Questions and Answers
What are the three main causes of bullwhip effect? Correct Ans-1. Lack of information
2. Supply Chain Structure
3. Lack of collaboration
What is the Sales Process? Correct Ans-1. Prospects
2. Initiate Contact
3. Identify Needs
4. Present Offer
5. Manage Objections
6. Close a Sale
How a startup typically works Correct Ans-Idea - Build - Brand - Customer
Which of the following is true of group dynamics in virtual teams? Correct Ans-Norms
regarding the sharing of workload are difficult to enforce online
Microsoft's Sharepoint includes features for ________, which ensures that older copies of
documents are maintained and no changes are lost. Correct Ans-Version Control
What is true of group decision support systems? Correct Ans-They allow users to express
independent viewpoints that may differ from those of others in a group
What advantage does instant messaging have over phone and conference calls? Correct Ans-
It is more informal and saves time by reducing social courtesies during interactions.
,________ integrates multiple applications and interactive channels into a single interface,
accessible from many different devices. Correct Ans-Unified Communications
Sarah Jones is a communications assistant at Sustainable Living Inc., a nonprofit organization in
Las Vegas. Which of the following can give her quick access to emails, video calling, and
corporate RSS feeds that help her be in constant touch with the campaigners for the
organization? Correct Ans-Universal dashboard
Which of the following is a file format used to exchange contact management data
electronically? Correct Ans-vCard
Which of the following is true for IM and e-mail? Correct Ans-Email providers allow more
interoperability than IM providers.
The ______ is used by organizational staff to categorize threats, determine the cause, preserve
evidence, and get the systems back online Correct Ans-Incidence Response Plan
Which of the following is a reason why humans are soft targets for social engineering?
A. Need for anonymity
B. Need for privacy
C. Respect for Authority
D. Desire to be disconnected from others Correct Ans-C. Respect for Authority
____ is a powerful driver for surveillance as employers are held responsible for employees'
offensive emails or web-surfing habits Correct Ans-Liability
________ consists of intangible assets which are expressions of the human mind that give the
creator of the property the right to its commercial value. Correct Ans-Intellectual Property
, Which of the following is a reason why employers adopt surveillance technologies to track
online communications? Correct Ans-To increase employee productivity
________ help(s) in determining the cause of a security threat in an incidence response plan.
Correct Ans-Investigating System Logs
What is the step involved in risk management after vulnerabilities of an organization have been
examined? Correct Ans-Evaluation of controls that fill in security gaps
Which of the following administrative control actions helps enforce approved authorizations for
access to systems in an organization? Correct Ans-The organization defines the information
to be encrypted or stored offline in a secure location
Which of the following is a provision of the State Security Breach Notification Laws? Correct
Ans-They require organizations to inform state residents if sensitive data are released.
Which of the following is an accurate definition of scareware? Correct Ans-It is a kind of
social engineering used to persuade people that a computer is infected when it is not
A ________ is an intermediary server that receives and analyzes requests from clients and then
directs them to their destinations. Correct Ans-Proxy
The term ________ refers to software that monitors a user's activity on a computer and on the
Internet, often installed without the user's knowledge. Correct Ans-Spyware
Halcyon, an e-publisher, has recently decided to use an information system that administers the
way its customers access its online publications. The system assigns each customer with a
unique ID, maintains records of the books purchased by them, encrypts electronic documents
for transmission, and includes options to order hard copies of the electronic documents they
read online. What set of technology is used in this case? Correct Ans-Digital Rights
Management (DRM)