1.Which one of the following is not a primary threat to information security? c a)Viruses b)Spam c)Authorized access d)Worms 2.Which statement is correct? b a)Spams are viruses that can be blocked by firewalls b)Using spywares is legal and they can be

chocolatehookSecurity

Nov 30, 2013 (3 years and 4 months ago)

270 views

1.

Which one of the following is not a
primary
threat to information security?

c

a)

Viruses

b)

Spam

c)

Authorized access

d)

Worms

2.

Which statement is
correct
?

b

a)

Spams are viruses that can be blocked by firewalls

b)

Using spywares is legal and they can be



blocked by fi
rewalls

c)


Cookies are normally used for illegitimate purposes

d)

a and c

3.

Choose the incorrect statement.

d

a)

Encryption is the process of encoding messages

b)

Encryption is the process of decoding messages

c)

Encryption
software

ensure privacy

d)

Encryption i
s a secure

channel for sending information.

4.

Wh
ich of the following is the right term for the

system composed of hardware, software or both
that is designed to dete
ct intrusion and prevent unauthorized access to or from a private
network? b

a)

Alarm

b)

Firewall

c)

Logic
bomb

d)

Biometrics

5.

………………
is
assuring the recipients that received messages has not been altered in any way
from the original that was sent.

b

a)

Authentication

b)

Integrity

c)

Firewall

d)

Spam software

6.

Biometric is a
/an

………...

b

a)

Encryption method

b)

Authentication

method

c)

Privacy enhancement method

d)

method for disaster recovery

7.

All of the following are correct domain suffix pairs except: c

a)

.edu
-

educational institutions

b)

.mil


military

c)

.neo


network organizations

d)

.com
-
commercial businesses

8.

Which languages allows for docum
ents to be shared and linked on the World Wide Web? c

a)

FTP

b)

SSL

c)

HTML

d)

HTTP

9.

Which of the following is not possible a threat to information systems security?

d

a)

Outside intruders

b)

Disasters

c)

Employees

d)

Encrypted d
ata packets

10.

Which o
f the following does not
indicate

the value of an enterprise system?

c

a)

It Increases operational efficiency

b)

It provide information for decision making

c)

It
increases the security

d)

It provide tools for analyzing data

11.

Whic
h of the following does not include the job of
the
supply chai
n execution system?
a

a)

It provides optimal sourcing plans

b)

it tracks the physical status of goods

c)

manages the flow of products through distribution centers

d)

a and c

12.

Which of the following is a requirement in implementing “Just
-

in
-
Time” strategy?a

a)

Information

b)

Enterprise system

c)

Supply chain execution system

d)

Supply chain planning system

13.

Which of the following software deals with employees issues such as setting objectives or
performance management?

D

a)

CRM

b)

REC

c)

SFA

d)

ERM

14.

Which of t
he following statements is true
about

the churn rate ?

a

a)

It is an indicator of the growth or decline of a firm’s customer’s base.

b)

It measures the revenue produced by a specific customer

c)

It measures t
he number of most profitable customers

d)

It measures the lost revenue of customers who stop

using or purchasing products

15.

Which of the following statements is incorrect?

b

a)

Intranets gathers information from isolated business processes within the firm

b)

Safety
stocks a
cts when a slight rise in demand for an item might cause different

players
to stoc
kpile inventory.

c)


Cu
s
tomer service modules in CRM provide information and tools to increase the
efficiency of call centers.

d)

Supply chain management software system automates the flow of information among
members of the supply chain.

16.

Which of the following

statement
s is

true about the push based model?c

a)

It is known as
demand

driven model

b)

Only products to
fulfill

orders
move down the supply chain to the retailers.

c)

It is about selling what
is made

d)

Dell company is an example for such model

17.

Which of the follow
ing
cannot be considered as a touch point?
d

a)

Retail store

b)

Website’s chat rooms

c)

Phone

d)

Firms’ catalogs

18.

Which of the following is not a feature of the ecommerce technology?

c

a)

Ubiquity

b)

Information Richness

c)

Lower delayed gratification

d)

Information density

19.

An…
….
….. exists when one party in interaction has more information that is important for the
transaction?

a

a)

Information asymmetry

b)

Dynamic pricing

c)

Universal Information

d)

Dynamic information

20.

Which of the following is not true about the digital

and traditional

mar
kets?

d

a)

Search costs are

high
er

in traditional

markets

b)

Menu cost is lower in digital market

c)

Traditional market has weaker network effect

d)

Information asymmetry is high
er

in digital market
.

21.

Which of the following statement is not true?a

a)

Amazon
.com is a
n
online marketplace

b)

Google maps is a service provider

c)

Ebay is online market

d)

Yahoo.com is a portal

22.

Which of the following is not an example of M
-
commerce services?

c

a)

Games

b)

Advertising

c)

Blogs

d)

Bill payment

23.

Which of the following statements is true? a

a)

Digital checking is an electronic check

b)

Paypal is an example of digital Wallet

c)

Google checkout is a
n example of
c
redit card payment system

d)

Yahoo Bill is a digital checking



24.

Which

of the following statements is not

true

about the electronic payment syste
ms
?
a

a.

Electronic billing
have been developed for purchases less than 10$

b.

Digital checking systems can be used for online shopping payments

c.

Electronic billing presentment can be used for paying routine monthly bills

d.

Paypal makes it possible for people to sen
d money to vendors who are not setup to
accept credit card.

25.

Which one is not true about the clickstream tracking tools?
c

a.

It collects data on customers activities at Web Sites

b.

It stores the information about customers in a log

c.

It analysis data about
customers

d.

All of the
above all true

26.

Which of the following is not in the system development life cycle? c

a.

System identification

b.

System implementation

c.

System maintenance

d.

System design

27.

Which tool is used to
identify the relationships between entities to assi
st in developing
applications and databases
? b

a.

Forms and Reports

b.

ERD

c.

Tutorials

d.

Interfaces and Dialogues

28.


Which of the following
can be avoided by applying

a Just
-
in
-
time strategy?
a

a.

Bullwhip effect

b.

Information symmetry

c.

Technology changes

d.

Churn rate increas
e


29.

Which of the following is
Transmission Control Protocol (TCP)’s job?

c

a.

Connect one network to another

b.

Addresses each packet with the source and destination address

c.

Breaks information into small chucks called data packets

d.

P
rocess user requests for
displaying Web pages

30.

Which of the following
technologies

is

not

used to

prevent security breaches
? d

a.

Firewalls

b.

Biometrics

c.

VPN and Encryption

d.

All of the above are used for that purpose