- Which level of management is concerned with updating inventory, scheduling production, and coordinating shipping?
Operational managers
- Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
authentication
- Which of the following is one of the most common ways thieves steal corporate information?
stealing employees laptops while employees are traveling
- True or false: A relational database is one in which every data item is related to every other data item.
false
- Which of the following make up the security triad?
Confidentiality, Integrity, Availability
- True or false: For simple uses, a spreadsheet can substitute for a database quite well.
true
- Which of the following is not true about firewalls?
they only filter data packets coming into the network or system
- True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security.
true
- When looking to secure information resources, organizations must balance the need for security with which of the following?
the users' need to effectively access and use these resources
- Which of the following is the process of formalizing the capture, indexing, and storing of the company's knowledge in order to benefit from the experiences and insights that the company has captured during its existence?
knowledge management
- Which of the following should be included in a good backup plan? (select all that apply)
all of the above
- Which of the following is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions?
data mining
- Which of the following are true of a data warehouse? (select all that apply)
all of the above
- Which level of management is concerned with profitability and market share?
strategic managers
- Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
encryption
- Which of the following is used to transform data into information in order to generate knowledge
that can be used for decision making?
database
- Which of the following is described as the assurance that the information being accessed has not been altered and truly represents which is intended
integrity