Vous êtes sur la page 1sur 5

Started on Friday, February 15, 2019, 10:51 PM

State Finished
Completed on Friday, February 15, 2019, 10:56 PM
Time taken 5 mins 4 secs
Points 10.00/10.00
Grade 40.00 out of 40.00 (100%)
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

The Payment Card Industry Data Security Standard (PCI DSS) created by Visa, MasterCard,
American Express, and Discover is a __________.
Select one:
a. Set of standards required by U.S. and international law for protecting credit card transaction
data.
b. Set of industry standards required for all online merchants that store, process, or transmit
cardholder data.
c. Set of voluntary security guidelines for retailers who accept Visa, MasterCard, American
Express, and Discover credit cards.
d. Set of regulations (that vary from state to state, and country to country) that apply to credit
card companies.

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

Which of the following is not a superior feature or benefit of semantic search engines?
Select one:
a. keyword matching
b. reference suggestions
c. similarity search
d. related search

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

Experts believe the three greatest cybersecurity dangers over the next few years will involve all
of the following except __________.
Select one:
a. persistent threats
b. POS attacks
c. mobile computing
d. the use of social media

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

An audit is an important part of any control system. Which of the following is not a question that
would typically be asked as part of an information systems audit?
Select one:
a. Are there sufficient controls in the system? Which areas are not covered by controls?
b. Are the controls effective and implemented properly?
c. What is the ROI associated with system controls?
d. Are there procedures to ensure reporting and corrective actions in case of violations of
controls?

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text
PPC advertisers use each the following metrics to gauge the effectiveness of their campaigns
except ________:
Select one:
a. Click through rates
b. Cost of customer acquisition
c. Keywords that lead to sites
d. Return on advertising spend

Question 6
Correct
1.00 points out of 1.00

Remove flag

Question text

When it comes to fraud committed by an organization’s employees, the single most effective
fraud prevention technique is _______.
Select one:
a. Holding managers responsible for the actions of their employees
b. Peer monitoring (employees monitor each other)
c. Creating the perception that fraud will be detected and punished
d. A clearly written employee policy manual that explains unacceptable behaviors

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

Which is not a situation that limits the ability of recommendation engines?


Select one:
a. Sparsity of information
b. Limited feature content
c. Under specialization
d. New user

Question 8
Correct
1.00 points out of 1.00
Flag question

Question text

________ can be categorized as popularity, relevancy, and user satisfaction.


Select one:
a. Mobile search SEO
b. Ranking factors
c. SERP
d. Web analytics

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

Facebook, YouTube, Twitter, LinkedIn, and other social networks are making IT security dangers
worse. Why?
Select one:
a. Users invite in and build relationships with others. Cybercriminals hack into these trusted
relationships using stolen log-in credentials.
b. E-mail viruses and malware have been increasing for years even though e-mail security has
improved.
c. Communication has shifted from social networks to smartphones.
d. Web filtering, user education, and strict policies cannot help prevent IT security dangers on
Facebook and other social networks.

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text
Research has shown that knowledge workers spend about ________ of their time on
nonproductive work—, unsuccessful searches, converting data to different formats, or recreating
information.
Select one:
a. 10%
b. 25%
c. 33%
d. 50%

Vous aimerez peut-être aussi