Funding an IS project through a Chargeback method involves:
- Pricing the IS service out for the customer buying the end
product
- Direct billing by the firm for IS resources or services to the
department that uses them
- Direct billing by the manager of a function for IS resources or
services to an employee that uses them
- An accounting process that reduces tax liability for capital
investments
All of the following are attributes of considering IS costs as
Overhead except the following:
- Budgeting only happens once a year
- More flexibility for functional managers
- Less individual employee awareness of IS costs
- More Board awareness of IS use
A Business Case is a formal document prepared and presented by
functional managers to propose an IS initiative based on all of the
following except:
- Internal Rate of Return
- Return on Investment
- Net Present Value of investment
- A technical or operational implementation process
All of the following are factors in assessing an individual
project’s risk to the firm except:
- Project size and complexity
- Team experience with the specific technology
- Degrees of organizational change required
- All of the above
All of the following are potential upsides for outsourcing
except:
- Reducing costs
- Acquiring talent or institutional knowledge
- Creating proprietary technology
- Improving strategic focus
The ModMeter case study was an example of Portfolio Management
which must balance the following firm considerations:
- Customer Willingness to Pay, Supplier Willingness to Pay,
Customer Life Cycle
- Competitive Position, Firm Maturity, Growth Potential, Market
Threats
- Strategic, Informational, Transaction, and Infrastructure
priorities
- Product lines, Product Life Cycles, New Product Development,
Potential mergers
The following are all examples of a firm choosing a Custom
Development strategy except:
- Hiring full-time developers to build a new feature
- Redesigning an existing product and pivoting to a new
market
- Hiring a development firm to streamline new financial reporting
processes
- Filing a patent for a new process your financial team
developed
These are the critical components in a Systems Development Life
Cycle:
-
- Business Case, Budget Approval, IS Planning
- Definition, Build, Implementation
- RFP, Vetting, Purchasing
- Hiring, Training, Deploying
Select 3 answers that describe Agile Development:
- Individuals and interactions over process and tools
- Working software over comprehensive documentation
- Customer Collaboration over contract negotiation
- Cost assessment over feature requirement
In the SuccessMaker case study, the team switched from Waterfall
to Agile Development methods for all the following reasons
except:
- They wanted a shorter cycle for developing new features
- They wanted their product managers to own the product instead
of developers
- They wanted to offshore all of their software development
- They wanted a better understanding of user stories and
experiences
All are an attribute of Open Source software except:
- Distributed peer-review based
- Technology neutral
- Available to change source code
- Always free
- All are attributes
A Scrum Master is:
-
- Another name for CTO
- The lead developer of an outsourced firm development team
- The person in charge of a sprint using Agile Development
- The project manager of a Waterfall Development project
The four key components of an Internet-enabled device are:
- Wifi connection, hardwire connection, dial-up connection
- Atomicity, Consistency, Isolation, Durability
- Monitoring, Control, Optimization, Autonomy
- User Interface, Process Logic, Data storage
The key components of a Digital Data Stream are:
- The type of technologies used to create a channel
- The type of content created
- The source of the content
- The legal status of the content
- All of the above
The following are all examples of process-to-actuate for a
Digital Data Stream except:
- Sending a weather advisory over text message
- A hotel booking on TRIMBAM
- Predicting next quarter inventory needs at CVS
- An alert from Amazon Ring
The following is the difference between supervised and
unsupervised machine learning:
- One has human oversight, the other does not
- One is based on software, while the other is based on
hardware
- One relies on comparing activity to a defined gold standard,
the other does not rely on a fixed gold standard
- One features action based on process-to-actuate DDS, the other
based on assimilate-to-analyze
Blockchain is a system that monitors transactions by all of the
following components except:
- Distributed ownership
- Built-in validation
- Anonymity of users
- Transparency
“Mixed reality” describes the following scenario:
- A virtual experience provided through digital technology
devices
- Any real world experience that relies on a smart device
- An experience that incorporates AR technology in a real world
setting
- Any virtual experience that relies on reimagining the real
world
Amazon Ring is an example of all of the following concepts
except:
- It is a smart device
- It relies on high powered cloud computing
- It employs machine learning to improve efficiency
- It is an example of a network effect
- All of the above
Risk reduction when planning for a cybersecurity threat
means:
- The strategy of not investing in countermeasures and not
reducing risk
- The strategy of actively investing in countermeasures and
safeguards against risk
- The strategy of passing some or all of the risks to a third
party
- The strategy of establishing clear IT processes and
responsibilities as part of an IS strategy planning process
These are all examples of a potential internal cybersecurity
threat except:
- An ex-employee still having password access to data
- An executive losing his briefcase with security codes in
it
- A firm’s old server being attacked by a hacker
- A worker taking sensitive data on a laptop off premise for a
conference
You work in cybersecurity and follow NIST Cybersecurity
Framework, if your function focus is Protection, what are your
responsibilities:
- Manage IT Assets and risk governance, monitor business
environment
- Control access to the IT assets and control security
training
- Monitor system performance for any anomalies
- Respond to detected threats, plan response and mitigation
- Retrieve compromised data or systems
Pick an example of “function creep”:
- Amazon promoting books by authors you have previously
purchased
- Netflix tailoring your homepage for new movies you might
like
- CVS emailing you about Flu Shots during the winter
- Uber selling your ride information to Zillow
- Facebook showing ads of a local politician’s campaign in your
neighborhood
Which weakness did hackers exploit in the Target data breach
case study?
- Technology failures within performance of IT systems
- Process failures in monitoring usage of systems
- Human failures in communication and risk training
- Structure failures in reporting between functions in firm
- All of the above
Is absolute privacy possible when
relying on Information Technology Systems?
- Yes, but the IT just hasn’t been perfected yet
- Yes, but the human element of a firm or user will always be a
risk
- No, an IT system can never guarantee a user or firm absolute
privacy
- No, but an IT system shouldn’t be focused on privacy to begin
with