Comprehensive ITM 220 Final Exam Review:
Information Systems, Security, Data Management,
and Emerging Technologies | 100% Correct
What is an Information System?
Interrelated components working together to collect, process, store, and disseminate information.
What are the primary functions of an Information System?
Supports business operations, data analysis, communication, and coordination.
What is a Competitive Advantage in the context of Information Systems?
A condition that generates more sales and achieves superior profit margins through cost
leadership, differentiation, or focus.
What is the role of managers in achieving competitive advantage?
Identify and use information systems to gain a competitive advantage.
What are the three strategic planning focuses in Information Systems?
Cost Center/Service Provider, Business Partner/Business Peer, Game Changer.
What does Leavitt's Diamond Model propose?
Every organizational system operates within a context of people, technology infrastructure,
processes, and human structure.
What is the purpose of a Personal Information System?
Improves productivity of individual users in performing stand-alone tasks.
,What is a Workgroup Information System?
Enables people to work together effectively.
What is an Enterprise Information System?
Facilitates organization-wide business needs.
What is Shadow IT?
IS and solutions built and deployed by departments outside of the IS department.
What are the main security concerns for Information Systems?
Must secure data and protect against theft or disruption, balancing security efforts with costs and
usability.
Who are the Careless Insiders?
Employees or contractors who do not follow security policies, enabling cyberattacks.
What is a Cybercriminal?
Someone who attacks a computer system for financial gain.
What is Phishing?
Fraudulently using email to obtain personal data from recipients.
What is a Rootkit?
A set of programs that allows unauthorized access to a computer without the user's consent.
What is Smishing?
A variation of phishing that uses texting to deceive individuals.
, What is a Trojan Horse in cybersecurity?
A seemingly harmless program that contains malicious code.
What distinguishes a Worm from a Virus?
Worms can propagate without human intervention, while viruses require user action to spread.
What is Vishing?
Similar to smishing, but involves voice messages prompting victims to call a number.
What is a Blended Threat?
A sophisticated threat combining features of viruses, worms, and other malicious code.
What is an Advanced Persistent Threat?
A network attack where an intruder gains undetected access to steal data over time.
What is ransomware?
A type of malware that stops a computer's functions until a ransom is paid.
What is a distributed denial-of-service attack?
An attack that targets a computer by overwhelming it with automated requests, preventing
legitimate users from accessing it.
What constitutes a data breach?
Unauthorized individuals accessing or releasing sensitive data.
What is cyberespionage?
The deployment of malware to secretly steal high-value data.
Information Systems, Security, Data Management,
and Emerging Technologies | 100% Correct
What is an Information System?
Interrelated components working together to collect, process, store, and disseminate information.
What are the primary functions of an Information System?
Supports business operations, data analysis, communication, and coordination.
What is a Competitive Advantage in the context of Information Systems?
A condition that generates more sales and achieves superior profit margins through cost
leadership, differentiation, or focus.
What is the role of managers in achieving competitive advantage?
Identify and use information systems to gain a competitive advantage.
What are the three strategic planning focuses in Information Systems?
Cost Center/Service Provider, Business Partner/Business Peer, Game Changer.
What does Leavitt's Diamond Model propose?
Every organizational system operates within a context of people, technology infrastructure,
processes, and human structure.
What is the purpose of a Personal Information System?
Improves productivity of individual users in performing stand-alone tasks.
,What is a Workgroup Information System?
Enables people to work together effectively.
What is an Enterprise Information System?
Facilitates organization-wide business needs.
What is Shadow IT?
IS and solutions built and deployed by departments outside of the IS department.
What are the main security concerns for Information Systems?
Must secure data and protect against theft or disruption, balancing security efforts with costs and
usability.
Who are the Careless Insiders?
Employees or contractors who do not follow security policies, enabling cyberattacks.
What is a Cybercriminal?
Someone who attacks a computer system for financial gain.
What is Phishing?
Fraudulently using email to obtain personal data from recipients.
What is a Rootkit?
A set of programs that allows unauthorized access to a computer without the user's consent.
What is Smishing?
A variation of phishing that uses texting to deceive individuals.
, What is a Trojan Horse in cybersecurity?
A seemingly harmless program that contains malicious code.
What distinguishes a Worm from a Virus?
Worms can propagate without human intervention, while viruses require user action to spread.
What is Vishing?
Similar to smishing, but involves voice messages prompting victims to call a number.
What is a Blended Threat?
A sophisticated threat combining features of viruses, worms, and other malicious code.
What is an Advanced Persistent Threat?
A network attack where an intruder gains undetected access to steal data over time.
What is ransomware?
A type of malware that stops a computer's functions until a ransom is paid.
What is a distributed denial-of-service attack?
An attack that targets a computer by overwhelming it with automated requests, preventing
legitimate users from accessing it.
What constitutes a data breach?
Unauthorized individuals accessing or releasing sensitive data.
What is cyberespionage?
The deployment of malware to secretly steal high-value data.