Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q20. Companies implement __________ systems to retain and archive their business

ID: 3890969 • Letter: Q

Question

Q20. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
   a. electronic records management
   b. database management
   c. archive management
   d. infrastructure management

Q21. What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.
   a. packet-switched IP system
   b. circuit-switched subsystem
   c. WiMAX standard
   d. GSM-based LTE subsystem

Q22. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
   a. content indexing
   b. usernames and passwords
   c. biometrics
   d. encryption

Q23. __________ is a general term that means fast transmission speed.
   a. Bandwidth
   b. Protocol
   c. TCP/IP
   d. Broadband

Q24. __________ transmits voice and data in packets and has become one of the most cost effective ways to communicate.
   a. TCP
   b. UDP
   c. VoIP
   d. UM

Q25. Which of the following is a dysfunction of the group process?
   a. Social pressures of conformity can lead to groupthink.
   b. A group may produce synergy during problem solving.
   c. Group members may have their egos embedded in the decision, and so they may be committed to the solution.
   d. Groups are better than individuals at understanding problems.

Q26. __________ are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
   a. MANs
   b. Hot spots
   c. LANs
   d. WANs

Q27. What is the most cost-effective approach to managing fraud?
   a. prevention
   b. detection
   c. prosecution
   d. compliance

Q28. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
   a. Wireless packet analyzers
   b. Password crackers
   c. Firewall sniffers
   d. Intrusion detectors

Q29. A(n) __________ is the probability of a threat exploiting a vulnerability.
   a. threat
   b. risk
   c. vulnerability
   d. exploit

Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?
   a. personal and non-personal
   b. felonies and misdemeanors
   c. insider and outsider
   d. violent and nonviolent

Explanation / Answer

Q20. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
   a. electronic records management

Q22. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.

   d. encryption

Q23. Broadband is a general term that means fast transmission speed.

Q24. VOIP transmits voice and data in packets and has become one of the most cost effective ways to communicate.

q26 . LAN are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
Q27. What is the most cost-effective approach to managing fraud?

   d. compliance


Q28. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
   b. Password crackers

Q29. A(n) Risk is the probability of a threat exploiting a vulnerability.

Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?

   d. violent and nonviolent