for keeping an organization
operational in the event of a natural disaster or network attack
SSL - Answer-An abbreviation for Secure Sockets Layer; it is a protocol that provides
security when communicating on the Internet
ANSWERS (100% VERIFIED
ANSWERS)
War driving - Answer-Deliberately searching for Wi-Fi signals while driving by in a
vehicle
SQL injection attack - Answer-occurs when users enter a SQL statement into a form in
which they are supposed to enter a name or other data
Spoofing - Answer-When someone pretends to be someone else with the intent of
obtaining unauthorized data.
Sniffing - Answer-technique for intercepting computer communications
Heuristics - Answer-Mental shortcuts or "rules of thumb" that often lead to a solution
(but not always).
IS Audit - Answer-an audit that collects and evaluates evidence to determine whether
the information systems and related resources adequately safeguard assets, maintain
data and system integrity and availability, provide relevant and reliable information,
achieve organizational goals, consume resources efficiently, and have, in effect, internal
controls that provide reasonable assurance that business, operational and control
objectives will be met
Security Audit - Answer-comprehensive review of organizational security
Profiling - Answer-creating a description of someone based on collected data
Fair Info Practices (FIP) - Answer-Opt in vs. opt out
Conversational commerce - Answer-Dual concepts of conversations and engagement
regarding commerce
Global reach - Answer-The technology reaches across national boundaries, around
Earth
Digital Goods - Answer-goods that can be delivered over a digital network
Types of E-Commerce Business Models - Answer-- B2C
- B2B
,- C2C
E-Commerce Business Models - Answer-Portal, e-tailer, content provider, transaction
broker, market creator, service provider, community provider
portals - Answer-Web pages that users launch when they first log on to the Web
market creator - Answer-builds a digital environment where buyers and sellers can
meet, display products, search for products, and establish a price for products
community provider - Answer-provides an online meeting place where people with
similar interests can communicate and find useful information
Advertising revenue model - Answer-a company provides a forum for advertisements
and receives fees from advertisers
field - Answer-a single characteristic of data that appears in a table as a column
file - Answer-A document that is stored on your computer. In Excel, a file is also known
as a workbook.
record - Answer-A collection of fields that appear as a row in a database or table.
entity - Answer-a person, place, or thing for which data is collected, stored, and
maintained
Transaction fee model - Answer-the company receives a fee for executing a transaction
Affiliate Revenue model - Answer-a company steers business to an affiliate and
receives a referral fee or percentage of the revenue from any resulting sales
long tail marketing - Answer-refers to the ability of firms to profitably market goods to
very small online audiences, largely because of the lower costs of reaching very small
market segments (people who fall into the long tail ends of a bell curve)
Behavioural targeting - Answer-using online consumer tracking data to target
advertisements and marketing offers to specific consumers
Native advertising - Answer-an execution strategy that mimics the content of the
website where the message appears
Wisdom of Crowds - Answer-under the right circumstances, groups are smarter than the
smartest people in them, meaning that large numbers of consumers can predict
successful products
, Electronic Data Interchange (EDI) - Answer-the computer-to-computer exchange of
business documents from a retailer to a vendor and back
Features of social commerce - Answer-1. Newsfeed
2. Timelines
3. Social sign-on
4. Collaborative shopping
5. Network notification
6. Social search
Private industrial networks - Answer-Web-enabled networks linking systems of multiple
firms in an industry for the coordination of trans-organizational business processes
Net marketplace - Answer-brings hundreds to thousands of suppliers and buyers into a
single Internet-based environment to conduct trade
Direct goods - Answer-goods used in a production process
indirect goods - Answer-all other goods not directly involved in the production process
Virus - Answer-A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data
Worm - Answer-a software program capable of reproducing itself that can spread from
one computer to the next over a network
pharming - Answer-Reroutes requests for legitimate websites to false websites
cyberwarfare - Answer-war in which a country's information systems could be paralyzed
from a massive attack by destructive software
Social engineering - Answer-hackers use their social skills to trick people into revealing
access credentials or other valuable information
Risk Assessment - Answer-evaluation of the short-term and long-term risks associated
with a particular activity or hazard
Information Systems Controls - Answer-the procedures, devices, or software aimed at
preventing a compromise to a system
Business Continuity Planning - Answer-outlines procedures for keeping an organization
operational in the event of a natural disaster or network attack
SSL - Answer-An abbreviation for Secure Sockets Layer; it is a protocol that provides
security when communicating on the Internet