QUESTION 1
Which of the following were actions the textbook listed as guides to manage IT security.
Work with users to make everyone more secure.
Avoid the risks.
Get mid-level management buy-in.
Evaluate your environment’s needs, exposures, and defenses.
8 points
QUESTION 2
Which of the following are categories you would be likely to see at a mid-year budget review?
Actual amount spent year to date
Actual amount spent for the month
Variance against budget (an over/under amount indicating how well you are doing compared to the expected amount based on your original budget)
Variance against last year (an over/under amount indicating if you are spending more or less for the same items as last year)
8 points
QUESTION 3
You should always try to get your server and storage environment on a single diagram.
True
False
6 points
QUESTION 4
What are the two things a control mechanism provide?
Audit trail and evidence
Appropriate checks and balances
Best effort and assurance
Policy and procedure
6 points
QUESTION 5
The goal of your audit should be to clearly determine the __________ you are facing.
regulations
level of risk
degree of compliance
level of work
6 points
QUESTION 6
__________ is a solution that allows users to authenticate once to the network and then have access to all applications and resources for which he has been granted permission, without having to enter additional IDs and passwords.
Single Sign-On
Two-Factor Authentication
Challenge-Response
Account Provision
6 points
QUESTION 7
Where were some locations the textbook suggested as potentially good places for physical copies of infrastructure documentation to be located?
Computer Room
Break room
Cubical Walls of the help desk personnel
Your home
6 points
QUESTION 8
How many process areas does CMMI have?
5
6
25
21
6 points
QUESTION 9
What two things need to happen for a policy to help ensure that all employees (both IT and users) are aware of it and that it can be applied consistently?
It must be approved by both the auditors and compliance groups
The business unit and individual owners must be listed
It should be documented and posted
It should be tied to a regulation and indexed
6 points
QUESTION 10
What can be used to “trap” data to and from a particular device or can be used to look for particular content.
A Packet Sniffer
Network Access Controls
A Packet Internet Groper
An IPS Appliance
6 points
QUESTION 11
A(n) __________ is generally used to gather preliminary information about a vendor in order to see if they meet some basic requirements.
RFP
POC
RISC
RFI
6 points
QUESTION 12
Which of the following are issues that IT should care about and standardize on?
Operating systems
Monitor size
Software configuration
Hardware configurations
8 points
QUESTION 13
The textbook referred to a 2011 Ponemon Institute survey. That survey indicated __________ was the most common cause of a security breach.
Negligence
Insider attack
Malicious attack
Criminal attack
6 points
QUESTION 14
In hard times, what are the things you should bring to management to show your leadership?
Be proactive
Adjust your priorities properly
Be willing to react quickly to decisions
Come to the table with ideas
6 points
QUESTION 15
What are the kinds of things a good inventory can help you discover?
Non-functional Resources
New departments
Overutilized Resources
Outdated Technology
8 points
QUESTION 16
One comforting thought with Information Security is that whether you are a virtual company or if you have a traditional office setting, your security priorities and concerns are the same.
True
False
6 points
QUESTION 17
__________ is a technique for gathering confidential or privileged information by simply asking for it.
Phishing
Malware
Hacking
Social engineering
6 points
QUESTION 18
Which of the following are benefits of standardizing your technology?
Eases support burden
Requires fewer kinds of spares
Locks you into a smaller set of vendors
Makes it harder to detect shadow IT
8 points
QUESTION 19
Which of the following is not part of the IT Infrastructure Library?
Control activities
The business perspective
Planning to implement service management
Strategic alignment
8 points
QUESTION 20
Which of the following was not identified as common type of contact you would likely have with a vendor?
Billing
Technical Support
Sales
Development
6 points
QUESTION 21
__________ is usually defined as any data that can be used (either alone or with other data and sources) to identify a person.
Personal Health Information
Protected Health Information
Personally Identifiable Information
Personal Identity Information
6 points
QUESTION 22
What is the commonly used name for the Public Company Accounting Reform and Investor Protection Act of 2002?
Gramm-Leach-Bliley
SEC’s Rule 17a-4
Sarbanes-Oxley
Basel II
6 points
QUESTION 23
Which of the following is not one of the common points for deciding to refresh technology?
The technology is no longer meeting your needs
The technology is holding up other IT projects
The technology presents risks to the environment
Vendor support is available, and not cost prohibitive
6 points
QUESTION 24
In general with leasing situations, you make arrangements to purchase a piece of hardware, but the leasing company makes the actual purchase.
True
False
5 points
QUESTION 25
This is the practice of trying to get information from people by lying to them over the computer.
Fraud
Smishing
Phishing
Social engineering
6 points
QUESTION 26
Match the terms to their descriptions.
– A. B. C. D.
Spyware
– A. B. C. D.
Trojan horses
– A. B. C. D.
Rootkits
– A. B. C. D.
Worms
A.
A set of modifications to the operating system that is designed primarily to hide malicious activity.
B.
Programs that appear to be legitimate, but in fact are malicious.
C.
Self-contained programs that replicate themselves usually via the network or e-mail attachments.
D.
Software that monitors a user’s activity, often to collect account numbers, passwords, etc.
6 points
QUESTION 27
Information regarding your company’s mobile equipment should include which of the following:
Storage Capacity
Model
Carrier
Operating System
6 points
QUESTION 28
According to Financial Accounting Standards Board (FASB) Statement 13, a lease is considered a capital lease if it meets any one of the following criteria, except:
The lease term is equal to or greater than 75 percent of the estimated life of the leased property (e.g., the lease term is six years and the estimated life is eight years).
The lease transfers ownership of the property to the lessee by the end of the lease term.The lease contains an option to purchase the leased property at a bargain price.
The lease contains an option to purchase the leased property at a bargain price.
The present value of rental and other minimum lease payments equals or exceeds 90 percent of the fair value of the leased property regardless of any investment tax credit retained by the lessor.
6 points
QUESTION 29
Outsourcing includes all but which of the following?
The primary company can provide the service
The secondary company chooses not to provide the service
The primary company chooses not to provide the service
The secondary company can provide services in question
6 points
QUESTION 30
During the difficult times, you should be looking all but which of these areas:
Demonstrating leadership
Managing costsLooking for opportunities to leverage IT for increased business value
Improving weak SLAs
Demonstrating leadership
6 points
QUESTION 31
Which of the following is not one of the common weaknesses found after a security assessment?
Misconfigured Devices
Weak Passwords
Weak Internal Controls on People
Outside “Fingerprints”
6 points
QUESTION 32
Which of the following is not usually found in a Wide Area Network schematic?
DMZs
site locations
location of switches
firewalls
6 points
QUESTION 33
Which organization is closely identified with the Control Objectives for Information and Related Technology framework?
(ISC)2
NIST
ISO
ISACA
6 points
QUESTION 34
This method of risk analysis generates an analysis of the risks facing an organization and is based on experience, judgment, and intuition.
Qualitative
Subjective
Quantitative
Rational
6 points
QUESTION 35
The benefit of __________ individual departments is that those departments become more cost conscious of their IT uses and requirements.
underestimating budgets by
budgeting everything at
charging expenses back to
overestimating budgets by
6 points
QUESTION 36
The textbook suggests that IT department provide whatever the user asks for regarding ergonomic devices and ant-glare screens.
True
False
5 points
QUESTION 37
One of the contractual I stressed in the lecture that can cause a contract to be rejected by the legal team, even though the product is exactly what you need to purchase was the:
Absence of an automatic renewal provision
The SLA is too generic
Choice of Law Provision
Limited Indemnity Clause
6 points
QUESTION 38
The textbook mentioned that _____ of people never change their banking password.
41%
32%
14%
23%
6 points
QUESTION 39
Proof that you can provide to anyone who might ask (e.g., lawyers, regulators, auditors) that you are actually operating by the established policies is often considered __________.
A hidden benefit of maintaining evidence
A hidden benefit of educating your employees
A hidden benefit of operational excellence
A hidden benefit of control mechanisms
6 points
QUESTION 40
If your project needs a new piece of hardware for a project that costs $10,000 and has a 5 year depreciation span, the amount of the expense in the year following the purchase is _____.
$2,000
$0
$2,500
$1,500
Social media and technology play a significant role in everybody’s lives. It has revolutionised the world we live in, in many ways. One being the fashion industry. This has been impacted by the rise of bloggers and social media influencers who have made social media a career and marketing strategy. One major platform is Instagram. This has helped brands and bloggers promote products and lifestyles that will appeal to a wide audience and entice customers which not only benefits the brand but also the “business” of the blogger. Social media has had a direct impact on digital labour and consumer culture as it has provided a platform to see what is desired by an audience and what there are gaps in the market for. There has also been a development in body image and how bodies that differentiate from the norm is not scrutinized anymore but is accepted and praised. For women, the stick thin barbie doll body type is not the trend anymore and curvy bodies are more realistic and common in contemporary western society. Social media has provided a feel-good service for society as people feel more accepted and confident for who they are. I will be looking into how much of an impact social media has really had on many different aspects of the fashion industry including body image, marketing, acceptance within society and the rise of bloggers and influencers. I decided to investigate a high-street brand and a high-street, online retailer to see if how they utilised social media differed. The high-end brand I chose was Burberry as they are heavily advertised by celebrities throughout their campaigns. I then chose to research Pretty Little Thing as my high-street brand as they use social media influencers and bloggers to promote their products a lot in their brand. I chose both brands because although their products and consumers may be very different, they still have similarities in the way they work.
The purpose of this study is to explore the impact that social media is having on the fashion industry. The reason for my interest in this topic is that I have grown up with the development of social media and have always been very interested in fashion, therefore I wanted to see how the two impacted each other. I will look into any evidence I find to see if there have been many direct effects on the fashion industry. In terms of the range of material that I managed to find, there is several articles and scholarly sources that have looked in to the changes that social media has had on the fashion industry. T