MIS 2201 Exam 3 Questions with Answers All Correct
4 views 0 purchase
Course
MIS 2201
Institution
MIS 2201
MIS 2201 Exam 3 Questions with Answers All Correct
What do malicious actors try to find in dumpsters? - Answer-dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network.
What does NYPD Computer Crime squad do? - Answer-number ...
MIS 2201 Exam 3 Questions with
Answers All Correct
What do malicious actors try to find in dumpsters? - Answer-dumpster diving is a
technique used to retrieve information that could be used to carry out an attack on a
computer network.
What does NYPD Computer Crime squad do? - Answer-number of bureaus and units
taking down hackers
What is a black hat? What is a white hat? - Answer-Different from the classic black hat
hackers, white hat hackers are driven by honorable motivations or honorable agendas.
Also known as ethical hackers, white hats are talented computer security users often
employed to protect computer networks
What is the Tiger Team? What is the dilemma with this team? - Answer-A tiger team is
a diversified group of experts brought together for a single project, need, or event. They
are usually assigned to investigate, solve, build, or recommend possible solutions to
unique situations or problems. Repairers may be faced with the dilemma of
accumulating vulnerability knowledge.
What is social engineering? - Answer-the use of deception to manipulate individuals into
divulging confidential or personal information that may be used for fraudulent purposes.
Why won't companies report that they were hacked? - Answer-Rather not say, looks
bad foe business, might be afraid
What is computer forensics? - Answer-branch of digital forensic science pertaining to
evidence found in computers and digital storage media.
What is info war? What is the electronic Pearl Harbor? - Answer-Infowar strategy is
based on the assumption that it is computerized information, not manpower or mass
production, that increasingly drives the U.S. economy and that will win wars. Mass
information breach.
What happened to the US military bombers? - Answer-Information got leaked. Realized
someone was in the system in time for damage control.
What is war driving? - Answer-the act of discovering unprotected wireless network by
driving around with a laptop
, What is a computer virus? What is a computer worm? - Answer-A worm is restricted to
one system, while a virus can spread from system to system. A worm can replicate
itself, while a virus requires a host for distribution.
What is the Code Red? - Answer-- 2001
- Buffer overflow in MS's IIS web server
- Installed backdoor + trojan horse to prevent disinfection
- 250,000 systems in 9 hours
What is a cracker? - Answer-an individual who breaks into computer systems with the
intention of doing damage or committing a crime
Online Analytical Processing (OLAP) - Answer-A method of querying and reporting that
takes data from standard relational databases, calculates and summarizes the data,
and then stores the data in a special database called a data cube.
data mart - Answer-A database or databases focused on addressing the concerns of a
specific problem (e.g., increasing customer retention, improving product quality) or
business unit (e.g., marketing, engineering).
data cube - Answer-A special database used to store data in OLAP reporting.
Inventory Turnover Ratio - Answer-The ratio of a company's annual sales to its
inventory.
structured query language (SQL) - Answer-A language used to create and manipulate
databases
loyalty card - Answer-Systems that provide rewards and usage incentives, typically in
exchange for a method that provides a more detailed tracking and recording of
customer activity. In addition to enhancing data collection, loyalty cards can represent a
significant switching cost.
dashboards - Answer-A heads-up display of critical indicators that allow managers to
get a graphical glance at key performance metrics.
analytics - Answer-A term describing the extensive use of data, statistical and
quantitative analysis, explanatory and predictive models, and fact-based management
to drive decisions and actions.
data mining - Answer-The process of using computers to identify hidden patterns in, and
to build models from, large datasets.
omnichannel - Answer-Providing customers with a unified experience across customer
channels, which may include online, mobile, catalog, phone, and retail. Pricing,
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.