The writer is very fast, professional and responded to the review request fast also. Thank you.
If you are looking for something else, email me at [email protected].
Question 1
An attack by a ____ hacker might not be an actual threat to an organization’s security system.
Answer
a.wizard
b.black hat
c.script kiddie
d.white hat
2 points
Question 2
The McCumber cube defines ____ characteristics of information security.
Answer
a.twelve
b.six
c.nine
d.three
2 points
Question 3
Intentional threats include ____.
Answer
a.user’s accidental deletion of data
b.power outages
c.attacks by disgruntled employees
d.floods
2 points
Question 4
____ report nonexistent viruses and may cause panic.
Answer
a.Backdoors
b.Virus hoaxes
c.Worms
d.Trojan programs
2 points
Question 5
A ____ is built-in to a system by its designer.
Answer
a.logic bomb
b.backdoor
c.virus
d.worm
2 points
Question 6
A ____ attack is a type of network-based attack.
Answer
a.denial-of-service
b.worm
c.logic bomb
d.social engineering
2 points
Question 7
A ____ attack might make use of Google Maps.
Answer
a.worm
b.social engineering
c.denial-of-service
d.logic bomb
2 points
Question 8
Which of the following is one of the most successful biometric security measure?
Answer
a.facial recognition
b.signature analysis
c.vein analysis
d.retinal scans
2 points
Question 9
A ____ is used to verify whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number.
Answer
a.callback modem
b.telephone recognition system
c.firewall
d.signature analysis
2 points
Question 10
A firewall examines ____ of data.
Answer
a.signatures
b.packets
c.bytes
d.IDs
2 points
Question 11
IDSs are placed ____ a firewall.
Answer
a.in front of
b.behind
c.instead of
d.on both sides of
2 points
Question 12
____ protects cables from electromagnetic interference (EMI), which could corrupt data or data transmissions.
Answer
a.Corner bolt covers
b.ID packets
c.Cable shielding
d.Electronic trackers
2 points
Question 13
A ____ is the least experienced type of hacker.
Answer
a.script kiddie
b.wizard
c.white hat
d.black hat
2 points
Question 14
____ are a type of access control.
Answer
a.Passwords
b.Steel encasements
c.IDS
d.Firewalls
2 points
Question 15
____ ensures data security and integrity over public networks, such as the Internet.
Answer
a.TLS
b.SE
c.ASE
d.SSL
2 points
Question 16
In ____ encryption, the same key is used to encrypt and decrypt the message.
Answer
a.nonrepudiation
b.asymmetric
c.symmetric
d.TLS
2 points
Question 17
____ attacks are more typical in large companies.
Answer
a.DoS (Denial of Service)
b.Virus hoax
c.Server malware
d.Client malware
2 points
Question 18
____ is/are a primary activity in the value chain.
Answer
a.Procurement
b.Human resource management
c.Operations
d.Organizational infrastructure
2 points
Question 19
Using the ____ model brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
Answer
a.brokerage
b.merchant
c.mixed
d.advertising
2 points
Question 20
Bizrate.com is an example of the informediary model of e-commerce.
Answer
True
False
2 points
Question 21
____ is a pure-play company.
Answer
a.Amazon.com
b.BarnesandNoble.com
c.Gap.com
d.Walmart.com
2 points
Question 22
____ is a site that facilitates C2C e-commerce.
Answer
a.eBay
b.Amazon
c.Walmart
d.Gap
2 points
Question 23
Online classified Web sites such as Craigslist.org provide an example of consumer-to-business e-commerce.
Answer
True
False
2 points
Question 24
A ____ generates revenue from the fees charged for matching buyers and sellers.
Answer
a.buyer-side marketplace
b.seller-side marketplace
c.trading partner agreement
d.third-party exchange marketplace
2 points
Question 25
____ aim(s) at increasing a Web site’s performance on search engines in a natural (and free) fashion.
Answer
a.XML (Extensible Markup Language)
b.SEO (Search Engine Optimization
c.Meta tagging
d.Micropayments
2 points
Question 26
Which of the following is not an advantage of E-commerce
Answer
a.Service availability
b.Search engine
c.Data mining
d.Increased cost
2 points
Question 27
Nordstrom is an example of what type of business?
Answer
a.Click and Brick
b.Pure Play
c.Business to Business
d.Traditional
2 points
Question 28
There are ____ major e-commerce categories.
Answer
a.six
b.nine
c.twelve
d.fifteen
2 points
Question 29
Crisis response is an example of a(n) ____ e-government application.
Answer
a.G2C
b.G2B
c.G2E
d.G2G
2 points
Question 30
____ is a popular on-line payment system used in many on-line auction sites.
Answer
a.E-wallet
b.E-cash
c.PayPal
d.Smart card
2 points
Question 31
To find a contribution amount of $300 or greater, the entry in the Amount field’s criteria should be
Answer
a.>=300.
b.>=$300.
c.>300.
d.300.
2 points
Question 32
When looking for a date during the week beginning 8/2/2015 and ending 8/8/2015, which of the following would be the correct criteria?
Answer
a.>8/2/2015<8/8/2015
b.Between 8/2/2015 and 8/8/2015
c.>8/2/2015 AND <8/8/2015
d.Between 8/1/2015 and 8/9/2015
2 points
Question 33
Which of the following would NOT be displayed for a criteria of R*d?
Answer
a.Ramrod
b.Red
c.Ready
d.Read
2 points
Question 34
Which of the following expressions would correctly add a calculated field named Discount that is 20 percent of the Price field?
Answer
a.Let Discount=[Price]*0.20
b.[Discount]:[Price *20%]
c.Discount: [Price]*0.20
d.Discount=Price*20%
2 points
Question 35
To locate records in which a field is left blank, what should be used as the criteria for that field?
Answer
a.Is NOT Null
b.=Null
c.Is Null
d.<>Nul
2 points
Question 36
Using the “keep whole group together on one page” command ensures
Answer
a.sums, counts, and averages will be taken for each numeric field
b.subtotals will be given on each page, should the data exceed one page.
c.labels, data, and totals will all be on one page as long as the data doesn’t exceed one page.
d.all data and labels will display fully on the page.
2 points
Question 37
Facts about people, events, things or ideas is _____.
Answer
a.Record
b.Objects
c.Data
d.Database
2 points
Question 38
To add on to the end of an object, such as to add records to the end of an existing table is to:
Answer
a.append
b.run
c.import
d.export
2 points
Question 39
When viewing a report in Design view, which of the following is NOT a section name?
Answer
a.Group Footer
b.Report Header
c.Page Header
d.Form Footer
2 points
Question 40
When establishing a relationship, common fields do NOT necessarily need to have
Answer
a.the same field name.
b.the same data type.
c.the same field size.
d.common data.
2 points
Question 41
A single piece of information that is stored in every record and represented by a column in a table is a _______.
Answer
a.record
b.field
c.normalization
d.navigation pane
2 points
Question 42
Information repeated in a database in a manner that indicates poor design is said to be:
Answer
a.truncated
b.normalized
c.truncated
d.relational
2 points
Question 43
To print just one record from a form, which of the following would you choose in the Print dialog box?
Answer
a.the All option
b.the Selected Record(s) option
c.the Print Range option
d.the Page Setup button
2 points
Question 44
Which is NOT true concerning forms?
Answer
a.They can be used to control access to the database.
b.They are used for data entry.
c.They can show one or multiple records at a time.
d.Every table must have at least one form.
2 points
Question 45
Which of the following is NOT true regarding a report?
Answer
a.It can be based on another report.
b.It can be based on a table.
c.It can summarize the records in an easy-to-read format.
d.It can be based on a query
2 points
Question 46
When a field is too narrow to display numeric information, the data displays as
Answer
a.dollar signs.
b.pound signs.
c.dashes.
d.truncated numbers.
2 points
Question 47
Both the Find and Replace commands can be utilized within forms.
Answer
True
False
2 points
Question 48
A crosstab query requires only a field for a row heading and a field for a column heading
Answer
True
False
2 points
Question 49
The Report and Group Headers are printed at the top of every page of the report.
Answer
True
False
2 points
Question 50
In a query design, the Totals button can also be used to group (summarize) nonnumeric data.
Answer
True
False
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more