Friday, November 29, 2019
Behavior of Chinese Tourists free essay sample
Over the past decade China has been, and still is, by far the fastest-growing tourism source market in the world and the Chinese market is one of the tourism sectorââ¬â¢s major growth opportunities. An essential first step to ensure destinations and companies develop and distribute products that fully meet the Chinese market is to comprehend the behaviour and mind-set of Chinese outbound travellers. Due to rapid development, rising disposable incomes and relaxation of restrictions on foreign travel, the volume of international trips by Chinese travellers has grown from 10 million in 2000 to 83 million in 2012 (Cripps, 2013). Expenditure by Chinese tourists abroad has also increased almost eightfold since 2000. Boosted by an appreciating Chinese currency, Chinese travellers spent a record US$ 102 billion in international tourism in 2012, a 40% jump from 2011 when it amounted to US$ 73 billion (UNWTO, 2013). With sustained growth, China has become the largest spender in international tourism globally in 2012. In 2005 China ranked seventh in international tourism expenditure, and has since successively overtaken Italy, Japan, France and the United Kingdom. We will write a custom essay sample on Behavior of Chinese Tourists or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page With the 2012 surge, China leaped to first place, surpassing both top spender Germany and second largest spender United States). According to UNTWO by 2015, over 100 million Chinese will travel aboard, a bench that was originally forecasted for 2020. Businesses and tourism destination have to not only accommodate for the ever growing number of Chinese tourist, but accommodate them in a way that makes the Chinese guests feel welcome and comfortable. Chinese tourists perceive that westerners see them as class people, even when they spend a lot of money. Business and destination now more than ever before need to accommodate Chinese tourists. Making improvements in areas like service and better understanding Chinese expectations will help us accelerate this growth. This remarkable growth,à largely due to the rise of a Chinese middle class with disposable income,à has required the travel industry, from hotels to restaurants to shopping centers, to adapt to this inflowing of Chinese tourists. â⬠The hotel industry has perhaps been the most observant. Marriott has stationed 20 sales representatives in China and teaches employees in the U. S. to speak basic Mandarin phrases like hello and thank you. The Marriott Marquis in New York City has even replaced room numbers on the 44thà floor with names because the number four is considered bad luck in many Asian culturesâ⬠(Sanburn, 2013). A common complaint found amongst Chinese tourists is the concern of the lack of hot drinking water and Chinese tea. Because Chinese hotels traditionally provide a large set of ââ¬Å"standard amenitiesâ⬠(e. . , toothpaste and toothbrushes, combs, shampoo and lotion, slippers, shoe mitts, even disposable razors and shaving cream), Chinese tourists, particularly those first-time overseas travellers, generally expect foreign hotels to do the same thing. This expectation, if unfulfilled, could create a bit frustration as some Chinese tourists do not pack such items when traveling, and they might not be able to communicate with the hotel reques ting these items due to language barrier (Xiang, Chengting, Rich, Sheryl, amp; Liangyan, 2011). One way hotels can better serve Chinese tourists is equip rooms with tea kettles, slippers, translated restaurant menus and welcome brochures, on-site translation services and comfort food such as congee (rice porridge) and noodles to make their stay more welcoming. China is the second biggest source of visitors for New Zealand and accounted for 8 percent of visitors in November 2012. The Chinese overtook UK tourists for the first time that month, but are still far fewer than the 45 percent of visitors that came from Australia. New Zealand went to lengths to produce a tourism video with young Chinese travellers renting a campervan to explore state parks independently (Ministry of Business, Innovation amp; Employment, 2012). But businesses shouldnââ¬â¢t reach out to this rising surge of Chinese tourists unless they are properly prepared. Generally, Chinese tourists speak less English than European visitors do, requiring translation services. And they expect to be able to bargain for better deals on the accommodations. For instance, Chinese tourists greatly appreciate employees who express a high level of professionalism, enthusiasm, and a positive attitude. Hotels that want to attract Chinese tourists need to train employees to provide this style of service. In addition, having readily available bilingual staff and employees who are sensitive to East/West cultural differences will greatly enhance these travellersââ¬â¢ experience. Furthermore, Western hotels interested in hosting Chinese tourists should be prepared to provide toiletries as well as a method of making hot water for tea in the guest room. Perhaps the most challenging amenity that Chinese tourists crave is food that suits the Chinese palate and diet. Chinese tourists want to taste local cuisine but also want to find familiar foods. A Chinese diet includes a wide variety of vegetables, little or no milk, and more salty rather than sweet foods. Western restaurants offering local dishes that fit this description may have a better chance of winning Chinese tourists. Finally, for multinational corporations, a new challenge (Sanburn, 2013). A proper meal in Chinese culture consists of appropriate amount of fan (rice and other starch foods such as noodles) and tsai (vegetable and meat dishes). In other words, fan is considered the core ingredient of a proper meal, whereas tsai are regarded as peripheral (Chang, Kivela, amp; Mak, 2010). Although many of the Chinese tourists are eager to try local food, many find it impossible to eat local food at every meal. This indicates that they perceived the intake of local food as a touristic experience, yet it did not match up to the criteria of a proper meal in their dietary habits. Tasting local food could satisfy the experiential needs of the tourists, but might not be enough to satisfy their physiological needs (Chang, Kivela, amp; Mak, 2010). Chinese tourist found that western food was food was too sweet, unhealthy (few vegetables and fruits, high calories), with too many uncooked or cold dishes (including ice water), and too much fried food (Xiang, Chengting, Rich, Sheryl, amp; Liangyan, 2011). Because of their core eating behaviour, some tourists found it more difficult experiencing the new eating experiences and revealed a persistent preference towards partaking of Chinese food. Interestingly, even for some tourists who were enthusiastic to sample local food, Chinese food was found to be dominant as the core preference (Chang, Kivela, amp; Mak, 2010). Figure 1: A Model of Chinese Tourists Food Preference Source: (Chang, Kivela, amp; Mak, 2010) History and tradition are important to Chinese travellers, making context and clarification important to tour itinerary selection and scheduling. Further, most Chinese tourists still highly appreciate traditional values such as family duty and caring for the children. Thus, when they travel overseas, purchasing gifts for seniors, children, and friends is almost an obligation. Shopping is a big draw for Chinese visitors, who are attracted by the wide selection of consumer products and low prices. Currently Chinese visitors spend an average of $3300 when they visit New Zealand. However, this average rate of expenditure is forecast to fall almost continually over the coming years to only around $1500 in 2020, due to the changes in the visitor mix (Ministry of Business, Innovation amp; Employment, 2012). Chinese visitors do not stay for very long when they visit New Zealand. Although in the year ending September 2012, the average length of stay was 16. 6 days (and is forecast to decline), half of Chinese visitors actually only spend four days in the country. Categories of tourism spending which are closely linked to the number of days spent in the country can be particularly impacted by shorter stays, such as spending on accommodation and food and beverage. (Ministry of Business, Innovation amp; Employment, 2012) The Chinese tourists purchased a very large variety of merchandise, including antique watches, diamonds, DVDs and a special T-shirt signed by NBA players. Branded running shoes, leather shoes, and vitamins were also frequently purchased products. Other products included Polo T-shirts, handbags, health products and souvenirs (Xu amp; McGehee, 2011). There are several major motivations for Chinese tourist shopping, these include gift purchases, especially item that are unique U. S. brands, quality, competitive pricing. First, most tourists purchase gifts for friends and relatives. Purchasing gifts from a trip for friends or relatives is a norm in Eastern cultures (Xu amp; McGehee, 2011). Since not every Chinese has a chance to go travel aboard, presenting a gift and souvenir from to relatives, friends or colleagues may be very welcomed and can strengthen social and family ties. Another motivation for shopping is the perceived high quality of U. S products. The Chinese tourists believed that the quality of products in the U. S. was guaranteed and there should not be fake brands due to sound legal systems (Xu amp; McGehee, 2011). The comparatively lower prices, especially for well-branded products were another motivation. Taking advantage of price differences has been found to be one important motivation for cross-border shopping. The Chinese tourists compared prices in China and the U. S. and found that many items cost at least 10 per cent less in the U. S (Cripps, 2013). Chinese tourists felt that they were not being misled or pushed to buy by the tour guides or the sales assistants, as usually happened in some tourist destinations. But the language barrier was is the most problematic obstacle to their shopping. A lack of Chinese signs in the shopping mall along with limited English language skills resulted in a reliance on the tour guides when communicating with sales assistants. This extra step was sometimes problematic for the tourists. In terms of customer service, evaluations were mixed. Some informants complained that there were not enough sales assistants in some stores and that the assistants were not very hospitable to the tourists (Xu amp; McGehee, 2011). Limited payment methods were another area negatively impacting the touristsââ¬â¢ shopping experiences. The informants reported that they had to pay by cash or by credit card. This was problematic as Chinese tourists are only able to carry a limited amount of cash out of Chinese customs. Additionally, some tourists did not have a U. S. Dollar credit card, or the credit limit was not high enough to cover the expenses. Even with a dual- currency credit card, cross-border transactions were not as smooth as those domestically (Sanburn, 2013). All the informants thought the U. S. stores should have Chinese speaking sales assistants if they want tourists to spend more money. They also recommended that the shopping malls and stores obtain Chinese signs for directions and departments. One informant talked about the shopping assistance efforts of the Hong Kong tourism administration. Another suggested the hiring of Chinese students as sales assistants, as has been done in Japan. Xu amp; McGehee, 2011) Conclusion Chinese tourists are quickly growing into a larger and more sophisticated group of consumers. When traveling overseas, they expect quality services, respect, and better cultural understanding of their wants and needs. Satisfying and meeting these expectations will require a combination of insight into culturally specific behaviours and understanding of broader cultural beliefs. Thus, successful We stern marketers should be well prepared to accommodate the basic needs of the Chinese tourists visiting a destination for the first time. A better understanding of cultural norms and values will provide better satisfaction and service quality, resulting in a rewarding experience for visitors and effective marketing for destinations and businesses. Bibliography Chang, R. , Kivela, J. , amp; Mak, A. (2010). FOOD PREFERENCES OF CHINESE. Annals of Tourism Research, 989-1011. Cripps, K. (2013, April 12). chinese travelers the worlds biggest spenders. Retrieved May 5, 2013, from CNN: http://edition. cnn. com/2013/04/05/travel/china-tourists-spend/index. html Ministry of Business, Innovation amp; Employment. 2012, December 12). Why is the China market so important for NZ? Retrieved May 8, 2013, from Ministry of Business, Innovation amp; Employment: http://www. med. govt. nz/sectors-industries/tourism/tourism-research-data/regional-tourism-indicators/rti-country-analysis/why-is-the-china-market-so-important-for-nz Sanburn, J. (2013, April 9). How the U. S. Travel Industry Is Adapting to a Growing Wave of Chinese Tourists. Retr ieved May 6, 2013, from Time: http://business. time. com/2013/04/09/how-the-u-s-travel-industry-is-adapting-to-a-growing-wave-of-chinese-tourists/ UNWTO. 2013, April 04). China- the new number one tourism soucre market in the world. Retrieved May 7, 2013, from World Tourism Organization: http://media. unwto. org/en/press-release/2013-04-04/china-new-number-one-tourism-source-market-world Xiang, L. , Chengting, L. , Rich, H. , Sheryl, K. , amp; Liangyan, W. (2011). When east meets west: An exploratory study on Chinese outbound touristsââ¬â¢. Tourism Management, 741-749. Xu, Y. , amp; McGehee, N. (2011). Shopping behavior of Chinese tourists visiting the United States:. Tourism Management, 427-430.
Monday, November 25, 2019
Essay on Fast Food and Consumer Foodservice
Essay on Fast Food and Consumer Foodservice Essay on Fast Food and Consumer Foodservice 5 New Expansion Patterns in China Consumer Foodservice Article | 19 Sep 2011 Consumer foodservice in China has seen incredible growth over the last few years, but recent expansion is evolving in some surprising ways. While global multinationals like Yum! Brands and McDonald's have shifted their focus to second- and third-tier cities, local Chinese operators are widening their reach to include first-tier targets despite the high level of competition. Many such operators are looking to grow from regional brands into national competitors, and they're using a variety of methods- from acquiring smaller players to raising capital through stock offerings or venture capital partnerships- to achieve their goal. The rise of new growth centres First-mover Yum! Brands has been building its presence in China since 1987, and the market now contributes more than 40% of the company's total operating profits. The company has focused its expansion so far on the three largest coastal cities (Shanghai, Beijing and Guangzhou), and as these highly dense, urban areas have the largest concentration of affluent consumers, they've provided fertile ground for rapid growth. According to the company, Yum! Brands' operating profits from China doubled from 20072010, and it expects annual profits to reach US$1 billion in the near future. Other US-based multinational operators have followed Yum! Brands' lead, and four out of the market's five top foodservice brands (KFC, McDonald's, Dicos, Pizza Hut, Little Sheep) are now at least partially US-owned. Many of these global competitors have also focused on incredible rates of expansion in first-tier markets- both McDonald's and Yum! Brands have expanded as quickly as one new outlet per day at times- and the consumer foodservice market is becoming increasingly saturated. Furthermore, soaring food inflation in recent years has made fast food prices more accessible to consumers outside the wealthiest urban centres. As a result, Yum! Brands, McDonald's and other multinational operators are now shifting their focus to expansion in second- and third-tier cities, especially in central, northwest and southwest China. Market-leading brand KFC began expanding to smaller cities in 2009 and has already reaped the benefits. According to the company, more than 500 KFC outlets opened in China in 2009, and 140 of them were located in central and western regions. Half of the openings were in smaller cities, some of which had previously had little or no penetration from chained consumer foodservice, and as a result the openings were met with considerable consumer excitement. This strategy helped the company achieve a 23% increase in operating profits in China, the company's highest system-wide. Contributing to this increase were the lower costs associated with operating restaurants in lower-tier cities, such as relatively inexpensive rents and labour costs. The former may have been most attractive to the operator, as high rents and stiff competition forced Yum! Brands to close a number of outlets in first-tier locations in 2009. Domestic players look to expand national reach As Yum! and its ilk were building their presence in Beijing, Guangzhou and Shanghai, China's domestic players focused instead on growing in second- and third-tier cities to avoid direct competition with the much larger operators. This strategy resulted in a strong presence among domestic players in areas that are now becoming major growth targets. Cities in these less developed regions are rapidly expanding, and many of them are seeing increases in government investment on local infrastructure. Notably, China's National Development and Reform Commission announced in July of 2010 that it would Page 1 of 3 invest RMB680 billion (US$107 billion) in west China to stimulate economic growth in the region. Making these regions even more conducive to growing foodservice demand, many have growing populations
Thursday, November 21, 2019
Data and IT networks are having a significant impact on the production Essay
Data and IT networks are having a significant impact on the production and distribution of radio material - Essay Example This research is mainly aimed at presenting a deep insight into the incorporation of the new technology (computer, networks, IT) in the field of Radio. This research presents a detailed analysis of the data and IT networks incorporation in the Radio field and its assessment of the significant impact on the production and distribution of radio material. This research also explorers the data and IT networks use and design for the Radio technology. Radio is a component of the electromagnetic band, minute deviations in electricity and magnetism that, similar to ripples on a pool, extensive in waves at the speed of light to present us light itself, x-rays and other rays, and radio (Ofcom). Radio waves reach us from outer space sources, the Sun being a most important source that regularly interferes with radio or TV function on earth. Jupiter is also a vigorous source of radio transmission. Mapping the radio transmission from extraterrestrial sources, acknowledged as radio astronomy, has presented information about the world that is frequently not reachable by means of optical telescopes. In addition, for the reason that the earths atmosphere does not take up robustly at radio wavelengths, radio astronomy provides definite benefits over optical, infrared, or microwave astronomy on earth (Halliday, Resnick and Krane). Over the past few years, the up-to-date Radio technology particular to the area of information and entertainment has transformed significantly. A supreme example of this is satellite radio. In the place of listen the customary Radio transmission, we at the present are able to listen the local radio channels by means of satellites out in space. The new and up-to-date IT and network technology has provided huge advantage regarding the establishment of the better radio voice quality, more coverage, and lot of other options. By means of new technology there is no downtime, affordability, additional robust content as well as the
Wednesday, November 20, 2019
Implementation of the Intervention Essay Example | Topics and Well Written Essays - 250 words
Implementation of the Intervention - Essay Example This has made cancer a topic of discussion at all social institutions: religion, education, political and also at home. Cancer, been a health issue, needs an intervention program that will help to reduce the number of deaths that occur annually. Most people come to learn of their cancer disease when it is too late as they are unaware of the signs and symptoms of the disease and have no access to the right medical services. There is therefore the need for cancer awareness to be raised all over the world, especially to the people living in marginalized areas (DeVita 23). This intervention is a primary level intervention and it needs support from all groups including the government, health care centers and non-governmental agencies. The government should take first priority in creating cancer awareness all over the country. It should work in hand with health centers to learn on the regions that need quick intervention and ways that can be used to educate them about the disease. Non-governmental agencies should also take up their role as advocates for the people who do not have the required information about cancer. DeVita, V. T., Lawrence, T. S., & Rosenberg, S. A. Cancer: Principles & practice of oncology: annual advances in oncology. Philadelphia: Wolters Kluwer/Lippincott Williams & Wilkins Health. 2011.Bottom of
Monday, November 18, 2019
Ethics in Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 words
Ethics in Entrepreneurship - Essay Example But in performing such type of operations, Ethics is extremely essential. It is known as the philosophy that an entrepreneur or business organization adheres in its dealings. This means, each and every business organization or entrepreneur comprises of certain rules and principles that its employees need to follow at the time of tackling its operations. Otherwise, the entire business organization might lead to downfall of productivity and profit margin. Apart from Ethics, Morality is another essential term offering high value towards business. Morality is mainly concerned with varied types of values, norms and beliefs that help an individual to detect the right or wrong actions. Thus, the behavior of an individual is highly influenced by such values, beliefs and norms that vary from person to person. With the help of such behaviors, an entrepreneur or individual enhances the prospects of a business organization. So, such values are extremely essential for an entrepreneur. Discussion The characteristics of Ethics in business are as follows: Ethical decisions differ from one person to another. It is mainly due to different views, values, norms and beliefs of varied types of individual. However, each and every types of ideas and values need to be apt for the customers or employees of the organization. Ethical decisions need to be at par with the cost incurred and the profit margin of the business. In order to do so, the entrepreneur needs to offer the products and services in such types of prices to its customers. The decisions of the employees in a business are voluntary their own deeds. So, it is essential for the employees to present ethical decisions that might prove effective for the business in long run (Shaw, 2010). Ethics is a trait of human being that needs to be ethical. Otherwise, being an employee of an organization, he might not be able to take any type of ethical decisions. Not only in his professional life, but ethics is also essential in oneââ¬â ¢s private life. If he or she fails to take the ethical decisions, then he or she might never prosper in life in future era. Side by side, due to an unethical decision, not only the image or productivity of the organization might get reduced but also the reputation may decline. The range of customers might get reduced slowly and slowly leading to downfall of the entire profit margin of the organization. Thus, the rate of loyalty over the brand or the entrepreneurial image might get faded among the public day by day. So, it is extremely essential to maintain a strong status and supremacy in the market for the brand and its products on the basis of ethical decisions. Only then, an entrepreneur might prosper. Ethics is a type of characteristics feature of a human being that varies from one individual to another. Moreover, working in a group or an organization, the ethical views and norms of an individual also gets highly influenced by others. Some of the aspects by which, ethics within an organization gets affected are stated below: Religion- as numerous individual works within an organization or under an entrepreneur, some due to diverse religious traditions and norms, ethical decisions also get affected. Thus, sometimes, due to religious variations, the decision making of the individual gets influenced to a certain extent. But still, serving the human being in a best way is the only view
Saturday, November 16, 2019
Study On The Importance Of Green Banking Finance Essay
Study On The Importance Of Green Banking Finance Essay Introduction In our life money has always play an important and crucial role in almost in every aspect. And in this, bank is an institution which mainly deals with money. According to Freixas and Rocher bank is an institution whose current operations consists in granting loans and receiving deposits from the publics (1999, p1). Till date, the banking industry has improvised his products and facilities to provide it to their customer. No one has imagined that 100 yrs ago, that bank will play a crucial role in 21th century. Now banks are influencing the development and the growth of the economy in the way of both quality and quantity. The major source of financing investment of banking sector is from commercial projects which are important for economic growth. Hence, for promoting socially responsible investment and environmentally sustainability banks play a vital role in it. As we know banks themselves is not a polluters but its having relationships with some companies and institution which are p olluter or could be in future. Banks are environmental friendly as in term of pollution and emission in its sector. In banking sector the internal environment impact is very low and clean as in the usage of water, energy and paper. The impact is not related with banks activities but with it customers activities. Therefore, the impact of external activity is enormous which is difficult to estimate. And environmental management is like a risk management it increases the value of an institution and lowers down the loss ratio. Thus banks should encourage prudent lending and environmentally responsible investment to the institution. Further those industries which are become green and those which are on its way to get green they have to fulfil the priority to lending by the banks. This process of finance can be called as Green Banking to restore the natural environment banks makes the industries to grow green. The concept of green banking will be equally beneficial to the industries institution banks and economy. Internationally, banks and institutional investor for environmentally responsible/ socially responsible investment projects having their growing concern about it rate (Earth submit, 1992). Financial institution and bank can effectively achieve this goal because they have played an intermediary role in an economy and to the number of investors. Now-a-day environmental issue is not only a concern of the government and direct polluters, it also a concern of those institutions which are stake holders and partners of their business. So the bank and other financial institution can provide a vital support in maintain the environmental protection and sustaining the economic development. The bank operate on long term return on their investment and credit, due to the environmental liability there is risk of non -payment and in the reduction of value in credit extension and investment. So it will get more important for the banking sector to follow certain safe procedure for the environment evaluation of the projects before providing them funds. There are some studies has been shown in the positive correlation between financial performance and environmental performance (Hamilton, 1995; Hart, 1995). Thus it will get more important for the banks and other financial institution in the context of environment performance whether to invest in companies or advise client to do so. The environmental management has to follow different rule formation for conservation of the resources like clean water act, toxic substance control act, clean air act. All these are environmental liability for banking institution in a recent (Bindhu.N.Nayak, 2008). Adopting all these principle will be beneficial for the banking sector and to the financial institution as to consumers and also their stake holder. On international scale various strategies has been adopt to sustain development. The multilateral financial and development institution and international consortium has been building up the standard of environment and strategies to estimate the investment projects. The main aim of this paper is to discuss the issue of the banking sustainability and how it can play a role for the sustainable development and growth for the economy, particularly in the India aspect. Methodology The most important and difficult part of the project is methodology. As in this project the research method which is been use to examine the importance of the green banking in economy to sustain the environment with the help of it. There are certain sources to collect a data for the project such as working papers, academic journals, and relevant books. The research has been done by getting secondary data from genuine source such as articles, journals which are issued by genuine newspaper agencies of a specific country. The project is based on the secondary data analysis as getting primary data is difficult because whatever the policies is taking consideration in bank is taken by the top management authorities and it is hard to have interaction with them in personally. Research Methodology Research is to be done to figure out the proper knowledge of the subject in a systematic way. It is analytical and hard working process to figure out the about the fact and theory. The term methodology refers the theory of how research should be done (Saunders, 2009). According to Welman and Kruger (2001) there are various techniques and methods in order to get effectively and scientifically correct information of the subject by applying objective method. Systematically Review The research of this subject is done on the basis of systematic way. And there is already material has been published by a genuine source on this particular subject. As it is said by Gronhaugh and Ghauri (2005) that the word systematic suggest research is based on logical relationship and not just belief. As method of research is consist of explanation of the data collection and the outcome of the facts from the study and finding the limitation of the subject. As Tranfield (2003) stated that traditional reviews are generally lack of information and some time the source of information was not authentic. Therefore, traditional review should be done very carefully and selective which include the evidence which is supported by the genuine authors summaries (Critical Appraisal Skill Programme, 2005). Quantitative and Qualitative Investigation of Methods: It is necessary, first to understand the difference between qualitative and quantitative investigation methods. Generating or using numerical data is called Quantitative data technique and generating of non numerical data is called qualitative technique. If both techniques are using to approach the data then its called mixed method (Saunders, 2009). According to Smith (1981) every method has its own weakness and strength. And as result may be differ as the use if the different technique and approaches by the researcher. Usually researcher goes for the qualitative approaches which consist of analysation of words through illustration and non- standardised frame work and comparison. As the project is an illustrative research and the objective is to understand the importance of the Green Banking in the India. Corbun and Strass (1990) has explained that the use of qualitative method is to understand the aspect of the subject. And it can be useful in understanding more about the subject which is already known. Quantitative methods can be use to gain insights approach to the issue which is sometime not possible to get the results from the quantitative method. Therefore, to describe key issues researcher prefer to use the quantitative methods especially in the case of transfusion service management which is not possible to get through from the quantitative method. The classical structure of literature reviewing according to the researcher is like; Study of basic level of banks and its importance in the economy. And research has been done on the Green Banking at international level. Then at what level Green banks are taking initiative in the Indian economy. Accumulation of the Green banking policy and more narrows down to the work to get the objective of research. To get the transparent literature review, researcher have to describe all the approaches which make to search the selected literature, key words, outline of the choice and data base (Tranfield, 2003). To analysis the literature several journals, books, articles and electronic base data were use. Source of Tool: To get the relevant material Ministry of Commerce and Industry, India site have been re-examine which is an official website of India. There are other search engine has been used such as Google scholar and University Library site has been used to gather the resources but university Library site is come to notice that there are very less journal are available regarding Green Banking. Analysis of Secondary Data: According to Haakim (2000) secondary data from different sources can also be combined if they have the same geographical basis, to form area based data sets to get the answer of the research question secondary data can be use as in getting the objectives which is aimed for the ample assembly. Genuineness of the facts is tested by the reputed database which is publicised by the authentic resource. The aim of this study is to analysis the secondary data methods while investigating the facts and do the international comparisons and to understand the potential outcome that why Green Banking is very important in the developing countries and how they are playing a crucial role in sustaining the development of the economy like India. Aim and objectives of research: The purpose is to learn what strategies leaders in emerging market growth have adopted to attract FDI and how financial services play major role. The purpose is to develop a model for both categories and test the model empirically to substantiate the hypotheses. What are the lessons that laggards can learn from these leaders? The study intends to show a path to the PIN countries and other markets that will emerge in next two decades. Therefore the objectives of this research are as follows: To illustrate the benefits and shortcomings of Foreign Direct Investments in developing countries like India and China. To understand the impact of FDI on gross domestic product of these emerging countries. To examine current situation these economies and analyse the future possibilities of growth. Limitations of the study: This is systematic review based study of the available literature in the area of Green Banking. Genuiness is the touchstone of Analysising the literature. Whereas, there are general and accurately presented material is available about Green Banking in European countries but very few literature was found related to the Green Banking in India. And even thought their not much significant data or literature has been get from the Google scholar and University Library or any other search engine regarding Green Banking in India. Whereas, sincere efforts has been done by the researchers to get the authentic data from the genuine source and the judgement has been done on the secondary the data. Research of the Credibility: There is certain research tool to examine the credibility like Generalisability, Reliability, and validity. Dochartaigh (2002) described it as,assessing the authority or reputation of the source. Validity: In the case of qualitative research the degree of validity is to be tested. To get the correct result, test of validity is important. Validity is concerned with whether the findings are really about what they appear to be about, is the relationship between two variables a causal relationship.(Saunders, 2009). This is a valid research because it is based on systematic data analysis from the genuine resource and on the basis of this research the question has been answered. Reliability: Reliability define by Joppe (2000) it is a consistent of a result which represent the accurate number of data is presented over the time and the study of result reproduced the same methodology then it can be said that research is reliable. If the research contains the systematic review of the available secondary data of same objective with a same topic and same results then the research of study is reliable (Golafshani, 2003). Triangulation: The term triangulation means that the collection of different data technique, which ensure about what you are thinking that they are telling you (Saunders, 2009). According to Mathison (1998) it is crucial for the methodological issue in quantitative and naturalistic approaches to establish valid proposition and get control on bias because alternative epistemology is incompatible with the scientific traditional techniques. But this research is based on the secondary data analysis not from the primary sources. So, this method is not applicable for this research. Consideration of Ethical: This research is completely based on the secondary data review and not on the primary collection method like interviewing or questionnaires etc. So, the approval of ethical and confidentiality is no use in the research. The collection of data is based on books, articles, journals and reports. The research material which has been used is properly referenced and checking the authenticity of the resource to avoid the plagiarism. Importance of green banking Until now, the business operation of financial and banking institution were not acknowledged towards the environmental concern. Generally, the environmentally degrading activities of banking sectors is like obstructing or getting in the way of business affair of their client. Nevertheless, it will be risk to their business if they were dealing with the environment. Although, there are indirect cost to the banks as they are not directly affected the by the environmental degradation. It is due to the firm environmental regulation which is enforced by the other countries authorities. In the case of failure, the industries have to face the consequence which leads banks to its closure. For example, in 1980 comprehensive environmental Response, Compensation and Liability Act (CERCLA). There was a huge loss for the bank in 1980s in U.S. The bank was directly responsible for the environmental pollution of their clients activities and made them to pay the remediation cost. Thats why banks in U.S are more concern about the environment while lending the fund to their clients. In European countries banks held directly responsible for any misdeed has been done by their clients. Therefore banks and other financial institution have to engage with their stakeholder on social and environmental policy. So that their clients investment can be evaluate. This would make clients to build up a proper management for social and environmental policy issue regarding investment. The green banking is important for both economy and the bank, by escaping from the risk which is involved in the financial sector. Legal Risk: there is a relevant environmental legislation risk for banks if they do not comply with it. More particularly, there is more lender liability risk for paying up the claims and the cost of damages for pollution causing to the asset or depraved. Banks can be helped by the environmental management by enhancing it image and reduce the cost and risk and taking advantage of revenue opportunity. Reputation Risk: As now there is more awareness about the safety of environment and banks may loosen up their reputation if they involve with the big project, which are indulging in the environmental destruction. Environmental management system have a few cases as in good result in cost saving and increase in the value of the bond (Heim, G et al, 2005). Sometimes it has lower risk, great environmental stewardship and increase in profit. Reputation risk is involved in both ethically and economically. By adopting the green banking strategies bank can deal with these risks. There are two components are involved in green banking strategies (1) innovative environmentally oriented financial products (2) managing risk environment (IFC, 2007). Banks have to make a proper arrangement for environmental management system. So that risk can be evaluate which involved in the investment project. The risk can be adopted by recommending the distinctive techniques and rates of interest. From high risk project banks can withdraw fund from it. Creating services and financial products is a second component of green bank which support the environmental benefit with commercial benefit. All these comes in bio-diversity conservation, investment in renewable projects energy, investment in technologies, energy efficiency, environmental investments in mutual funds and bonds (WBCSD, 1997). There should be protective polices for the liability guideline on development and environmental risk. The financial and banking institution should prepare a report of every project they invest and finance (Jeucken, 2001). For projects seeking finance they can have an environmental assessment. For each project bank can outcome with an environmental hazard management procedure and follow it. The big financial institution like Japan bank for international cooperation (JBIC) and International financial corporation (IFC) have consolidated with environmental management in their business strategies. All projects are taking consideration into terms of environmental impact in an account factors like, the substance scale and sector of the project, uncertainty and the degree of environmental impact proposed project site. Even World Banks are lending loan to the beneficiary country on the certain level of commitment that they adopt the environmental protection measures. Over time there is a change in the environmental norms to follow the agreement. And it is considerably bit costly to follow up the standard and environmental norms. If the economic benefits can be consider in the terms of productivity health care and insurance then the cost is not much higher than the benefit. In the study its confirms that 14 billion pound had been caused in the medical expenses and 200 million working days had been loss due to air pollution which resulting in losses in productivity to the European union (Stavros Dimas, 2005). Technologies which are environmental friendly practically decrease the financial burden and also building up the economic sense for the industries. Due to the more environmental awareness among the consumer in all over the world the pollutant industries were facing resistance by the consumer which often cause them massive boycott and close down of the industries and the cost is adding enormously. The concerns about environment are articulated into the international policy trade and act as a blockade for ESGs (Environmentally Sensitive Goods). So affirming modes of production and sustainable technologies are now not taking as a financial burden. Although, it providing high profits and new opportunities for the business. Green banking has neutralized the risk, save the cost and up brings the reputation of banks. So it serves both the commercial objective of the bank as well as its social responsibility. Green banking solves the problem faced by the environmental regulation and enforcements authorities related to size and location of the polluting unit. The authorities have practical limitations on enforcing environment standard on small-scale industries and also industries located in far off places. International initiative of green banking At international level there are many banks who have taken initiative to get their branch green. There is one bank name PNC Financial Group Inc which is based in Pittsburgh has certified as a green bank. PNC green bank does not stop with getting eco-friendly construction. They include there parent company business model in developing their products, marketing and giving training to their employee. PNC is one of the banks who have taken the green concept so seriously that it evolved the idea into the brand of the company. PNC has started its construction of getting green bank in 1998. They had selected 17 different sites for their location and make sure that it is easily accessible through transportation. Then they had planned to build their building accordingly to U.S Green Building Council (USGBC) and Leader in Energy and Environmental Design certification process. In 2000 the building was completed and it was the largest LEED green certified building in the world. Some of the new features have been included into the building structure like the lobby of the building is eco with a green roof. It was stated by Gary Saulson the director of the corporate real estate that you can walk into the building lobby on 90-degree humid day without any problem because there is a three- story water wall in the space which work as coolant radiant which maintain the inner temperature of the bu ilding. Because of this innovative method PNC has set a new standard of development. And it has been appreciated by the mayor of the city for setting up the standard of eco-friendly responsibility and quality development in the city. And in 2007 PNC Bank has secure 20th rank among the Best Green Company for America Award (Deb Stewart, 2008). Now PNC has more than 58 eco-friendly branches all across the state. And 41 branches has also obtained the Benchmark of Green Bank most of the branches has granted the LEED certification. As all of these branches has follow the eco-friendly process such as; Recycling: Near about 15 percent of furniture fabric and carpet is made of green material or recycle material for example Door and cabinetry are made of wheat board which process by the wheat product. Water and Energy Efficiency :- the usage of energy has been reduce by 50 percent because of the high-tech system installation in the building and maximum usage of the natural light and water usage was also reduce by 6200 gallon in year. Reduction in land waste: Wastage of construction material like steel, wood and cardboard is to be recycled. By doing this 150 ton per branch wastage has been reduce. Using of the pre-made panel for exterior has reduced the waste, while constructing the panels. To protect the ozone layer non- chlorofluorocarbon refrigerant are use for cooling the system (Deb Stewart, 2008). In 90s the United Nations environment programme has launched a program which is known as UNEP finance initiative (UNEPFI). Under this, near about 200 financial institutions of all around the world has taken the participation and signed the initiative statement to promote the environmental development (Jeucken, 2001). The main purpose is to merge the social and environmental dimension to the financial performance. According to the UNEPFI, the sustainable development is a basic thing for the business management. It supports for the elementary advance to the environmental management and offers reconciling environmental discussion into the asset management business operations and other decision of the banks (Earth Submit, 2002). In 1991 the IFCs environmental panel was established for receiving the environmental assessment project. ABN-Amro banks which is Netherlands based banks who has developed certain polices like reputation risk management (RRM) to recognise, manage the non- financia l and asses within their business strategies. Likely, the big international banks like Deutsche, HSBC, Standard Chartered and ABN-Amro banks has look and discuss at environmental problem under Kyoto protocol. Moreover, the government of Dutch has requested formally from the banks to achieve sustainable development. This agreement has been establish between banks and government in 1999. This environmental policy will improve the development of services and new financial products. The Rain Forest Action Network (RAN) and Earth (FOE) had challenged the industry with their campaign which highlighted the case in which commercial banks were bankrolling Disaster in 2000 in U.S. Bank Tract is a network which formed by the NGOs to promote the sustainable finance in the commercial sector in 2002. This coalition up comes with 6 principles which assisting in the protection of environment and justice by the bank. This is known as Collevecchio Declaration (Bibhu Prasad Nayak, 2008). These 6 principles are no- harm, commitments to sustainability, responsible sustainable market and transparency, accountability and governance. There are more than 200 institutions that signed up the declaration and asked the banks to integrate with these commitments into their business operation. The declaration states that Finance and Commerce has been at the centre of a historic detachment between the worlds natural resource base, production and consumption. As we reach the boundaries of ec ological boundaries of the ecological limit upon which all commerce relies, the financial sector should take its share of responsibility for reversing the effects this detachment has produced. To guideline the project banking institution have been constraint into common set of social and environmental policy for sustain the green finance. In Oct 2002 the group of small banks along with IFC had come with the proper general guideline and later in July 2003 they came up with a policy is known as Equator Principle. And other big commercial were also adopting this set of principles in their structure. And in July 2006 equator principle has been revised and updated. The used of the revised set of principle, the project coverage has been lowered by 10 million from 50 million dollar. Now 16 countries with 46 financial institutions were managing their business in more than 100 countries and they all have adopted the equator principle. The adoption of this principle in the business operation has become common standard for the project which integrated with social and environmental issue in business. (Bibhu Nayak, 2008; p10) The NGOs has received the activities of equator bank in a worldwide and it being proclaimed, when they came to know that it not commit to the equator principle. Sustainable Banking Award has been initiated by the Financial Times along with IFC in 2006. There are 151 financial institutions in which 104 institutions has made through to the final list of award in 2007. The ratio of bank apply was more than the previous year, it was about 100 percent more. The international initiative of banks operations are voluntary in nature and the basic thing is to up come of the common good for the enhancement of the ecosystem. In competitive market there is a short coming of a voluntary commitment. As an increase of the green money in the market, lender will stimulant to delay the social commitment and the commercial interest which will programme in the short run. If the green money is voluntary than it will be precondition demand for the green bank. According to the government policy the bank which is responsible for the breach of law of their clients will have to help in promoting green banking. Green Banking In India From last two decade, the growth rate of Indian development is very high. And this is because of the industrial sector that plays a curial role in the development of the India. However, controlling the environmental challenge has been occurred in the way of Indian industry which makes impact in their business i.e. emission of pollution by their clients. Although government of India is trying to solve this problem by adopting the environmental policies and comforting the industries to adopt this environmental technology. Fortuitously, India is a second fastest growing nation in the world in producing green house gases. Indias three main metropolitan cities like Chennai, Delhi and Mumbai are the worlds most busy and polluted cities. In India major polluted industries are paper and pulp, zinc steel and copper metallurgical industries, refine, tanneries, sugar, pesticides and insecticides, textile, fertilizers etc. The environmental management have to be taken care by the financial institution and banks, who are investing in the industries project. This can be done by improving the level of efficiency, quality of products and services. In this case banks and financial institution play an important role because these institutions are major source of finance to the industries. In India there are broadly two main categories for the environmental policies and regulation which is liability, law control and command regulation. The control and command regulation are ex an-te regulation which are assigned to prevent from the environmental polluting businesses. With the help of this policy lending institution will set up a specific standard for the industries, so that they have to follow the regulation and project will examine closely by the ministry of environment and forest authority and its up to these authority whether they give the permission or not. The liability law is like based on the analysis of past performance (ex post). In this impose will be made by the authorities on the industries by closing down or imposing fine on them etc. Although there is no such law in India which impose any fine on the bank; which are providing financial help to those client whose are responsible for creating damages to the environment. Once the legal regulation comes in th e frame work then the environmental standard will raise in India. And the industries which are responsible for polluting the environment will either have to shut down or have to invest money in the development equipment to meet the standards. And at international market industries will lose their competitiveness, which will directly affect the bank sector and economy of India. Thus it is crucial for the bank to protect them from getting into non- performing assets in coming days. Analysisation of these facts make banks to accept the concept of Green Banking. The institutions which are not capable to control the pollution now may be future polluters. And one day, the legislation will taken a strict decision against the polluters who are responsible for damaging the environment and may have to shut down their units. For e.g. in Delhi and Agra, almost 150 SSI units had to be shut down because of not following the standard. Now banks and financial institutions are taking consideration about these perspectives, if the industries were not performing the environmental standard. According to the pollution control status there are 17 different categories of institution where they are equal number of institution which are shut down or defaulted. When there is a shut down or a default of a project, bank has to face financial losses it is because of increase of the li ability and bad asset. Year Total Acceding^ Defaulting^^ Shut down 2001* 1551 1350 24 177 2002* 1551 1351 22 178 2003* 1551 13356 52 189 2004 2155 1877 53 225 2005 2455 1909 168 265 2006 2678 2044 297 335 Note: ^Competent to agree with the Standards, ^^ Not able to agree Standards. Source: * Annual Report 2005-2006 LOk Sabha ; Govt. Of India, Ministry of Forest and Environment; (sourced from www.indiastat.com) Now-a-days, awareness is spreading among the public regarding environmental pollution. And people are taking strict action against those industri
Wednesday, November 13, 2019
Hawthorne To Faulkner: The Evolution Of The Short Story Essay examples
Hawthorne to Faulkner: The Evolution of the Short Story Nathaniel Hawthorne and William Faulknerââ¬â¢s short stories ââ¬Å"Young Goodman Brownâ⬠and ââ¬Å"A Rose for Emilyâ⬠use a moral to endorse particular ideals or values. Through their characters examination and evaluation of one another, the authorââ¬â¢s lesson is brought forth. The authorsââ¬â¢ style of preaching morals is reminiscent of the fables of Aesop and the religious parables of the Old and New Testament. The reader is faced with a life lesson after reading Hawthorneââ¬â¢s ââ¬Å"Young Goodman Brown:â⬠you cannot judge other people. A similar moral is presented in Faulknerââ¬â¢s ââ¬Å"A Rose for Emily.â⬠The use of morals combined with elements of Romantic era writing show the stories of Hawthorne and Faulkner to be descendants both of fables and of Romance literature. Nathaniel Hawthorneââ¬â¢s ââ¬Å"Young Goodman Brownâ⬠tells the story of a young man who decides to league himself with the devil. Goodman Brown is a citizen of a typical town with its share of good people and not-so good people. Goodman Brown believed that he knew the inhabitants of the town fairly well. He knew Goody Cloyse, for example, to be ââ¬Å"a very pious and exemplary dame, who had taught him his catechism in youth, and was still his moral and spiritual advisor, jointly with the minister and Deacon Gookinâ⬠(598). He knew Deacon Gookin was a strict man of the Church and was always ââ¬Å"bound to some ordination or ecclesiastical councilâ⬠(599). However, in his travels through the woods with the old man, Goodman Brown notices Goody Cloyse progressing down the path. ââ¬Å"ââ¬ËA marvel, truly that Goody Cloyse should be so far in the wilderness at nightfall,ââ¬â¢ he [Goodman Brown] saidâ⬠(598). Just as he begins to have doubts about the womanââ¬â¢s pureness of heart, he comes across Deacon Gookin in the woods as well. As they are supposedly fine, upstanding citizens of the village, Goodman Brown has to wonder why they are traveling through the woods on the same path that he is taking with the devil. Afterwards, he is astonished to see not only these two upstanding citizens at Satanââ¬â¢s ceremony, but almost everyone else in the town as well. It is through his assumption that his fellow townspeople were good that Goodman Brown learns the storyââ¬â¢s most important lesson: namely that you should not judge people at face value; anyone can put on airs, and his encountering of the devilââ¬â¢s ceremony emphasize... ...bà ¾that he was not a marrying manâ⬠(461). Later in the story, Faulkner makes reference to Emilyââ¬â¢s possible necrophilia, although no direct statement is ever made. Homosexuality and necrophilia would in no way be topics to be discussed in Hawthorneââ¬â¢s time. As a modern writer, Faulkner had a considerable amount of freedom in what he wrote, and this freedom is reflected in his work. The short story began as fables and parables that evolved into more complex psychological studies of virtues, ideals, and values. Nathaniel Hawthorneââ¬â¢s ââ¬Å"Young Goodman Brownâ⬠emphasizes these morals as he examines the inner workings of his main characterââ¬â¢s thoughts as he encounters the devil and the townspeople. Faulkner also uses these techniques in his modern style of writing, however he tailors them to fit the more controversial issue of his generation while still maintaining a hold on the past generation he is examining. Over time, values and ideals stay the same, but the manner in which the technique is used evolves with current affairs and modern vocabulary. Works Cited Charters, Ann. The Story and Its Writer: An Introduction to Short Fiction. Boston: Bedford Books of St. Martinââ¬â¢s Press, 1995.
Monday, November 11, 2019
How Technology Enhances Teaching and Learning Essay
Students at the Owen Schoolââ¬â¢s Strategy in the New Economy seminar enter a classroom that looks like any other, except that a projection system and video screen have been installed. Their professor announces that today they will be joined by a guest lecturer, a senior VP from a Fortune 500 corporation. What makes this guest lecture unique is that the students are sitting in a Nashville classroom but the guest lecturer is speaking from his home office in Estonia, via video technology. This is an example of one of the creative ways faculty members at Vanderbilt are using technology to enhance their studentsââ¬â¢ learning. In the scene described above, Owen Professor David Owens, along with Professor Bart Victor, use video conferencing to bring an international guest speaker to their organization studies seminar. Across the University, faculty are using technology to help students master subjects from elementary and secondary school instruction to bioengineering to structural equation modeling. They are developing their own skills while making students comfortable with the technology that will help them be successful after leaving Vanderbilt. As they introduce more and more technology into the classroom, faculty are finding it raises the quality of class discussion and involves students much more deeply in their own education. The employers of today are looking for the very best employees to fill positions in their organizations. The desired traits of an employee used to be centered on experience. The more experienced an applicant was, the more likely they were to get the job for which they applied. Today, employers are not only looking for experience, they are also looking for a person that has a degree in the field. Employers have begun to realize the importance of strategic thinking and leadership skills that an education affords. Because of this shift in desired qualifications, modern adults have been unable to adequately compete in the job market. The aforementioned time and responsibility constraints, as well as the fact that they have been focused on building the experience that was previously desired has put adults at a disadvantage. Being able to obtain a college degree via technology-based education methods has greatly reduced that disadvantage. It has also had an impact on their ability to execu te the functions of the position when theà job is obtained. For this issue of the Teaching Forum, we spoke to four Vanderbilt faculty members, each of whom is using technology to enhance their studentsââ¬â¢ learning. Owen Management Professor David Owens uses videoconference links to bring in guest speakers and incorporates video and audio technology into most of his lectures. Psychology Professor Andy Tomarken teaches methods and statistics courses in a computer lab, allowing him to integrate traditional lecture with demonstration projects using the methods he is teaching. Peabody Professor Margaret Smithey guides her students in the preparation of multi-media classroom presentations including clips from the Internet, video, audio, and news archive footage. She has opened an e-conference for interns from her courses who want to stay in touch with their fellow students and professors, and she maintains a library of digitized video clips, taken from live and simulated classroom settings. Department of Biomedical Engineering Chair Tom Harris directs a new NSF-funded center focused on developing technology-based bioengineering teaching materials and curriculum. He is collaborating with several partners, including Peabody Professor John Bransford. What Technology Brings to the Classroom What these faculty members have in common, and what they share with many others across the campus, is a commitment to exploring the opportunities technology offers for improving the quality of classroom instruction. Professor Margaret Smithey describes how technology allows her to capitalize on unexpected turns in class discussion. ââ¬Å"Yesterday afternoon my students had specific questions about classroom management, so at that point I said ââ¬Ëletââ¬â¢s look at these scenarios that I have on a CD.ââ¬â¢ The CD brought to lifeà their questions. I think seeing actual classroom scenarios related to their questions makes learning come alive for my students better than if I gave my opinion or told a story.â⬠Professor Tomarken, who teaches advanced statistics and methods classes, says incorporating computers into class discussion can also make extremely difficult courses much easier for students to grasp. One of the challenges of teaching advanced statistics to students who often lack a strong math background is ââ¬Å"translating theoretical stuff into a workable set of concrete analysis, ââ¬Å"Tomarken says. ââ¬Å"I find that itââ¬â¢s really important to talk about different types of models from the point of view of specific problems and thatââ¬â¢s really where the ability in class to have stuff be on the projection system is critical.â⬠Access to a computer-equipped classroom can also be important. ââ¬Å"I like to get students interacting with software in the class, ââ¬Å"Tomarken says. ââ¬Å"I find if you just send them home to do it on their own, they run into real problems. When they follow me, typing in on their own computers, that facilitates their learning.â⬠Last semester, Tomarken also faced another problem ââ¬â the lack of a good textbook for teaching structural equation modeling to social science students ââ¬â that he solved using technology. ââ¬Å"There is no book that is perfect, that really is appropriate, for this class. There are either books that tend to be too easy or too hard or just not broad enough in scope.â⬠Tomarken solved this problem using the Prometheus system, by placing his lecture notes on the web. This not only replaced the textbook, it allowed students to spend more time focused on the lecture and less time copying formulas from the board. ââ¬Å"I told them, you donââ¬â¢t have to write anything, itââ¬â¢s all on the web, just listen.â⬠Technology Changes Teaching, Not Teachers While all the faculty members interviewed for this article believe technology has great power to influence their teaching, no one feels it fundamentally changes them as teachers.à ââ¬Å"Iââ¬â¢ve always wanted a very interactive classroom,â⬠Smithey says. ââ¬Å"I want it to be very theoretically based and I know exactly what I want my students to learn. I think technology has improved the quality of what we can access.â⬠Smithey also emphasizes the importance of technology being used for a clear purpose. ââ¬Å"I never want to use technology just for technologyââ¬â¢s sake but to support my studentsââ¬â¢ learning.â⬠Professor Tomarken feels that integrating statistical software and visual models into his courses means he comes into class ââ¬Å"better preparedâ⬠but doesnââ¬â¢t think it changes him as a teacher. ââ¬Å"I usually am pretty interactive with the class.â⬠He does, however, credit the accessibility of computers with reducing the ââ¬Å"passivity factorâ⬠in his classes. ââ¬Å"They have to type things in, they have to click on the mouse. I think itââ¬â¢s pretty lively in a lot of ways.â⬠How Technology Enhances Learning Professor Owens, Smithey, and Tomarken all feel they can see technology enhancing their studentsââ¬â¢ learning, particularly when students use the technology directly. David Owens requires his students to do at least one group project entirely over the Internet. ââ¬Å"Theyââ¬â¢re not allowed to do it face to face,â⬠Owens says. ââ¬Å"They arenââ¬â¢t allowed to say, ââ¬Å"Iââ¬â¢ll call you tonight.ââ¬â¢ They have to do everything virtually. In this project, they have a lot to figure out about group process, what things are done best face to face, what things are done best asynchronously, what things are done best in an anonymous chat room. And they figure it out. Itââ¬â¢sâ⬠¦so much more powerful than my sitting up there saying ââ¬Å"the group process models showâ⬠¦Ã¢â¬ Professor Smithey requires her students to complete a series of computer assignments from a course CD that she has developed. Smithey values these pre-class assignments because they save classroom time and improve the quality of class discussion. ââ¬Å"When the students complete their CD assignments, they come to class with a common context. We are able then to discuss particular class dilemmas or teaching dilemmas that everyone has watched, analyzed and reflected upon. So, we can start there and go with our class discussion rather than having to take 20 or 30 minutes of classà showing the video and asking the specific questions. Theyââ¬â¢ve done all that in the computer lab.â⬠Technology can also improve the dynamics between teachers and students, often leading to enhanced learning. ââ¬Å"Students can see youââ¬â¢re doing a lot of work to further their education and I think that thereââ¬â¢s an appreciation factor that ultimately contributes to their own motivation,â⬠Tomarken says. Students who may question how much their professors care about teaching can also see evidence of the time and trouble taken to prepare for class. ââ¬Å"I think sometimes graduate students, or possibly even undergraduate students, go in with the mindset that this teachers doesnââ¬â¢t really give a darn about teaching and I think using technology is a real way of communicating ââ¬Ëyes I do,ââ¬â¢Ã¢â¬ Tomarken adds. Technology Brings Challenges Introducing technology into the classroom can also bring a set of challenges. First among them is finding the time needed to incorporate new technology into courses. Professor Smithey not only uses the technology herself but also requires her student to produces multi-media projects during the semester. ââ¬Å"If youââ¬â¢re going to ask the students to do such a challenging project, you have to be available to them. You have to have support. There has to be some relief time to learn about the technology. You donââ¬â¢t have to know the details of technology but you have to understand it well enough that you can envision what your students need to know about using it.â⬠The technology itself can fail, leaving an instructor to resort to back up. Technology also changes rapidly and it takes time to keep up with technical changes that influence how equipment and software perform in the classroom. Professor Owens points to a digitized news show he purchased from CBS: ââ¬Å"I have the CD in here and one of my fears is that someday Iââ¬â¢ll pop it in the classroom and it wonââ¬â¢t work. Itââ¬â¢s a constant upkeep.â⬠Professors Tomarken and Owens also note that having computers in the classroom can distract students from the class itself. Teaching in aà classroom equipped with computers ââ¬Å"actually introduces the potential for students to be doing something on the computer that doesnââ¬â¢t have anything to do with the class,â⬠Tomarken says. ââ¬Å"I occasionally go parading around and check out what people are up to,â⬠Owens says. Some people take notes on the computer, some people try to get the lecture slides up on their screen so they can see them up close, some people do e-mail, surf the net, do whatever.â⬠He agrees with Tomarken that studentsââ¬â¢ personal use of computers in class is an issue that needs to be examined, ââ¬Å"through whether thatââ¬â¢s worse than day dreaming I donââ¬â¢t know.â⬠Need for University Support Support by the University for the use of technology is also critical. Bringing technology into the classroom uses resources ranging from computers to classrooms to graduate assistants, and university wide coordination is essential for ensuring an effective learning environment for students. ââ¬Å"One element that is essential is support in the form of graduate students to help students with technology,â⬠Smithey says. ââ¬Å"It is impossible for one faculty member to support an entire class of students in creating innovative ways to use technology. You can continue to use CDs that you have in your own library, you can continue to connect to the Internet from the classroom, but additional faculty support is necessary to take technology use to the next level of requiring our students to use technology in a way that prepares them for using it in the future classrooms.â⬠Physical facilities are also important. Keeping the technology in working order is crucial but so are other issues such as ensuring a classroomââ¬â¢s physical design supports the best possible use of the technology. ââ¬Å"You have a very real problem if you have big nice screens and nice projectors but the screen is in front of the white board; if you want to write and have slides at the same time, itââ¬â¢s difficult if not impossible,â⬠Owens says. Moving Forward with Technology As the University moves towards an increasingly coordinated approach to the use of technology, several effortsà are underway at Vanderbilt to determine just how technology can be used to most effectively enhance learning. One effort is the VaNTH Center in Bioengineering Educational Technologies, a joint effort between Vanderbilt, Harvard University, University of Texas, and Northwestern. Among is several priorities is research into the value of technology, such as web-based education for teaching bioengineering. The research team is collaborating with specialists from the Learning Technology Center at Peabody and with the Institute for Software Integrated Systems (ISIS). ââ¬Å"Itââ¬â¢s recognized that bioengineering teaching materials are not very well developed and there is not a broad consensus on bioengineering curricula,â⬠says Thomas R. Harris, chair of Vanderbiltââ¬â¢s Department of Biomedical Engineering. ââ¬Å"We need a new way to look at bioengineering education. Why not use the modern methods that weââ¬â¢ve been developing in the learning sciences and learning technology, and really take a look at this from an entirely new point of view?â⬠The result is a $10 million NSF grant for Vanderbilt and its academic partners to develop a new curriculum in bioengineering, one that utilizes fundamental principles of learning science and ââ¬Å"is driven by technology, web based technology, simulations, slides, interactive systems, and tutoring and homework systems,â⬠Harris says. Although the grant focuses on the development of bioengineering, the collaboration between Peabodyââ¬â¢s Learning Technology Center and the Department of Biomedical Engineering has the potential to benefit students and faculty in all areas of the university because part of the research involves determining exactly which technological tools best enhance learning. ââ¬Å"One of the things of concern is that in higher education a lot of people are very critical of technology as being just a waste of time and money and so forth. Well, is that right or not?â⬠Harris asks. ââ¬Å"If a particular piece of learning technology is no good, weââ¬â¢re going to be happy to identify it as such. Weââ¬â¢d like to be able to guide the decision ofà educators and administrators about what is effective and what is not. And if you can begin to show major advances for some of this, then the justification for the additional investment is there.â⬠Another potential benefit this research offers is the opportunity to develop a much better understanding of the kinds of resources required for faculty to use technology in ways that consistently enhance student learning. ââ¬Å"There could be a small investment that could dramatically increase our effectiveness if we do it right,â⬠Harris says. ââ¬Å"Thatââ¬â¢s the key. We have to know how to do it and what to do. So if we get in and do research in this center and we find out some of the mistakes and things you ought to avoid, I think that you could tailor a system that could dramatically increase effectiveness and make faculty more effective.â⬠Harris believes that effective use of technology has the potential to transform the student-teacher relationship at the undergraduate level. ââ¬Å"I think weââ¬â¢re going to see a revolution in the interaction between students and teachers,â⬠he says. ââ¬Å"I think the relationship to undergraduates is going to become more like the relationship to graduate students in the sense of more direct personal interaction. By using technology weââ¬â¢re going to be able to use the power of the person, who they are and what they are. The teacherââ¬â¢s inspirational role is going to become much greater.â⬠Like Harris, Professors Owens, Smithey and Tomarken also see new opportunities to use technology in the classroom. David Owens wants to pursue his interest in virtual teams by developing a course run exclusively on the Internet. Andy Tomarken plans to continue integrating computer interaction with more traditional classroom activities. Margaret Smithey would like to use videoconference links to allow her students to observe a live classroom setting and then interview the teacher afterward, all via video. In each case, these faculty members, like many others across the University, will continue to use technology to challenge both themselves and their students.
Saturday, November 9, 2019
Production and Inventory, Material Requirements Planning
Production and Inventory, Material Requirements Planning Free Online Research Papers Since before the Industrial Revolution there had been a need for a better inventory control system. In times before, people would use a system of either ordering their materials beforehand or by ordering their materials as needed. The problem with this was either there would be too much inventory or too little inventory to meet the demand needed. Large quantities of inventory can be very costly for purposes of warehousing and deterioration of the material (e.g. food spoilage, animal infestation, etc). Secondly, the cost of waiting for inventory as in a pull system can be costly as well. The loss of customers for the wait of the final product can be very detrimental to the business as well as the supplier of raw material. Thirdly there is the matter of taxes. The cost of keeping inventory over the next fiscal year is considered an asset and therefore taxable. Furthermore, there was no way of linking the various structures within the organization. But as the internet grows in popularity every day, so too does electronic commerce. Electronic commerce, simply put, is the exchange of money for goods and services via electronic means. In other words, electronic commerce is usually when you purchase something off of the internet. Electronic commerce is often referred to as e-commerce, or e-business. Before controlled inventory and e-commerce, in order to purchase something, the purchaser would have to negotiate with the supplier. Then the purchaser would have to go to the accounting department (assuming that the authority was given to the purchaser to buy the material) to procure the money for the transaction. Then the accountant would send an order to the receiving warehouse. The receiving warehouse would make sure there was room, and then go to the mail department. The process goes on and on and therefore would create a huge amount of paperwork to accompany each transaction within an organization. So until the 1950s and 1960s, the technology did not exist to be able to eliminate such problems with inventory like this. So in the 1970s a new system was introduced called MRP. Material requirements planning (MRP) is a computerized inventory control and production planning system. This model integrates production, purchasing, and inventory management of interrelated products. The MRP model was based upon three distinct principles: the dependence of demand, the netting of inventory and the expected receipt of open orders such as on-hand inventory, and time phasing (i.e. lead times). These three items are very important to the proper use of an MRP system. They are the foundations for the implementation of the MRP system. For example, the dependence upon demand is very important in the MRP model. Demand is varied in any type of business, but with a surplus of available inventory to meet the demand it would eliminate the loss of customers. Also, the use of an MRP model helps to determine w would link the various departments so that interaction between the organizations departments would become necessary. Externally, (SCM, or supply chain management) the company would have to begin to see their suppliers, distributors, and retailers as partners instead of separate entities. By doing this, an organization would not only be able to access inventory easier, but they would be able to track their shipments easier. With the use of this model, companies can begin to eliminate unneeded time and money that would not be considered value-added processes. The major problems with these two models are that it takes a lot of organization internally and externally. For example, if a supplier is not willing to share their trade secrets or is unwilling to go through the process of incorporating an ERP system into their productions, then the system may not work effectively. Another problem with this model is that it would require extensive training of managers and employees in every functional area. The third principle is what helps to try and decrease lead times. Lead time, the time it takes to finished good to reach a customer from the raw material supplier to the retailer, emphasizes the practice of keeping a relatively short wait for a customers goods. The MRP model also uses three inputs to implement the entire strategy. The first input is the master production schedule (MPS). The MPS thus becomes the stepping-stone for which the entire MRP model is based. The next input is the Bill of Materials (BOM). The BOM is a means of simplifying the requisitioning process where a large number of frequently needed line items are involved. The third input is the file that contains information on inventories, open orders, and lead times so that the quantity and timing of orders can be calculated. The third input is very important because it puts the entire process on a time constraint. Thus limiting the amount of time used in the production of the final product, this is an important aspect for any company. Thus in the 1980s the need for a new inventory control system were in order. MRP-2 (Material Resource Planning) was first introduced in the 1980s and variations of it are still used today. MRP-2 included expansion into incorporation as such things as demand, supply, accounting, cash-flow analysis, forecasting, production planning, capacity planning, purchasing, and other areas of the inventory control system. All of these things proved invaluable to the MRP-2 system because it compensated for many areas that the first MRP model neglected. Furthermore, the idea of feedback was introduced to the MRP-2 to help forecast the demand of consumers. Research Papers on Production and Inventory, Material Requirements PlanningRiordan Manufacturing Production PlanThe Project Managment Office SystemDefinition of Export QuotasBionic Assembly System: A New Concept of SelfIncorporating Risk and Uncertainty Factor in CapitalAnalysis of Ebay Expanding into AsiaOpen Architechture a white paperPETSTEL analysis of IndiaQuebec and CanadaGenetic Engineering
Wednesday, November 6, 2019
Introduction of Information Security Systems Cis4385 Essay Example
Introduction of Information Security Systems Cis4385 Essay Example Introduction of Information Security Systems Cis4385 Essay Introduction of Information Security Systems Cis4385 Essay 1. Which if the following IPv6 address type is assigned to multiple interfaces but packets will only be delivered to one? a. Multicast b. Anycast c. Unicast d. Broadcast Grade:1 User Responses:b. Anycast Feedback:a. An anycast address is assigned to a group of interfaces on multiple nodes. Packets are delivered to the ââ¬Å"firstâ⬠interface only. 2. Routers operate at which OSI layer? a. Physical b. Transport c. Network d. Session Grade:1 User Responses:c. Network Feedback:a. Routers operate at the network layer making routing decisions based on IP addresses. 3. Which of the following is NOT a private IPv4 address? Choose all that apply. a. 192. 168. 5. 60 b. 172. 25. 6. 4 c. 10. 0. 6. 5 d. 26. 68. 6. 1 Grade:1 User Responses:d. 26. 68. 6. 1 Feedback:a. The private IP address ranges are as follows. IP Class Assigned Range Class A 10. 0. 0. 0-10. 255. 255. 255 Class B 172. 16. 0. 0-172. 31. 255. 255 Class C 192. 168. 0. 0-192. 168. 255. 255 4. What is a server that evaluates Internet requests from LAN devices against a set called? a. Proxy b. Firewall c. Load balancer d. NAT server Grade:1 User Responses:a. Proxy Feedback:a. A server that evaluates Internet requests from LAN devices against a set of rules is called a proxy server. NAT servers perform private to public address translation; load balancers manage traffic between cluster hosts; and a firewall filters traffic based on access control lists. 5. Which type of device maintains awareness of the status of connections, thereby preventing IP spoofing attacks? a. Stateless packet filtering firewall b. Stateful packet filtering firewall c. NAT filter d. Application-level gateway Grade:1 User Responses:b. Stateful packet filtering firewall Feedback:a. A stateful packet filtering firewall is one that monitors the state of each connection by examining the header of each packet. A stateless packet filtering firewall does not do this. NAT filters perform only private-to-public address translation. An application-level gateway provides protection to a specific application such as FTP. 6. Which of the following firewall services works at the session layer of the OSI model? a. Application layer gateway b. Stateful filtering c. NAT d. Circuit-level gateway Grade:0 User Responses:c. NAT Feedback:a. Circuit-level gateways work at the Session Layer of the OSI model and apply security mechanisms when a TCP or UDP connection is established; they act as a go between for the Transport and Application Layers in TCP/IP. After the connection has been made, packets can flow between the hosts without further checking. Circuit-level gateways hide information about the private network, but they do not filter individual packets. 7. Which of the following are the two main functions of a proxy server? a. Caching of web pages b. NAT c. Domain authentication d. DHCP Grade:1 User Responses:a. Caching of web pages,c. Domain authentication Feedback:a. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time. b. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time. 8. Which of the following devices can detect but not prevent attacks across the entire network? a. NIDS b. Host-based IDS c. NIP S d. Protocol Analyzer Grade:1 User Responses:a. NIDS Feedback:a. Network Intrusion Detection Systems (NIDS) detect but do not prevent attacks across the entire network. Host-based IDS can protect only the host on which it is installed. Network Intrusion Protection Systems (NIPS) can detect and prevent attacks across the entire network. A Protocol Analyzer can capture traffic but not act upon it. 9. When a NIPs blocks legitimate traffic, what is it known as? a. False negative b. True negative c. False positive d. True positive Grade:1 User Responses:c. False positive Feedback:a. A blocking of traffic is a positive action, and when it is in response to legitimate traffic, it is considered a false action; thus it is a false positive. A false negative would be when an action is NOT taken on traffic that is not legitimate. The other two options are normal actions; a true negative is the allowing of legitimate traffic, whereas a true positive is the blocking of illegitimate traffic. 10. Which of the following types of NIPS reacts to actions that deviate from a baseline? a. Signature-based b. Heuristic c. Anomaly-based d. Bit blocker Grade:1 User Responses:c. Anomaly-based Feedback:a. Anomaly-based NIPS recognizes traffic that is unusual and reports it. Signature-based NIPs are configured with the signatures of attacks. Heuristics looks for patterns in the traffic, whereas bit blocker is a not a type of NIPs. 1. Which of the following systems attempt to stop the leakage of confidential data, often concentrating on communications? a. DHCP b. DNS c. DLP d. STP Grade:1 User Responses:c. DLP Feedback:a. Data loss prevention (DLP) systems are designed to protect data by way of content inspection. They are meant to stop the leakage of confidential data, often concentrating on communications. As such, they are often also referred to as data leak prevention (DLP) devices, information leak prevention (ILP) devices, and extrusion prevention systems. Regardless, they are intended to be used to keep data from leaking past a computer system or network and into unwanted hands. 12. When a company buys fire insurance they are ____________ risk. a. accepting b. avoiding c. transferring d. reducing Grade:1 User Responses:c. transferring Feedback:a. It is possible to transfer some risk to a third-party. An example of risk transference (also known as risk sharing) would be an organization that purchases insurance for a group of servers in a datacenter. The organization still takes on the risk of losing data in the case of server failure, theft, and disaster, but transfers the risk of losing the money those servers are worth in the case they are lost. 13. Which of the following processes block external files that use JavaScript or images from loading into the browser? a. URL filtering b. Content filtering c. Malware inspection d. Blacklists Grade:1 User Responses:b. Content filtering Feedback:a. Content filtering is a process that blocks external files that use JavaScript or images from loading into the browser. URL filtering blocks pages based on the URL. Malware inspection looks for malware based on a signature file, and blacklists are items to be denied by spam filters. 14. Which of the following actions should NOT be taken for the default account on a network device? a. Delete it. b. Change the password. c. Disable it. d. Leave it as is. Grade:1 User Responses:d. Leave it as is. Feedback:a. The default account has a well-known username and password, so it should be either deleted or disabled, or at a minimum its password should be changed. 15. Firewall rules are typically based in all but which of the following? a. IP addresses b. MAC addresses c. Port numbers . Content type Grade:1 User Responses:d. Content type Feedback:a. Firewall rules are typically based on IP addresses, MAC addresses, or port numbers, but they cannot filter for content. 16. Which of the following is the target of a double tagging attack? a. VPNs b. VLANs c. Collision domains d. DMZs Grade:1 User Responses:b. VLANs Feedback:a. A double tagging attack can enabl e the attacker to view traffic from multiple VLANs. 17. A network created to allow access to resources from the Internet, while maintaining separation from the internal network is called a ______? a. VPN b. VLAN c. Honeypot d. DMZ Grade:1 User Responses:d. DMZ Feedback:a. When talking about computer security, a Demilitarized Zone (DMZ) is a special area of the network (sometimes referred to as a subnetwork) that houses servers which host information accessed by clients or other networks on the Internet, but which does not allow access to the internal network. 18. How can access to the remote management of a router be protected? a. Content filtering b. ACLs c. Firewalls d. IPS Grade:0 User Responses:c. Firewalls Feedback:a. Remote access to a router is usually done via Telnet or SSH. The port used (vty line) can be secured using an access control list. The other options can all be used to help protect routers but not access the remote management function. 19. You need to allow access from your network to all web sites. What port numbers should be opened in the firewall? Choose all that apply. a. 25 b. 443 c. 80 d. 119 e. 22 f. 23 Grade:1 User Responses:c. 80 Feedback:a. HTTP and HTTPS are the two services you need to allow access to use ports 80 and 443 respectively. 20. Which of the following mitigation techniques can prevent MAC flooding? a. Secure VLANs b. Prevent ICMP responses c. 802. 1x d. 802. 1q Grade:1 User Responses:c. 802. 1x Feedback:a. MAC flooding, which involves overwhelming the memory of the switch with MAC frames sourced from different MAC addresses, can be prevented by requiring authentication on each port through 802. 1x. Secure VLANs cannot prevent this because the frames donââ¬â¢t need to enter a VLAN to cause the problem. ICMP is at Layer 3, these frames are at Layer 2, and 802. 1q is a VLAN tagging protocol that does not prevent frames from entering the switch through access ports. 21. Which of the following attacks cannot be mitigated with a flood guard? a. Smurf attack b. Fraggle c. Teardrop attack d. Session theft Grade:1 User Responses:d. Session theft Feedback:a. The smurf, fraggle, and teardrop attacks all involve sending a flood of packets to a device, using different types of malformed packets. A session theft attack is when a session cookie is stolen and used to authenticate to a server. 22. Loop protection is designed to address problems that occur with which device? a. Switch b. Hub c. Router d. Firewall Grade:0 User Responses:b. Hub Feedback:a. Loops occur when switches have redundant connections causing a loop. Loop guard (or loop protection) can prevent loops on the switch. 23. When creating an ACL which of the following statements is NOT true? a. The order of the rules is important for proper functioning b. You must include a deny all statement at the end of the rule set for proper functioning c. The more specific rules should be placed at the beginning of the rule list d. Once created, the ACL must be applied to an interface Grade:1 User Responses:b. You must include a deny all statement at the end of the rule set for proper functioning Feedback:a. There is an implied deny all statement at the end of each ACL and it is not required to include one. 24. Which of the following is an example of insecure network bridging in a LAN? a. Laptop connected to a hotspot and an ad hoc network . Laptop connected to a wireless network and the wired LAN at the same time c. Router connected to two subnets d. PC connected with two NIC to the same LAN Grade:1 User Responses:b. Laptop connected to a wireless network and the wired LAN at the same time Feedback:a. When a laptop connects to a wireless network and the wired LAN at the same time, it can create a bridge between the two allowing access to the LAN. The other scenarios do not create a security problem for the LAN. 25. When the administrator creates a rule on the firewall to prevent FTP traffic, this is a type of __________rule. . implicit deny b. implicit allow c. explicit deny d. explicit allow Grade:1 User Responses:c. explicit deny Feedback:a. When traffic is specified to be prevented, it is an explicit deny. When it is denied simply because it was not specifically allowed, that is an implicit deny. 26. Network Access Control (NAC) is an example of_______________. a. role-based management b. rules-based management c. port-based access d. application layer filtering Grade:1 User Responses:b. rules-based management Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed. Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so on- effectively weeding out those who would perpetuate malicious attacks. 27. What type of device is required for communication between VLANs? a. Hub b. Switch c. Router d. Firewall Grade:1 User Responses:c. Router Feedback:a. Hosts in different VLANs are also in different subnets and routing must be performed for them to communicate. 28. Which of the following would be least likely to be placed in the DMZ? a. Web server b. DNS server c. Domain controller d. FTP server Grade:1 User Responses:c. Domain controller Feedback:a. All the options except a domain controller are often placed in the DMZ so they are accessible to the outside world. A DC however is sensitive and should NOT be placed in the DMZ. 29. Subnetting a network creates segmentation at which layer of the OSI model? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4 Grade:1 User Responses:c. Layer 3 Feedback:a. Subnetting a network creates segmentation using IP addresses, which is Layer 3. 30. What service is required to represent multiple private IP addresses with a single public IP address? a. NAT b. DHCP c. DNS d. DLP Grade:0 User Responses:a. NAT Feedback:a. Network Address Translation (NAT) is required to represent multiple private IP addresses with a single public IP address. The specific form of NAT required to represent multiple private IP addresses with a single public IP address is called Port Address Translation (PAT). 31. Which of the following is NOT a remote access protocol? a. MS-CHAP b. CHAP c. LDAP d. PAP Grade:1 User Responses:c. LDAP Feedback:a. Lightweight Directory Access Protocol is used for accessing directory services such as Active Directory. It is not used in remote access. All other options are remote access protocols. 2. Which of the following devices are susceptible to war dialing? a. Modems b. Firewalls c. Content filters d. Load balancers Grade:0 User Responses:a. Modems Feedback:a. Any devices that accept phone calls such as modems or PBX systems with remote phone access are susceptible to war dialing. 33. When computers are not allowed to connect to the network without proper security patches and virus updates, the network is using a form of _____________. a. PAT b. DAC c. NAC d. DMZ Grade:0 User Responses:d. DMZ Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed. Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so on- effectively weeding out those who would perpetuate malicious attacks. 34. Which of the following items do not need to be changed on a new router to ensure secure router management? a. IP address b. Administrator name c. Administrator password d. IOS version Grade:1 User Responses:d. IOS version Feedback:a. All the options except the IOS version can be set to defaults from the factory and should be changed because they are well known. 5. Which of the following is NOT an example of cloud computing? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1 User Responses:d. BaaS Feedback:a. Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) are all forms of cloud computing. 36. On which concept is cloud computing based? a. load balancing b. virtualization c. RAID d. DLP Grade:1 User Responses:b. vi rtualization Feedback:a. All forms of cloud computing use virtualization. 37. A three legged perimeter is a form of ______________. a. VPN b. DMZ c. NAT d. ACL Grade:1 User Responses:b. DMZ Feedback:a. A three-legged perimeter is a firewall or server with three NICs: one pointed to the LAN, one to the Internet, and one to the DMZ. 38. Which of the following is NOT a benefit provided by subnetting? a. It increases security by compartmentalizing the network. b. It is a more efficient use of IP address space. c. It reduces broadcast traffic and collisions. d. It eases administration of the network. Grade:1 User Responses:d. It eases administration of the network. Feedback:a. Subnetting provides a number of benefits but easing administration is not one of them. 39. Which of the following is the result of implementing VLANs? . Larger broadcast domains b. Smaller collision domains c. Smaller broadcast domains d. Larger collision domains Grade:1 User Responses:c. Smaller broadcast domains Feedback:a. VLANs break up the network into subnets and as such result in smaller broadcast domains. 40. Which of the following services helps conserve public IP addresses? a. NAT b. DHCP c. DNS d. SLIP Grade:0 User Responses:c. DNS Feedback:a. By allowing the use of private IP addresses inside each network and by representing those groups of private IP addresses with a single public IP address, public IP addresses are conserved by NAT. 41. Which of the following remote access protocols are used with VPNs? Choose all that apply. a. PPTP b. PPP c. L2TP d. SLIP Grade:1 User Responses:c. L2TP,d. SLIP Feedback:a. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up. /b. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up. 42. Which of the following security protocols operates at the network layer of the OSI model? a. IPSec b. SSH c. SSL d. TLS Grade:1 User Responses:a. IPSec Feedback:a. One of the key features of IPSec is its operation at the network layer enabling it to protect any type of communication operating at the upper layers of the OSI model. 43. Which of the following are components of SNMP? Choose all that apply. a. NMS b. IPSec c. Agent d. CARP Grade:1 User Responses:b. IPSec,c. Agent Feedback:a. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates. /b. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates. 44. SSL is designed as a secure replacement for which of the following? a. PPP b. Telnet c. TLS d. SSH Grade:0 User Responses:d. SSH Feedback:a. SSL is designed as a secure replacement for Telnet, which transmits in clear text. 45. Which of the following protocols supersedes SSL? a. SSH b. TLS c. S/MIME d. EAP Grade:0 User Responses:a. SSH Feedback:a. TLS 1. 2, the latest version, is used when establishing an HTTPS connection and supersedes SSLv3. 46. The operation of which of the following protocols makes the SYN flood attack possible? a. IPX/SPX b. AppleTalk c. TCP/IP d. RIP Grade:1 User Responses:c. TCP/IP Feedback:a. TCP/IP uses a three-way handshake for its connection, and the SYN flood attack attempts to take advantage of the operation of this connection operation. 47. Which of the following provides secure web access? a. SFTP b. HTTP c. HTTPS d. SSH Grade:1 User Responses:c. HTTPS Feedback:a. HTTPS uses port 443 and is the standard for secure web access. 48. SCP is a secure copy protocol that uses the port of which other protocol for transfers? a. HTTPS b. SSH c. SSL d. FTPS Grade:0 User Responses:d. FTPS Feedback:a. Secure copy (SCP) is another example of a protocol that uses another protocol (and its corresponding port). It uses SSH and ultimately uses port 22 to transfer data. 49. Which of the following protocols is abused when a ping flood occurs? a. SNMP b. IGMP c. ICMP d. EIGRP Grade:0 User Responses:a. SNMP Feedback:a. Ping floods use ICMP echo request packets aimed at the target. 50. Which of the following security mechanisms are built into IPv6? a. IPSec b. SSL c. HTTPS d. EAP Grade:1 User Responses:a. IPSec Feedback:a. IPv6 has IPSec support built in. 51. What method is used by SSL to obtain and validate certificates? a. SPI b. PKI c. TLS d. EAP Grade:1 User Responses:b. PKI Feedback:a. SSL and TLS use a public Key Infrastructure (PKI) to obtain and validate certificates. 52. What port number does FTPS use to protect the transmission? a. 21 b. 88 c. 443 d. 445 Grade:0 User Responses:a. 21 Feedback:a. FTPS uses SSL or TLS over port 443 to make a secure connection. 53. Which of the following protocols uses port 22, normally used by SSH, to make a secure connection? a. FTPS b. SCP c. SFTP d. SSL Grade:0 User Responses:b. SCP Feedback:a. Secure FTP (SFTP) uses port 22, the port for SSH, which is why it is also sometimes called SSH FTP. 54. Which protocol uses ports 161 and 162? a. SMTP b. IMAP4 . SNMP d. IGMP Grade:0 User Responses:a. SMTP Feedback:a. SNMP is used to collect information about and make changes to devices on the network. It uses ports 161 and 162. 55. Which protocol uses the same port as HTTPS? a. SCP b. FTPS c. SFTP d. IMAP4 Grade:0 User Responses:c. SFTP Feedback:a. FTP secure (FTPS) uses port 443, which is also used by HTTPS. 56. Which protocol uses po rt 69? a. SCP b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:c. TFTP Feedback:a. TFTP uses port 69. 57. What port number is used by Telnet? a. 80 b. 443 c. 21 d. 23 Grade:1 User Responses:d. 23 Feedback:a. Port 23 is used by Telnet. 8. Which port does HTTP use? a. 80 b. 443 c. 21 d. 23 Grade:0 User Responses:b. 443 Feedback:a. HTTP uses port 80. 59. Which port does SCP use to transfer data? a. 80 b. 22 c. 21 d. 23 Grade:0 User Responses:c. 21 Feedback:a. SCP uses SSH and thus port 22 to transfer data. 60. Which protocol uses port 443? a. HTTPS b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:a. HTTPS Feedback:a. HTTPS uses port 443. 61. Which two protocols use port 22? a. HTTPS b. FTPS c. SSH d. SCP Grade:2 User Responses:c. SSH,d. SCP Feedback:a. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port. b. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port. 62. Which ports does the NetBIOS protocol uses? Choose all that apply. a. 138 b. 139 c. 137 d. 140 Grade:3 User Responses:a. 138,b. 139,c. 137 Feedback:a. The NetBIOS protocol uses ports 137 through 139. /b. The NetBIOS protocol uses ports 137 through 139. /c. The NetBIOS protocol uses ports 137 through 139. 63. What protocol uses port 53? a. HTTPS b. FTPS c. SSH d. DNS Grade:0 User Responses:b. FTPS Feedback:a. DNS uses port 53. 64. Which port number does RDP use? a. 3389 b. 1723 c. 1701 d. 140 Grade:1 User Responses:a. 3389 Feedback:a. Port 3389 is used for Remote Desktop (RDP). 65. What protocol uses port 25? a. HTTPS b. SMTP c. SSH d. DNS Grade:1 User Responses:b. SMTP Feedback:a. SMTP uses port 25. 66. Which of the following statements is true regarding WPA and WPA2? (Choose all that apply. ) a. WPA uses 256-bit encryption. b. WPA2 uses 128-bit encryption. c. WPA uses TKIP. d. WPA2 uses AES. Grade:2 User Responses:c. WPA uses TKIP. ,d. WPA2 uses AES. Feedback:a. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES. /b. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES. 67. Which statement is NOT true with regard to WPA2? a. Uses AES encryption b. Meets requirements of 802. 11i c. Uses TKIP encryption d. Uses 256 bit encryption Grade:1 User Responses:c. Uses TKIP encryption Feedback:a. WPA uses TKIP but WPA2 uses AES. 68. Which of the following is the security provided in the original 802. 11 standard? a. WPA b. WPA2 c. WEP d. CCMP Grade:1 User Responses:c. WEP Feedback:a. Wired Equivalent Privacy (WEP) is the security provided in the original 802. 11 standard. 69. What is the authentication system that calls for a supplicant, authenticator, and authentication server called? . EAP b. WPA c. WPA2 d. WEP Grade:1 User Responses:a. EAP Feedback:a. Extensible Authentication Protocol (EAP) is an authentication system that calls for a supplicant, authenticator, and authentication server. 70. Which of the following implementations of EAP requires certificates on the client and the server? a. EAP-FAST b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:d. EAP- TLS Feedback:a. EAP-TLS requires certificates on the client and the server. 71. Which of the following versions of EAP is Cisco proprietary? a. LEAP b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:a. LEAP Feedback:a. Lightweight EAP is a version that works only on Cisco devices unless the device is from a partner that participates in the Cisco Compatible Extensions program. 72. Why are MAC filters not effective in preventing access to the WLAN? a. The MAC addresses of allowed devices are contained in the beacon frames sent by the AP. b. The MAC addresses of allowed devices are contained in any frames sent by the allowed device. c. The administrative effort to maintain the MAC list is prohibitive. d. If the user changes his MAC address, the filter will disallow entry. Grade:1 User Responses:b. The MAC addresses of allowed devices are contained in any frames sent by the allowed device. Feedback:a. The MAC addresses of allowed devices are contained in any frames sent by the allowed device and can be seen by those using wireless protocol analyzers. The MAC address can then be spoofed for entry. 73. Which of the following frame types contain the SSID? (Choose all that apply. ) a. Beacon frames b. Data frames c. Association frames d. Authentication frames Grade:3 User Responses:b. Data frames,c. Association frames,d. Authentication frames Feedback:a. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /b. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /c. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. 74. TKIP was designed to correct the shortcomings of which of the following? a. EAP b. WPA c. WEP d. WPA2 Grade:1 User Responses:c. WEP Feedback:a. TKIP was designed to correct the shortcomings of WEP. It was a temporary solution for use until the 802. 1x standard was completed. 75. Which of the following encryption protocols is used with WPA2? . TKIP b. CCMP c. WEP d. DES Grade:1 User Responses:b. CCMP Feedback:a. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol used with WPA2. It addresses the vulnerabilities of TKIP and meets requirements of IEEE 802. 11i. 76. Which antenna types would be best for shaping the signal away from the front of the bu ilding for security purposes while still providing coverage in the other part of the building? (Choose all that apply. ) a. Yagi b. Omni c. Parabolic dish d. Semidirectional Grade:2 User Responses:a. Yagi,d. Semidirectional Feedback:a. You can use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario. /b. You can use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario. 77. How can you keep the existing radiation pattern of the antenna while reducing the coverage area? a. Increase the power of the transmitter. b. Decrease the power of the transmitter. c. Change the polarity of the antenna. d. Remove one of the attenuators from the line. Grade:1 User Responses:b. Decrease the power of the transmitter. Feedback:a. Reducing the power level maintains the radiation pattern while making the area of radiation smaller. 78. What organization created WPA? a. FCC b. Wi-Fi Alliance c. IEEE d. ISO Grade:1 User Responses:b. Wi-Fi Alliance Feedback:a. The Wi-Fi Alliance created WPA to address the weaknesses of WEP. 79. To which standard is WPA2 designed to adhere? a. 802. 16 b. 802. 11f c. 802. 11i d. 802. 11e Grade:1 User Responses:c. 802. 11i Feedback:a. WPA2 is designed to adhere to the 802. 11i security standard. 80. Which of the following is the weakest form of security? a. TKIP b. WPA c. WEP d. EAP Grade:1 User Responses:c. WEP Feedback:a. WEP is the weakest form of security. It has been cracked and is not suitable for Enterprise WLANs. 81. A ______________ attack intercepts all data between a client and a server. a. DDoS b. Man-in-the-middle c. Replay d. Smurf Grade:1 User Responses:b. Man-in-the-middle Feedback:a. Man-in-the-middle is a type of active interception. If successful, all communications now go through the MITM attacking computer. 82. When a group of compromised systems attack a single target it is a called a _______________ attack. a. DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1 User Responses:a. DDoS Feedback:a. A distributed denial-of-service attack occurs when a group of compromised systems launches a DDoS attack on a single target. 83. When valid data transmissions are maliciously or fraudulently repeated, it is called a _______________ attack. a. DDoS b. man-in-the middle c. replay d. smurf Grade:1 User Responses:c. replay Feedback:a. When valid data transmissions are maliciously or fraudulently repeated, it is a called a replay attack. 84. What attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork? a. DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1 User Responses:d. Smurf Feedback:a. A smurf attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork. The ICMP request is sent to a broadcast address. When all hosts receive the ICMP broadcast request, these host send ICMP replies to the source address, which has been set to the address of the target. 85. Changing your MAC address to that of another host is called ___________________. a. spear phishing b. spoofing c. pharming d. vishing Grade:1 User Responses:b. spoofing Feedback:a. Spoofing is when an attacker tails the IP or MAC address of another computer. 86. Which of the following is more an aggravation than an attack? a. Spear phishing b. Spoofing c. Spam d. Vishing Grade:1 User Responses:c. Spam Feedback:a. Spam or unwanted email is more an aggravation than an attack. 87. Which of the following uses instant messaging as its vehicle? a. Spim b. Spoofing c. Phishing d. Vishing Grade:1 User Responses:a. Spim Feedback:a. Spam Over Instant Messaging (SPIM) uses IM to deliver the spam. 88. When VoIP phone calls are used in the pursuit of social engineering, it is called__________. a. spim b. poofing c. phishing d. vishing Grade:1 User Responses:d. vishing Feedback:a. Vishing is phishing performed with VoIP calls, which are harder to trace than regular calls. 89. What type of attack is an advanced scan that tries to get around firewalls and look for open ports? a. DDoS b. Man-in-the-middle c. Xmas attack d. Smurf Grade:1 User Responses:c. Xmas attack Feedback:a. Usually using Nmap, the Xmas attack is an advanced scan that tries to get around firewalls and look for open ports. 90. __________________ is when an attacker redirects one websiteââ¬â¢s traffic to another bogus and possibly malicious website. a. DDoS b. Pharming c. Xmas attack d. Smurf Grade:1 User Responses:b. Pharming Feedback:a. Host files and vulnerable DNS software can also be victims of pharming attacks. Pharming is when an attacker redirects one websiteââ¬â¢s traffic to another bogus and possibly malicious website. Pharming can be prevented by carefully monitoring DNS configurations and host files. 91. ___________ is when a person that is not normally authorized to a server manages to get administrative permissions to resources. a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:1 User Responses:d. Privilege escalation Feedback:a. Privilege escalation is when a person that is not normally authorized to a server manages to get administrative permissions to resources. 92. Which problem is the most difficult to contend with? a. Malicious insider threat b. Fraggle attack c. Distributed denial-of-service d. Whaling Grade:1 User Responses:a. Malicious insider threat Feedback:a. Because the attacker already is inside the network with company knowledge, a malicious insider threat is the most difficult to contend with. 93. What type of attack can DNS poisoning lead to? a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:0 User Responses:c. Spear phishing Feedback:a. Pharming attacks lead users from a legitimate website to a malicious twin. The easiest way to do this is to poison the DNS cache so that the DNS server sends them to the malicious site. 94. Strong input validation can help prevent ____________________. a. bluesnarfing b. SQL injection c. session highjacking d. header manipulation Grade:0 User Responses:c. session highjacking Feedback:a. SQL injection attacks user input in web forms that is not correctly filtered. This can be prevented with input validations. 95. LDAP injection is an attack on __________________servers. . SQL b. directory c. web d. email Grade:1 User Responses:b. directory Feedback:a. Lightweight Directory Access Protocol is a protocol used to maintain a directory of information such as user accounts or other types of objects. 96. XML injection can be prevented with __________________. a. IDS b. IPS c. input validation d. complex passwords Grade:0 User Responses:d. complex passwords Feedback:a. The best way to protect against this (and all code injection techniques for that matter) is to incorporate strong input validation. 97. The .. / attack is also known as ________________. a. irectory traversal b. SQL injection c. session highjacking d. header manipulation Grade:1 User Responses:a. directory traversal Feedback:a. Directory traversal, or the .. / (dot dot slash) attack is a method to access unauthorized parent (or worse, root) directories. 98. _____________ is when commands and command syntax are entered into an application or OS. a. Directory traversal b. Command injection c. Command highjacking d. Code manipulation Grade:1 User Responses:b. Command injection Feedback:a. Command injection is when commands and command syntax are entered into an application or OS. 99. Buffer overflows operate against the _________ of the computer. a. NIC b. disk c. CPU d. memory Grade:1 User Responses:d. memory Feedback:a. A buffer overflow is when a process stores data outside of the memory that the developer intended. 100. What is the difference between an XSS and XSRF attack? a. The XSS attack exploits the trust a userââ¬â¢s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a userââ¬â¢s browser. b. The XSFR attack exploits the trust a userââ¬â¢s browser has in a website, whereas the XSS attack exploits the trust that a website has in a userââ¬â¢s browser. . The XSS attack creates a buffer overflow on the website, whereas the XSFR attack creates a buffer overflow on the client. d. The XSS attack creates a buffer overflow on the client, whereas the XSFR attack creates a buffer overflow on the website. Grade:1 User Responses:a. The XSS attack exploits the trust a userââ¬â¢s browser has in a website, whereas t he XSFR attack exploits the trust that a website has in a userââ¬â¢s browser. Feedback:a. The XSS attack exploits the trust a userââ¬â¢s browser has in a website. The converse of this: the XSRF attack exploits the trust that a website has in a userââ¬â¢s browser. In this attack (also known as a one-click attack), the userââ¬â¢s browser is compromised and transmits unauthorized commands to the website. 101. _______________ are placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place. a. Landing spots b. Backdoors c. Hotspots d. Code heels Grade:1 User Responses:b. Backdoors Feedback:a. Backdoors are placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place. 102. An XSS attack is also called a(n) __________________ attack. a. Zero day b. Command injection . Xmas d. Cross site scripting Grade:1 User Responses:d. Cross site scripting Feedback:a. XSS attacks, also called cross site scripting attacks, exploit the trust a userââ¬â¢s browser has in a website through code injection, often in webforms. 103. ______________can be used by spyware and can track people without their permission. a. MAC addresses b. Cookies c. IP addresses d. Attachments Grade:1 User Responses:b. Cookies Feedback:a. Cookies are text files placed on the client computer that store information about it, which could include your computerââ¬â¢s browsing habits and possibly user credentials. 104. Which of the following attachments is the riskiest to open? a.. exe b.. pdf c.. doc d.. txt Grade:1 User Responses:a.. exe Feedback:a. A . exe or executable file is one that contains a program that will do something, perhaps malicious to the computer. 105. Stolen cookies can be used to launch a(n) ____________________. a. XSS attack b. SQL injection c. session highjack d. header manipulation Grade:1 User Responses:c. session highjack Feedback:a. Session cookies authenticate you to a server and can be used to highjack your session. 106. Header manipulation alters information in ______________ headers. a. LDAP b. file c. HTTP . SQL Grade:1 User Responses:c. HTTP Feedback:a. Header manipulation alters information in HTTP headers and falsifies access. 107. An ActiveX control is an example of a(n) _________________. a. cookie b. add-on c. cipher d. virus Grade:1 User Responses:b. add-on Feedback:a. You can enable and disable add-on programs such as ActiveX controls in the Programs tab by clicking the Manage add-ons button in Internet Explorer. 108. When an attack targets an operating system vulnerability that is still unknown to the world in general, it is called a __________. a. P2P attack b. zero day attack c. whaling attack d. DDoS attack Grade:1 User Responses:b. zero day attack Feedback:a. A zero day attack targets an operating system vulnerability that is still unknown to the world in general. 109. __________________is a concept that refers to the monitoring of data in use, data in motion, and data at rest. a. DLP b. DHCP c. DEP d. DMS Grade:1 User Responses:a. DLP Feedback:a. Data Loss Prevention (DLP) is a concept that refers to the monitoring of data in use, data in motion, and data at rest. It does this through content inspection and is designed to prevent unauthorized use of data as well as prevent the leakage of data outside the computer (or network) that it resides. 10. Which form of DLP is typically installed in data centers or server rooms? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:c. Storage DLP Feedback:a. Storage DLP systems are typically installed in data centers or server rooms as software that inspect data at rest. 111. Which of the following is an example of d rive encryption? a. AppLocker b. BitLocker c. Windows defender d. Trusted Platform Module Grade:1 User Responses:b. BitLocker Feedback:a. To encrypt an entire hard disk, you need some kind of full disk encryption software. Several are currently available on the market; one developed by Microsoft is called BitLocker. 112. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is ____________ than software encryption. a. more difficult to crack b. easier to use than software encryption c. faster than software encryption d. can be used to calculate data other than encryption keys Grade:1 User Responses:c. faster than software encryption Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors. This means that they are used for encryption during secure login/authentication processes, during digital signings of data, and for payment security systems. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is faster than software encryption. 113. A _________________ is a chip residing on the motherboard that actually stores the encrypted keys. a. DLP b. DHCP c. DEP d. TPM Grade:1 User Responses:d. TPM Feedback:a. A Trusted Platform Module (TPM) chip is one residing on the motherboard that actually stores the encrypted keys. 114. Which of the following is NOT required to encrypt the entire disk in Windows? Choose all that apply. a. TPM chip or USB key b. A hard drive with two volumes c. HSM Module d. Cryptoprocessor Grade:2 User Responses:c. HSM Module,d. Cryptoprocessor Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encrypting the entire disk in Windows. /b. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encrypting the entire disk in Windows. 115. Probably the most important security concern with cloud computing is _______________. . less secure connections b. loss of physical control of data c. weak authentication d. bug exploitation Grade:1 User Responses:b. loss of physical control of data Feedback:a. Probably the most important security control concern is the physical control of data that is lost when an organization makes use of cloud computing. 116. Which of the following is NOT a solution to security issues surroundi ng cloud computing? a. Complex passwords b. Strong authentication methods c. Standardization of programming d. Multiple firewalls Grade:1 User Responses:d. Multiple firewalls Feedback:a. Solutions to these security issues include complex passwords, strong authentication methods, encryption, and standardization of programming. 117. Which form of DLP is typically installed on individual computers? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:a. Endpoint DLP Feedback:a. Endpoint DLP systems run on an individual computer and are usually software-based. They monitor data in use such as email communications and can control what information flows between various users. 118. Where could you disable the use of removable media on a computer? a. Device manager . BIOS c. Control panel d. Programs and features Grade:1 User Responses:b. BIOS Feedback:a. BIOS settings can be used to reduce the risk of infiltration including disabling removable media including the floppy drives and eSATA and USB ports. 119. What are two shortcomings of using BitLocker drive encryption? a. Weak encryption b. Expensive c. Performance suffers d. Shorter driv e life Grade:2 User Responses:c. Performance suffers,d. Shorter drive life Feedback:a. A drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well. /b. A drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well. 120. Which form of DLP is typically installed on the perimeter of the network? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solutions that are often installed on the perimeter of the network. They inspect data that is in motion. 121. Software as a service (SaaS) is a type of _____________ computing. a. HSM b. cloud c. role-based d. TPM Grade:1 User Responses:b. cloud Feedback:a. Software as a Service (SaaS) is the most commonly used and recognized example of cloud computing. SaaS is when users access applications over the Internet that are provided by a third party. 122. Which form of DLP inspects ONLY data in motion? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solutions that are often installed on the perimeter of the network. They inspect data that is in motion. 123. Which of the following is NOT an example of cloud services? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1 User Responses:d. BaaS Feedback:a. Examples of cloud services include Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). 124. When an electronic control suffers an error, reports the error, and shuts down, it is called_____________. a. Failopen b. Failsafe c. Failclose d. Failshut Grade:1 User Responses:b. Failsafe Feedback:a. When the control fails and shuts down, it is a failsafe. When it fails and leaves a vulnerable system, it is a failopen. 125. What should be the first thing you check when an intrusion has been detected? a. Firewall logs b. Server logs c. Workstation logs d. Security patches Grade:1 User Responses:a. Firewall logs Feedback:a. Logging is also important when it comes to a firewall. Firewall logs should be the first thing you check when an intrusion has been detected. You should know how to access the logs and how to read them. 126. Which log on a Windows server is where you could learn if Joe logged in today? a. Applications b. System c. Security d. DNS Grade:1 User Responses:c. Security Feedback:a. The security log contains entries about logins and access to resources both successful and unsuccessful. 127. Which of the following is NOT an example of physical security? a. Mantraps b. Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:b. Security logs Feedback:a. Security logs track activities on the network which is logical not physical security. 128. Which of the following is NOT a type of door lock? a. Cipher b. Keyed c. Cardkey d. Mantrap Grade:1 User Responses:d. Mantrap Feedback:a. A mantrap is a two door system designed to prevent tailgating. 129. Which of the following is NOT an example of operating system hardening? a. Disabling unnecessary services b. Removing the NIC c. Protecting management interfaces d. Password protection Grade:1 User Responses:b. Removing the NIC Feedback:a. Hardening the system should not reduce its functionality, and removing the NIC would do that. 130. Which of the following standards is often referred to as port-based security? a. 802. 1x b. 802. 11 c. 802. 11n d. 802. 1 Grade:1 User Responses:a. 802. 1x Feedback:a. 802. 1x enforces perimeter security by keeping the port of the station closed until authentication is complete. 131. In which type of monitoring is network traffic analyzed for predetermined attack patterns? a. Signature-based monitoring b. Anomaly-based monitoring c. Behavior-based monitoring d. Reactive-based monitoring Grade:1 User Responses:a. Signature-based monitoring Feedback:a. Network traffic is analyzed for predetermined attack patterns. These attack patterns are known as signatures. 132. A(n) __________________ uses baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems. a. NAT b. SPA c. SLA d. PSK Grade:1 User Responses:b. SPA Feedback:a. The security posture can be defined as the risk level to which a system, or other technology element, is exposed. Security Posture Assessments (SPA) use baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems. 133. Which of the following indicate a problem currently occurring? . Trends b. Baselines c. Alarms d. Averts Grade:1 User Responses:c. Alarms Feedback:a. Although alerts indicate an issue that MAY need attention, alarms indicate a problem currently occurring. 134. Which of the following are detection controls? (Choose all that apply. ) a. IDS b. IPS c. Video cameras d. Security guard Grade:2 User Responses:a. IDS,c. Video camera s Feedback:a. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it. /b. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it. 35. Which of the following is designed to prevent tailgating? a. Mantraps b. Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:a. Mantraps Feedback:a. Mantraps use double doors to prevent tailgating. 136. Which of the following is a proximity reader? a. a security card that transmits the location of the holder b. a device that tracks how close an individual is c. a security card reader that can read the card from a distance d. a card reader that locks the door when the holder is a certain distance from the door Grade:1 User Responses:c. security card reader that can read the card from a distance Feedback:a. These cards use radio waves to transmit to the reader. 137. By frequently updating systems and by employing other methods such as group policies and baselining, you _____________ the systems. a. brace b. harden c. virtualize d. hardline Grade:1 User Responses:b. harden Feedback:a. By frequently updating systems and by employing other methods such as group policies and baselining, you harden the system. 138. Installing service packs is a part of the ___________ process. a. baselining b. hardening c. scaling . security templating Grade:1 User Responses:b. hardening Feedback:a. Hardening the OS is accomplished through the use of service packs, patch management, hotfixes, group policies, security templates, and configuration baselines. 139. ______________ can be described as unauthorized WAPs that inadvertently enable access to secure networks. a. Rogue access points b. Evil twin c. War driver d. Phisher Grade:1 User Responses:a. Rogue access points Feedback:a. Rogue access points can be described as unauthorized wireless access points/routers that enable access to secure networks. They differ from an Evil twin in that an Evil twin is strategically placed for the purpose of accessing the network or performing a high jacking attack, whereas rogue access points generally may be placed by employees for their convenience. 140. Which wireless attacks include the introduction of radio interference? a. Rogue Access Point b. Evil twin c. War driver d. Bluesnarfing Grade:1 User Responses:b. Evil twin Feedback:a. The evil twin attack includes jamming the network to cause the stations to associate with the evil twin AP. 141. When executing the Evil twin attack, what value must match on the Evil twin and the legitimate AP? . IP address b. SSID c. MAC address d. Admin password Grade:1 User Responses:b. SSID Feedback:a. The Evil twin attack includes jamming the network to cause the stations to associate with the Evil twin AP. The stations will not roam to the Evil twin unless the SSID is the same as the legitimate AP. 142. ________________ is when a person attempts to access a wireless network, usually while driving in a vehicle. a. War chalking b. Radiophishing c. War driving d. Bluesnarfing Grade:1 User Responses:c. War driving Feedback:a. War driving is when a person attempts to access a wireless
Subscribe to:
Comments (Atom)