CMP FINAL A Graded Exam with Questions and
100% Correct Answers
what is the ability of an organization to tailor its products or services to the customers
specifications?
A) personalization
B) long tail
C) mass customization
D) information reach - Answer C
which of the following is an example of click-stream data metrics?
A) dates and times visited
B) number of customers with shopping carts
C) the number of page views
D) all of the above - Answer D
what are the first two lines of defense a company should take when addressing security
risks?
A) technology first, customers second
B) technology first, people second
C) innovation first, technology second
D) people first, technology second - Answer D
, what is software written with malicious intent to cause annoyance or damage?
A) elevation privilege
B) spoofing
C) sniffer
D) virus - Answer D
which of the following means the right to be left alone when you want to be, and have
control over your personal possessions and not to be observed without your consent?
A) safety
B) ethical standard
C) privacy
D) proper - Answer C
experts in technology who use their knowledge to break into computers and networks
for profit or just as a challenge are known as what?
A) elevation privileges
B) viruses
C) hackers
D) worms - Answer C
ebay is an example of an online company that has been faced with numerous security
issues. for example, imagine you purchase a digital camera on ebay. three months later,
you might receive an email asking you to log in to the system to update your credit card
information. ofcourse, this email is not actually from ebay and as soon as you log in,
your information will be stolen. what type of information security breach is this?
100% Correct Answers
what is the ability of an organization to tailor its products or services to the customers
specifications?
A) personalization
B) long tail
C) mass customization
D) information reach - Answer C
which of the following is an example of click-stream data metrics?
A) dates and times visited
B) number of customers with shopping carts
C) the number of page views
D) all of the above - Answer D
what are the first two lines of defense a company should take when addressing security
risks?
A) technology first, customers second
B) technology first, people second
C) innovation first, technology second
D) people first, technology second - Answer D
, what is software written with malicious intent to cause annoyance or damage?
A) elevation privilege
B) spoofing
C) sniffer
D) virus - Answer D
which of the following means the right to be left alone when you want to be, and have
control over your personal possessions and not to be observed without your consent?
A) safety
B) ethical standard
C) privacy
D) proper - Answer C
experts in technology who use their knowledge to break into computers and networks
for profit or just as a challenge are known as what?
A) elevation privileges
B) viruses
C) hackers
D) worms - Answer C
ebay is an example of an online company that has been faced with numerous security
issues. for example, imagine you purchase a digital camera on ebay. three months later,
you might receive an email asking you to log in to the system to update your credit card
information. ofcourse, this email is not actually from ebay and as soon as you log in,
your information will be stolen. what type of information security breach is this?