MSIS 2103 Exam 1 CH 1-4 Questions And Answers With
Complete Study Tests
Identify two key management responsibilities in implementing successful information systems ANS 1) people;
the most important element of info systems. They need to train employees, motivate them, and help them gain an
understanding of the importance of the information system.
2) Technology Infrastructure; Resources include hardware, software, databases, networks, facilities, and third-party
services. Required to meet customers', suppliers', key business partners', regulatory agencies', and employees'
needs. Forms the foundation of every computer-based information system
State 3 reasons why organizations employ the Leavitt’s Diamond Model to introduce new systems into the
workplace ANS lower stress, encourage teamwork, and increase successful implementation
describe 4 fundamental information system types based on their sphere of influence ANS Personal
Workgroup
Enterprise
Interorganizational
discuss the traditional and contemporary view of the role that information systems play in an organizations value
chains ANS Traditional: Organizations use info systems to control and monitor processes and to ensure
effectiveness and efficiency... (IS is external to the supply chain and serve to control it) // Contemporary: Info
systems are just a part of the process itself... it plays an integral role in the process, whether providing input, aiding
public transformation, or producing output
identify 4 benefits of creating a strategic plan ANS Provides a framework and clearly defined direction to guide
decision making, Provides effective use of organization's resources, Allows organization to be proactive, Improves
communication
identify 4 drivers that helps set the information system organizational strategy ANS technology innovations,
innovative thinking, corporate strategy, business unit strategy
identify 3 ways the IS organization can be perceived by the rest of the organization, and how each can influence the
IS strategy ANS cost center, business partner, and game changer
, identify 6 non-technical skills needed to be an effective information system worker ANS Data analysis, Mobile
device application design/build skills, Traditional programming and application development, Technical support
expertise, Project management, Networking and cloud computing
identify 2 benefits of obtaining a certification in an IS subject area ANS new career possibilities and potential
increase in salary
state 4 reasons why computer incidents have become so prevalent ANS increasing computer system complexity
BYOD policies
using software with known vulnerabilities
increasing sophistication of those who would do harm
identify 4 classes of perpetrators most likely to initiate a cyberattack ANS careless insider, malicious employees,
cybercriminal, hacktivist, cyberterrorist, lone wolf attacker
define the term attack vector ANS the technique used to gain unauthorized access to a device or a network
Identify at least three commonly used attack vectors. ANS blended threat, phishing, virus
Identify five cyberthreats that pose a serious threat for organizations. ANS ransomware, distributed denial of
service attacks, botnet, data breach, cyberrespionage
Identify five consequences of a successful cyberattack. ANS direct cost, business disruption, legal
consequences, recovery cost, reputation damage
Identify five federal laws that address computer crime. ANS Computer Fraud and Abuse Act
Fraud and Related Activity inConnection with Access Devices Statute
Identity Theft and AssumptionDeterrence Act
Stored Wire and Electronic Communications and Transactional Records Access Statutes
USA Patriot Act