BUSI502 Week 4 Exam 2

Question 1 (2 points)

What was involved in the American Express BlueWork program?
Question 1 options:


1) A system that tracks the hours each employee works in a given day


2) Employees are provided with opportunities for flexible arrangements


3) Employees are provided with better office facilities so they stay in the office longer


4) Employees can work on tasks they choose, as long as they are in the office


5) Employees who are wary of newer technologies

Question 2 (2 points)

IBM has implemented a social network analysis tool that maps the _________ and the connections of IBM employees, supporting innovation by allowing employees to find others in the company with particular skills, interests or expertise.
Question 2 options:


1) knowledge


2) IS


3) friendships


4) departments


5) job descriptions

Question 3 (2 points)

The main benefit of ________________ is that users can work collaboratively to easily create and edit Web pages, and link them to useful resources.
Question 3 options:

1) a Wiki


2) Groupware


3) RSS (web feeds)


4) Social networking sites


5) a Virtual Private Network

Question 4 (2 points)

This model suggests that employee attitudes may change if they think the new system will help them to do more or better work for the same effort, and that it's easy to use.  Employee participation in the system's design and implementation also helps.
Question 4 options:

1) Information Management Model (IMM)


2) Employee Technology Model (ETM)


3) Capability Maturity Model (CMM)


4) Computer Access Model (CAM)


5) Technology Acceptance Model (TAM)

Question 5 (2 points)

Which one of the following is NOT a factor driving the use of telecommuting?
Question 5 options:

1) Geographic flexibility


2) Higher productivity


3) Higher job satisfaction


4) Lower employee turnover


5) Stronger sense of company culture

Question 6 (2 points)

The qualities found in a successful remote worker include all of the following EXCEPT:
Question 6 options:


1) Self-discipline


2) Socialized into the corporate culture


3) Self-starter


4) Ineffective communicator


5) Proficient in a wide range of technologies

Question 7 (2 points)

Diversity in virtual teams increases the communication challenges. However, virtual teams with diversity have demonstrated which of the following?
Question 7 options:

1) More creative solutions.


2) Better compliance with deadlines.


3) Equitable performance management.


4) Tighter security policies.


5) A high degree of self-reliance.

Question 8 (2 points)

Managers in today's global, virtual workforce must rethink how they break from traditional methods of managing, particularly in the all of the following ways EXCEPT:
Question 8 options:

1) Hiring new employees

2) Evaluating an employee's contribution to a team and the company

3) Creating individual-based rewards and compensation policies

4) Setting strategic objectives

5) Supervising employees

Question 9 (2 points)

IT has altered employees and the way they work by doing all of the following EXCEPT:
Question 9 options:

1) Creating new types of jobs

2) Greatly changing day-to-day tasks

3) Supporting new ways to manage talent

4) Needing more technically knowledgeable individuals

5) Providing distinct lines between work and play

Question 10 (2 points)

Team members who are _______________ and prefer to do several activities at one time may want to have IM or VOIP available to them so that they can communicate with their colleagues and still work on other tasks.
Question 10 options:

1) bichronous

2) monochronous

3) asynchronous

4) synchronous

5) polychromous

Question 11 (2 points)

Businesses today link their customers and suppliers through a single network that optimizes cost and opportunities for all. This is possible because of all of the following reasons EXCEPT:
Question 11 options:

1) Standardized communication networks (like the Internet)

2) The availability of SCM enterprise systems

3) The inability to coordinate workflow across organizational boundaries

4) The globalization of business

5) The ubiquity of IT

Question 12 (2 points)

Enterprise systems are useful for organizations seeking to do all of the following EXCEPT:
Question 12 options:

1) Encourage duplication of data

2) Centralize decision making

3) Make effective use of organizational databases

4) Unify operations

5) Standardize processes

Question 13 (2 points)

In this business structure the firm is a hierarchy organized around a set of functions.  Each group has a core competency that it concentrates upon.
Question 13 options:

1) Technology

2) Business reengineering approach

3) Functional

4) Process Control

5) Business process

Question 14 (2 points)

This type of process reengineering uses a radical improvement method for change.
Question 14 options:

1) Business Process Reengineering

2) System Development Engineering

3) Six Sigma

4) System Quality Management

5) Total Quality Management

Question 15 (2 points)

If an organization was going to make substantial changes to its customer service department, it would use this type of transformation tool.
Question 15 options:

1) Business Process Reengineering (BPR)

2) Reengineering Process Control (RPC)

3) Engineering Control System (ECS)

4) Total Process Improvement (TPI)

5) System Process Control (SPC)

Question 16 (2 points)

These are comprehensive software packages that incorporate all modules needed to run the internal operations of a business.  They should include the following modules: Manufacturing, Accounting, Human Resources and Sales.
Question 16 options:

1) SCM systems

2) Groupware system

3) ERP systems

4) CRM systems

5) PLM systems

Question 17 (2 points)

A company that wants to make incremental improvements to existing business processes would utilize which of the following?
Question 17 options:

1) Total quality management

2) Workflow management

3) Business process management

4) Business process reengineering

5) Enterprise resource planning

Question 18 (2 points)

"Reuse" is a benefit of service-oriented architecture because it supports:
Question 18 options:

1) Using sensitive data again and again

2) The breaking apart of functionality into small services that can be used by many different systems

3) Access to servers from many locations.

4) The selection of a specific computing device by each employee.

5) Reliable capacity-on-demand

Question 19 (2 points)

The Six Sigma process received its name from:
Question 19 options:

1) The intersection of six bell curves, where there are no errors

2) Six degrees of freedom in removing an error, called "sigma"

3) Six tries to change or give up

4) Six standard deviations, or less than 3.4 deects per million

5) Sigma, the computer company that invented it

Question 20 (2 points)

All of the following are good metrics a firm can use to measure the success of a business process EXCEPT for:
Question 20 options:

1) A customer's satisfaction with the quality of the product received

2) The time elapsed from when the customer placed an order to the time the product is received

3) The change in demographics of a region.

4) The number of orders the customer places in a given timeframe.

5) Revenue received from a service

Question 21 (2 points)

Google Maps is a web mapping service that provides street maps and directions.  A Google Maps component can be added to a business's web site to provide customers directions to the business location. This use of Google's service by a business is an example of __________.
Question 21 options:

1) Centralized architecture

2) Decentralized architecture

3) Service-oriented architecture

4) Internet-based architecture

5) Enterprise architecture

Question 22 (2 points)

A manager must know enough about the IT architecture and IT infrastructure so that he or she can:
Question 22 options:

1) Select the correct wireless provider.

2) Make realistic use of IT and know what to expect from IT.

3) Choose the appropriate IT infrastructure components.

4) Limit future business options.

5) Ensure a rigid IT structure.
Question 23 (2 points)

The components of enterprise architecture are: core business processes, linking and automation technology, the people who are served by the system and: ______________,
Question 23 options:

1) Enterprise software

2) A centralized architecture

3) IT systems

4) Shared data

5) A framework

Question 24 (2 points)

This provides a blueprint for translating a business strategy into a plan for IS.
Question 24 options:

1) IS infrastructure

2) IS architecture

3) ERP systems

4) Centralized architecture

5) SOA

Question 25 (2 points)
Mary from sales is asking about the plan to implement Salesforce.com's application.  You explain to her that you are in the process of getting technical specifications and pricing so that you can move forward with the rollout.  This would be part of which of the following plans?
Question 25 options:

1) IT architecture

2) IT infrastructure

3) System architecture

4) Server upgrade program

5) IT strategy

Question 26 (2 points)
A small company in Des Moines wants to set up an IT infrastructure for its workforce.  The company recently moved to an older building that has solid walls and ceilings.  Furthermore, most of the staff likes the flexibility of moving around the open office space to perform work on their laptops.  Which communication infrastructure makes most sense for this company?
Question 26 options:

1) Mainframe

2) Web-services

3) Peer-to-peer

4) Wireless

5) Server-to-server

Question 27 (2 points)
All of the following are robust platforms EXCEPT for _________.
Question 27 options:

1) iPhoneIOS 9

2) Android KitKat

3) Windows 10

4) MS Office 2016

5) Mac OSX

Question 28 (2 points)
Understanding the life span of the IT infrastructure and architecture is called:
Question 28 options:

1) IT life cycle

2) Strategic timeframe

3) Architecture life cycle

4) IT life span

5) System timeframe

Question 29 (2 points)
Risks associated with cloud computing include all of the following EXCEPT:
Question 29 options:

1) Increased dependency on third-party suppliers

2) Security

3) Lack of standards for virtual infrastructures

4) Retooling existing applications to move to the cloud

5) Scalability

Question 30 (2 points)
An example of when a software-defined architecture is most appropriate:
Question 30 options:

1) A firm can't make the decision and wants software to do it

2) Resources need to be re-allocated dynamically depending on the situation or time of day

3) Sales are expected to be very high

4) Sales are expected to be very low

5) BYOD is discouraged in a firm

Question 31 (2 points)
In the Office of Personnel Management's case, the security breach made many people vulnerable to this.
Question 31 options:

1) Loss of personal property

2) Inaccurate personal data

3) Identity theft

4) Loss of access to personal data

5) Credit card fees

Question 32 (2 points)
Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
Question 32 options:

1) Encryption

2) VPN

3) Firewall

4) Anonymizing tools

5) Filtering

Question 33 (2 points)
Who is responsible for decisions about security strategy?
Question 33 options:

1) IT people

2) Shared: IT leaders and business leaders

3) Business leaders

4) Consultants

5) Team of consultants and IT people

Question 34 (2 points)
An "evil twin" in the context of computer security is:
Question 34 options:

1) A virus-laden attachment that looks just like a sincere attachment

2) A duplicate badge that allows a nasty person entry into a data center

3) Someone who looks just like the Chief Information Officer, but steals data

4) An operating system that is not genuine

5) A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine

Question 35 (2 points)
It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts
Question 35 options:

1) Several seconds

2) Several minutes

3) Several hours

4) Several days

5) Several months

Question 36 (2 points)
All of the following are classic signs of a phishing message except:
Question 36 options:

1) Your email in-box is full and you must click on a link to increase storage

2) You just won a lottery or contest, and you need to click on a link to claim your prize

3) Poor grammar or spelling in a note that purports to be from a large company

4) Goods or services are offered at an impossibly low price

5) An emailed ad oddly does not provide any active links

Question 37 (2 points)
Spoofing is:
Question 37 options:

1) When someone makes fun of you for falling for a phishing scam

2) When the "from" address says the name/email address of a person different from who really sent it

3) When hackers snoop around in a system

4) When a person from IT unlocks your email account

5) When you receive a notice of an inheritanc

Question 38 (2 points)
Included in the five critical elements that are used to raise security in a firm are all of the following except:
Question 38 options:

1) Infrastructure

2) Law enforcement

3) Policies

4) Training

5) Investments

Question 39 (2 points)
___ of breaches are caused by stealing a password
Question 39 options:

1) A very low percentage (somewhere around 1%)

2) A low percentage (around 10%)

3) A moderate percentage (around 25%)

4) A high percentage (around 50%)

5) A very high percentage (around 80%)

Question 40 (2 points)
If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:
Question 40 options:

1) It could be dangerous because the email might not really be from Sam.

2) It could be dangerous because the email might be from Sam's computer without his or her knowledge.

3) It could be dangerous even if it was sent knowingly because Sam didn't know a virus might be attached.

4) It could be dangerous because Sam gave someone his password once a long time ago

5) None of the above (indicating that all are true).

Question 41
What access and data protection controls would you recommend Sony use to provide better security for unreleased digital films and e-mails?

Sony should implement better security policy to prevent breach. Company should redesign its network and use firewalls and other security appliances to prevent unauthorized access. Using advanced security equipment alone does not prevent breach. Sony also needs to create awareness about keeping strong password, and identifying phishing. Company should implement strong password policy, and employees must periodically change password. Sony should also ensure that password and other sensitive information are stored in encrypted form. Company should implement multi-factor authentication to ensure that only authorized personnel can access the system.
The security policy should clearly define who can access data, and what data. Accordingly, system should be designed to prohibit unauthorized access to data. Strengthening access control will help in providing better security for unreleased digital films, and other intellectual properties. I also recommend to disconnect their intellectual property from internet access until it is absolutely necessary to transmit it to theaters.