100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MGSC 300 Final Exam (1) CA$11.46   Add to cart

Exam (elaborations)

MGSC 300 Final Exam (1)

 1 view  0 purchase

MGSC 300 Final Exam (1)

Preview 2 out of 12  pages

  • August 12, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (234)
avatar-seller
topgradesdr
MGSC 300 Final Exam
- - ANS-CH 5

invading someone else's computer, usually for personal gain or just for the satisfaction of
invading someone else's computer - ANS-Hacking

social-engineering attack that can use e-mail sent to the recipient under false pretense to steal
confidential information from the target. - ANS-phishing

Bring your own device.

- A policy allowing employees to connect personally owned devices, such as tablets and
smartphones, to a company network.
- Data security is often a concern with BYOD policies and organizations often use VLANs to
isolate mobile devices. - ANS-BYOD

software that is intended to damage or disable computers and computer systems. -
ANS-malware

A type of malware that prevents a user's device from properly and fully functioning until a fee is
paid. - ANS-ransomware

Profit motivated attackers operate "under the radar" and continue to steal data, unlike hackers
with personal agendas that carry out high-profile attacks to gain recognition - ANS-advanced
persistent threats (APT)

work or invention that is a result of creativity that has commercial value, including copyrighted
property such as a blueprint manuscript or design, and is protected by law from unauthorized
use by others
- ex: trade secrets,
- can represent more than 80% of a company's value
- more difficult to protect IP due to corporate moles, insiders, and accessible anonymity of the
internet - ANS-intellectual property (IP)

a type of malware that appears harmless, but is malicious. Requires human interaction
- ex. clicking a link or download - ANS-trojan horse

a type of malware that attaches itself to programs, files, and links, which can affect users that
either click the links or interact with any files. - ANS-viruses

, can independently replicate and spread across networks or systems without having to attach
themselves to files or having human intervention. - ANS-worms

Risk management process
- maintaining business functions or restoring them quickly when there is a major disruption. The
plan covers business processes, assets, human resources, business partners, and more.
- Meant to keep the business running after a disaster occurs. - ANS-business continuity plan
*know definition!

EOQ: economic order quantity
MRP: material resource planning
JIT: just in time
Consignment stock: inventory that a vendor sends to a retailer for sale
Reorder points: specific level at which inventory needs to be replenished - ANS-supply chain
management considers...

planning, sourcing, manufacturing, delivery, returns - ANS-supply chain management phases (5)

Software or hardware device that controls access to a private network from a public network by
analyzing data packets entering or exiting it - ANS-firewall

an objective measure for comparing competitive suppliers. helps monitor quality, cost, delivery
and innovation of goods and services purchased from them. - ANS-supplier metrics

the process of granting or denying access to specific data or resources based on a set of
permissions or rules - ANS-data authorization

A process used to verify data integrity e.g., verification that data received are identical to data
sent, or verification that a program is not infected by a virus. - ANS-data authentication

- - ANS-CH 6

refers to the tools, algorithms, and methodologies used to retrieve specific information or data
from a vast pool of resources, such as databases, websites, documents, or other repositories. -
ANS-search technology

1. enterprise search
2. recommendation engines
3. SEM
4. Web search - ANS-How does search technology impact businesses?

AI systems that help people discover things they may like but are unlikely to discover on their
own.
- collaborative filtering: recommendations based on users' similarity to other people

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller topgradesdr. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$11.46. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79650 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$11.46
  • (0)
  Add to cart