Top-Rated Free Essay

Ais Ch. 11

Powerful Essays
11.11
1. Usually targeting the accounting department, these attacks are electronic theft of very small amounts numerous times, such as rounding of fractions of a cent from interest calculations F. salami attacks
2. A form of social engineering, the attacker fishes for sensitive, private data, such as using an authentic-looking fraudulent Web site H. phishing
3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails G. social engineering
4. Social engineering attacks that involve creating a scenario and using deception for information gathering purposes D. pretexting
5. Rummaging through garbage for discarded documents or digital media I. dumpster diving
6. Attempts to obtain passwords by reading messages sent on a network E. password sniffing
7. Involves collecting, examining, and preventing evidence of cybercrime C. cyber forensics
8. Crimes connected to information assets and IT A. cybercrime
9. Laws and regulations to prevent, investigate, and prosecute cybercrimes B. cyberlaw

11.12
1. Malicious software that executes when a specified event occurs, such a logging into a bank account D. logic bombs
2. Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or bots F. spam
3. Malware disguised as a legitimate program B. Trojan horse
4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user E. bots
5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning A. viruses
6. Similar to viruses except they do not need a host application to function or reproduce C. worms

11.17
1. A small sequence of programming code inserted into a program to fix an error or add a new feature F. patch
2. Network hardware and software C. network architecture
3. Application software executing that runs a group of transactions at a later time H. batch
4. Application software execution that processes transactions at the current time G. real-time
5. Computer hardware components and computer software B. computer architecture
6. Computer programs for a specific application, such as accounting E. application software
7. A blueprint for computers, networks, and databases A. IT architecture
8. Computer programs used for managing computer hardware D. system software

11.18
1. A network that covers a large geographic region, such as several states C. wide area network (WAN)
2. A device connecting an enterprise intranet to the Internet K. gateways
3. Special purpose computers that monitor network G. routing devices
4. A software program that provides routing services to messages transmitted over the Internet N. internet protocol
5. A network that allows computers to request data and other services from other specific computers on the network Q. client/server network
6. A group of the same type of LANs connected to each other by bridges I. LAN cluster
7. A network covering a city B. metropolitan area network (MAN)
8. A software program commonly used to connect computers on a LAN M. ethernet protocol
9. A computer that serves other computers with data and applications, such as an accounting database E. server computers
10. A software program that allows the enterprise network to connect to the network of vendors through proprietary lines P. electronic data interchange (EDI)
11. Utility devices connected to a network for shared use, such as a printer F. peripherals
12. A personal computer or laptop connected to a network D. workstation computers
13. Physical media connecting computers L. network wiring (transmission media)
14. A software program that provides transportation services to messages sent over the Internet O. transport control protocol (TCP)
15. Computer connected in a relatively small area, such as your college campus A. local area network (LAN)
16. A network that allows an organization to share data with suppliers R. value-added network
17. An electronic device that connects networks of different types J. routers
18. A device that connects two LANs of the same type H. bridges

11.19
1. A provider of online applications, such as accounting applications, for a fee L. application service providers (ASP)
2. A proactive approach to enterprise security that involves developing an overall plan B. enterprise security architecture
3. A network software program that connects one computer to another computer H. point-to-point protocol (PPP)
4. An Internet protocol that allowed the creation of the World Wide Web M. hypertext transfer protocol (HTTP)
5. An enterprise-wide network D. intranet
6. A software program permitting an employee to use the enterprise network through a secure channel J. point-to-point tunneling protocol (PPTP)
7. A point on the network that offers access to the network, such as an accountant’s computer D. intranet
8. A provider of access to the Internet for a fee K. internet service provider (ISP)
9. Online sales transactions O. e-commerce
10. A network that provides a secure channel to access the enterprise network
11. Electrical transmission of data through analog or digital networks C. telecommunications
12. A wide network used by external customers and suppliers E. extranet
13. Accessing a computer from a remote location G. remote access
14. Tossing in security patches, hoping to cover vulnerabilities A. stovepipe
15. Located on a proxy server and used to intercept an inspect all incoming messages prior to delivering them to the intended recipient P. proxy firewall
16. A Web site address N. uniform resource locator (URL)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ch. 11

    • 347 Words
    • 2 Pages

    Ch.11 2. What are the implications for motivation of Hofstede’s research findings on the dimensions of power distance, uncertainty avoidance, individualism, and musclinary? Answer: Implicit in motivating an employee is an understanding of which of the employees needs are satisfied by work. Studies on the meaning of work indicate considerable cross cultural distance. A reexamination of motivation relative to Holstede’s dimensions of power distance, uncertainty avoidance individualism, and muscling…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ch 11

    • 3317 Words
    • 14 Pages

    Name: ________________________ Class: ___________________ Date: __________ ID: A CH 11 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ ____ ____ 1. Timmy makes $100 per week as a taxidermist. He spends all this income to buy pizza and hair gel. The price of a pizza is $10 and the price of a bottle of hair gel is $4. If Timmy buys 5 bottles of hair gel, then he buys ____ pizzas. a. 10 b. 4 c. 8 d. 20 e. None of the above answers is correct.…

    • 3317 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Ch. 11 Marketing

    • 515 Words
    • 3 Pages

    Ch. 11 – Pricing Strategies * New-Product Pricing Strategies * Product Mix Pricing Strategies * Price Adjustment Strategies * Price Changes * Public Policy and Marketing New- Product Pricing Strategies Market-skimming pricing: Setting a high price for a new product to skim maximum revenues layer by layer from the segments willing to pay the high price; the company makes fewer but more profitable sales. * Product quality and image must support the price * Buyers…

    • 515 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ch 11 Responses

    • 2452 Words
    • 9 Pages

    APWH Ch 11 Responses Margin Review Questions 1. In what ways did the early history of Islam reflect its Arabian origins? • Islam drew on an older Arab identification of Allah with Yahweh, the Jewish High God, and Arab self-identification as children of Abraham. • The Quran denounced the prevailing social practices of an increasingly prosperous Mecca and sought a return to the older values of Arab tribal life. • The message of the Quran also rejected the Arab tribal and clan structure, which…

    • 2452 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Ch 11 Quiz

    • 691 Words
    • 3 Pages

    underestimated the future profitability of the information technology industry. C) Consumer spending on information technology rose dramatically between 2000 and 2002. D) None of these can explain the reduction in Cisco's profits. 5. Figure 11-4 Refer to Figure 11-4. Potential GDP equals $100 billion. The economy is currently producing GDP1 which is equal to $90 billion. If the MPC is .8, then how much must autonomous spending change for the economy to move to potential GDP? A) -$2 billion B) $2…

    • 691 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Ch 11 Solutions

    • 7520 Words
    • 31 Pages

    11 Service Department and Joint Cost Allocation Solutions to Review Questions 1. Companies allocate costs to estimate or assess the costs of their activities (products, processes, etc.). It is an estimate and subject to the problem that cost allocation contains an arbitrary element. Not allocating costs, however, is also an estimate—an estimate of zero. This may be appropriate for some decisions, but not for others. Some of the disadvantages (costs) include: (1) Additional…

    • 7520 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    HW Ch 11

    • 486 Words
    • 2 Pages

    Directions: Type your responses. Complete sentences are not necessary. Questions are based directly on information contained in the chapter. You may quote directly from the book, unless directed otherwise. 1. The third step in the research process is designing the study . The third and final task in this process is exploring casual relationships . 2. Read the section An Apparent Success that Ended in Failure (Dudley, 2011, p. 186). What are your initial thoughts? He went about the…

    • 486 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CH 11 Summary

    • 2479 Words
    • 10 Pages

    11.1 Brain Development and Physical Growth The Brain · There are two major brain growth spurts that occur during the teenage years. · The first spurt occurs between 13 and 15 years of age. This spurt, for the most part, takes place in the parts of the brain that control spatial perception and motor functions, as well as executive processing. This makes mid-teens and adolescents abilities in these areas far exceed those of school age children. · This first spurt enables teens to think abstractly…

    • 2479 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Chapter 11 The criteria used by Fortune to rank the top global companies were revenues. These companies were not ranked by profit. In fact, Fannie Mae, ranked internationally as Global 500’s 26th company should a profit loss. The US holds 7 positions of the top 25 companies while China only holds 3 positions and Japan only 2 positions. I was surprised by this because media causes us to believe that China and Japan are taking over US industry and profits. Not surprisingly, 14 of the top 25…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    APUSH CH 11 Vocab

    • 474 Words
    • 2 Pages

    APUSH Ch 11 Vocab Cotton Slavery and the Old South King Cotton = cotton exports would make the South economically prosperous and make New England dependent on them to support the Northern textile industry Deep South = lower South nicknamed the “Cotton Kingdom” for its recently settled areas that were dominated by cotton production De Bow’s Review = journal containing everything from agricultural reports, statistical data, and economic analysis to literature, political opinion, and commentary. The…

    • 474 Words
    • 2 Pages
    Satisfactory Essays