Multiple Choice
1. IT applications can be developed in which of the following ways?
a) build the system in-house
b) buy an application and install it
c) lease software from an application service provider
d) outsource it
e) all of the above
Ans: e
Response: See page 302
2. The information systems planning process proceeds in which order?
a) organization mission – organization strategic plan – IS strategic plan – new IT architecture
b) organization mission – IS strategic plan – organization strategic plan – IS operational plan
c) organization strategic plan – organization mission – IS strategic plan – new IT architecture
d) IT architecture – IS strategic plan – organization strategic plan – organization mission …show more content…
Which of the following is not an intentional threat to information systems?
a) environmental hazards
b) theft of data
c) deliberate manipulation in processing data
d) destruction from viruses and denial of service attacks
e) none of the above
Ans: a
Response: See page 69-70
19. Rank the following in terms of dollar value of the crime, from highest to lowest.
a) robbery – white collar crime – cybercrime
b) white collar crime – extortion – robbery
c) cybercrime – white collar crime – robbery
d) cybercrime – robbery – white collar crime
e) white collar crime – burglary – robbery
Ans: c
Response: See page 70
20. An employee used his computer to steal 10,000 credit card numbers from a credit card company. He is a_____:
a) hacker
b) cracker
c) jacker
d) trespasser
e) none of the above
Ans: b
Response: See page 70
21. _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
a) cracking
b) hacking
c) spoofing
d) social engineering
e) spamming
Ans: d
Response: See page 70
22. The fastest growing white collar crime is _____ :
a) extortion
b) identity