Networking, Security, and Enterprise Systems Fundamentals

Computer Networks and Internet Technology Essentials

True/False Questions

  1. Telephone networks are fundamentally different from computer networks. TRUE
  2. Increasingly, voice, video, and data communications are all based on Internet technology. TRUE
  3. To create a computer network, you must have at least two computers. TRUE
  4. An NOS must reside on a dedicated server computer in order to manage a network. FALSE
  5. A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network. FALSE
  6. In a client/server network, a network server provides every connected client with an address so it can be found by others on the network. TRUE
  7. Central large mainframe computing has largely replaced client/server computing. FALSE
  8. Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching. FALSE
  9. Mobile search makes up approximately 10% of all Internet searches. FALSE
  10. Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. TRUE
  11. In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog. TRUE
  12. Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. TRUE
  13. Fiber-optic cable is more expensive and harder to install than wire media. TRUE
  14. The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. FALSE
  15. The Domain Name System (DNS) converts domain names to IP addresses. TRUE
  16. VoIP technology delivers voice information in digital form using packet switching. TRUE
  17. Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information. TRUE
  18. In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks. TRUE
  19. TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer. FALSE
  20. RFID technology is being gradually replaced by less costly technologies such as WSNs. FALSE

Multiple-Choice Questions

  1. The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)
    A) hub.
    B) switch.
    C) router.
    D) NIC.
  2. The Internet is based on which three key technologies?
    A) Client/server computing, circuit switching, and the World Wide Web
    B) Client/server computing, packet switching, and HTTP
    C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
    D) TCP/IP, HTTP, and the World Wide Web
  3. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called:
    A) ATM.
    B) packet switching.
    C) multiplexing.
    D) circuit switching.
  4. The telephone system is an example of a ________ network.
    A) packet-switched
    B) wireless
    C) local-area
    D) circuit-switched
  5. Which of the following is not a characteristic of packet switching?
    A) Packets are routed independently.
    B) Packets are reassembled at the destination.
    C) Packet switching requires point-to-point circuits.
    D) Communication resources are allocated only when data are being transmitted.
  6. In TCP/IP, IP is responsible for:
    A) disassembling and reassembling of packets during transmission.
    B) establishing a connection between the sending and receiving computer.
    C) breaking application data into packets.
    D) moving packets from source to destination.
  7. In a telecommunications network architecture, a protocol is:
    A) a device that handles the switching of voice and data in a local area network.
    B) a standard set of rules and procedures for control of communications in a network.
    C) a special kind of network interface card (NIC).
    D) a communications service for linking computers.
  8. What are the four layers of the TCP/IP reference model?
    A) Physical, application, Internet, and network interface
    B) Application, Internet, network interface, and physical
    C) Application, transport, Internet, and network interface
    D) Physical, transport, Internet, and application
  9. Which signal types are represented by a continuous waveform?
    A) Digital
    B) Binary
    C) Packet
    D) Analog
  10. To use the analog telephone system for sending digital data, you must also use:
    A) a modem.
    B) a DSL line.
    C) a T1 line.
    D) fiber-optic cable.

Information System Security and Cybersecurity Threats

True/False Questions

  1. Smartphones have the same security flaws as other Internet-connected devices. TRUE
  2. In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware. TRUE
  3. Viruses can be spread through e-mail. TRUE
  4. The term cracker is used to identify a hacker whose specialty is breaking open security systems. FALSE
  5. To secure mobile devices, a company will need to implement special mobile device management software. TRUE
  6. Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. TRUE
  7. Computer worms spread much more rapidly than computer viruses. TRUE
  8. One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. TRUE
  9. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. TRUE
  10. DoS attacks are used to destroy information and access restricted areas of a company’s information system. FALSE
  11. The distributed nature of cloud computing makes it somewhat easier to track unauthorized access. FALSE
  12. Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. TRUE
  13. An acceptable use policy defines the acceptable level of access to information assets for different users. FALSE
  14. Biometric authentication is the use of physical characteristics such as retinal images to provide identification. TRUE
  15. Packet filtering catches most types of network attacks. FALSE
  16. NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs. TRUE
  17. SSL is a protocol used to establish a secure connection between two computers. TRUE
  18. Public key encryption uses two keys. TRUE
  19. Over 70 percent of malware today is aimed at small businesses. FALSE
  20. Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses. FALSE

Multiple-Choice Questions

  1. ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
    A) Security
    B) Controls
    C) Benchmarking
    D) HIPAA
  2. ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
    A) Security
    B) AUP
    C) MIS
    D) Controls
  3. Large amounts of data stored in electronic form are ________ than the same data in manual form.
    A) less vulnerable to attack
    B) more difficult to destroy
    C) vulnerable to many more kinds of threats
    D) more easily controlled
  4. Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:
    A) are difficult to control.
    B) are difficult to understand.
    C) may be accessible by anyone who has access to the same network.
    D) are not easily updated.
  5. Specific security challenges that threaten the communications lines in a client/server environment include:
    A) tapping, sniffing, message alteration, radiation.
    B) errors, eavesdropping, theft, fraud.
    C) denial of service attacks, errors, theft, fraud.
    D) malware, hacking, sniffing, radiation.
  6. Specific security challenges that threaten clients in a client/server environment include:
    A) tapping, sniffing, message alteration, radiation.
    B) errors, eavesdropping, theft, fraud.
    C) denial of service attacks, errors, theft, fraud.
    D) unauthorized access, errors, spyware.
  7. Specific security challenges that threaten corporate servers in a client/server environment include:
    A) tapping, sniffing, message alteration, radiation.
    B) hacking, vandalism, denial of service attacks.
    C) errors, eavesdropping, theft, fraud.
    D) malware, hacking, sniffing, radiation.
  8. The Internet poses specific security problems because:
    A) it was designed to be easily accessible.
    B) it is a public network.
    C) it is a private network.
    D) it is a global network.
  9. Which of the following statements about Internet security is not true?
    A) The Internet is a public network.
    B) The Internet was designed to be easily accessible.
    C) VoIP is more secure than the switched voice network.
    D) Instant messaging is more secure than e-mail.
  10. An independent computer program that copies itself from one computer to another over a network is called a:
    A) worm.
    B) virus.
    C) Trojan horse.
    D) spyware.

Enterprise Systems, SCM, and CRM Key Concepts

True/False Questions

  1. Enterprise systems include analytical tools. TRUE
  2. Supply chain management systems are a type of enterprise system. FALSE
  3. An enterprise system helps reduce redundant business processes. FALSE
  4. The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers. FALSE
  5. Supply chain inefficiencies can waste as much as 25 percent of a company’s operating costs. TRUE
  6. Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain. FALSE
  7. The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain. TRUE
  8. Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product. FALSE
  9. In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes. TRUE
  10. Inefficiencies in a supply chain are primarily caused by inaccurate information. TRUE
  11. It can cost six times more to sell a product to a new customer than to an existing customer. TRUE
  12. In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. FALSE
  13. Dell Inc., which produces many personalized computers as they are ordered, is an example of a pull-based supply-chain model. TRUE
  14. Total supply chain costs in some industries approach 75 percent of the total operating budget. TRUE
  15. All CRM packages contain modules for PRM and ERM. FALSE
  16. Major CRM application software vendors include Oracle and SAP. TRUE
  17. Cross-selling markets complementary products to customers. TRUE
  18. CRM software can help organizations identify high-value customers for preferential treatments. TRUE
  19. Analytical CRM uses a customer data warehouse and tools to analyze customer data collected from the firm’s customer touch points and from other sources. TRUE
  20. Enterprise systems require fundamental changes in the way the business operates. TRUE

Multiple-Choice Questions

  1. From your reading of the chapter’s opening case, Nvidia implemented new information systems in order to achieve which of the main six business objectives?
    A) Customer and supplier intimacy
    B) Operational excellence
    C) Survival
    D) Improved decision making
  2. A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
    A) SCM systems.
    B) ERP systems.
    C) CRM systems.
    D) decision-support systems.
  3. Enterprise software is built around thousands of predefined business processes that reflect:
    A) the firm’s organization.
    B) industry goals.
    C) best practices.
    D) cutting edge workflow analyses.
  4. Which of the following is not true about enterprise systems?
    A) Enterprise systems are based on a suite of integrated software modules.
    B) Enterprise systems require fundamental changes in the way the business operates.
    C) Enterprise software is expressly built to allow companies to mimic their unique business practices.
    D) Enterprise systems include analytical tools.
  5. You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
    A) Select the functions of the system you wish to use.
    B) Map the company’s business processes to the software’s business processes.
    C) Define the data you wish to use from the system.
    D) Install the software.
  6. When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:
    A) configuration tables.
    B) data dictionaries.
    C) process maps.
    D) organizational charts.
  7. In order to achieve maximum benefit from an enterprise software package, a business:
    A) customizes the software to match all of its business processes.
    B) uses only the functions of the software that do not conflict with its business processes.
    C) changes the way it works to match the software’s business processes.
    D) implements the software only for new business processes.
  8. Supply chain complexity and scale increases when firms:
    A) work with a small number of suppliers.
    B) have a global presence.
    C) produce products and services that coordinate with hundreds or more firms and suppliers.
    D) have a single product.
  9. A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a:
    A) distribution channel.
    B) supply chain.
    C) value chain.
    D) marketing channel.
  10. Components or parts of finished products are referred to as:
    A) raw materials.
    B) finished products.
    C) subassemblies.
    D) intermediate products.