100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS 200 Final Exam Questions and correct answers | already graded a+ | verified answers $7.99   Add to cart

Exam (elaborations)

MIS 200 Final Exam Questions and correct answers | already graded a+ | verified answers

 10 views  0 purchase
  • Course
  • MIS 200
  • Institution
  • MIS 200

MIS 200 Final Exam Questions and correct answers | already graded a+ | verified answers

Preview 2 out of 6  pages

  • July 1, 2024
  • 6
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • MIS 200
  • MIS 200
avatar-seller
AnswersCOM
MIS
200
Final
Exam
6
ethical
policies
organizations
should
implement
to
protect
themselves
-
ANS-1.
Ethical
computer
use
policy
2.
Information
privacy
policy,
3.
Acceptable
use
policy
(AUP)
4.Email
privacy
policy
5.Social
media
policy
6.
Employee
monitoring
policy
7
phases
of
SDLC
-
ANS-1.
Planning
2.
Analysis
3.
Design
4.
Development
5.
Testing
6.
Implementation
7.
Maintenance
Acceptable
use
policy
(AUP)
-
ANS-A
document
stipulating
constraints
and
practices
that
a
user
must
agree
to
for
access
to
a
corporate
network
or
the
Internet.
Agile
methodology
-
ANS-aims
for
customer
satisfaction
through
early
and
continuous
delivery
of
useful
software
components
developed
by
an
iterative
process
with
a
design
point
that
uses
the
bare
minimum
requirements
Analysis
Phase
(SDLC)
-
ANS-involves
analyzing
end-user
business
requirements
and
refining
project
goals
into
defined
functions
and
operations
of
the
intended
system
Authentication
and
authorization
-
ANS-Authentication
is
a
method
for
confirming
users'
identities.
Authorization
is
the
process
of
providing
a
user
with
permission
including
access
levels
and
abilities
such
as
file
access,
hours
of
access,
and
amount
of
allocated
storage
space
Confidentiality
-
ANS-The
assurance
that
messages
and
information
remain
available
only
to
those
authorized
to
view
them.
Design
phase
(SDLC)
-
ANS-involves
describing
the
desired
features
and
operations
of
the
system
including
screen
layouts,
business
rules,
process
diagrams,
pseudo
code,
and
other
documentation
Detection
and
response
-
ANS-Intrusion
detection
software
(IDS)
features
full
time
monitoring
tools
that
search
for
patterns
in
network
traffic
to
identify
intruders Development
phase
(SDLC)
-
ANS-involves
taking
all
of
the
detailed
design
documents
from
the
design
phase
and
transforming
them
into
the
actual
system
Different
software
development
methodologies
-
ANS-Agile
methodology
Waterfall
methodology
Rapid
application
development
methodology
(RAD)
Extreme
programming
(XP)
methodology
Rational
Unified
Process
(RUP)
SCRUM
Email
privacy
policy
-
ANS-Details
the
extent
to
which
email
messages
may
be
read
by
others
Employee
monitoring
policy
-
ANS-Explicitly
state
how,
when,
and
where
the
company
monitors
its
employees
Ethical
computer
use
policy
-
ANS-Contains
general
principles
to
guide
computer
use
behavior.
EX:Don't
play
solitaire
at
work
dummy.
Ethics
-
ANS-the
principles
of
right
and
wrong
that
guide
an
individual
in
making
decisions
Example
of
authentication
and
authorization
-
ANS-Authentication-
Employees
in
a
company
are
required
to
authenticate
through
the
network
before
accessing
their
company
email
Authorization-
After
an
employee
successfully
authenticates,
the
system
determines
what
information
the
employees
are
allowed
to
access
Examples
of
detection
and
response
-
ANS-quarantining
malware,
phishing
awareness
training,
and
patching
known
vulnerabilities
with
system
updates.
Examples
of
prevention
and
resistance
-
ANS-In
a
security
branch,
a
thief
is
then
unable
to
read
encrypted
information.
A
firewall
is
hardware
and/or
software
that
guard
a
private
network
by
analyzing
incoming
and
outgoing
information
for
the
correct
markings.
Extreme
programming
(XP)
methodology
-
ANS-breaks
a
project
into
tiny
phases,
and
developers
cannot
continue
on
to
the
next
phase
until
the
first
phase
is
complete
Hacker
-
ANS-Experts
in
tech
who
use
their
knowledge
to
break
into
computers
and
computer
networks
either
for
profit
or
challenge
How
can
a
company
participating
in
ebusiness
keep
its
information
secure?
-
ANS-Informing
the
people
about
security
policies
and
security
issues
will
help
to
ensure
the
information
is
safe.
Implement
all
of
the
security
technologies
from
authentication
to
authorization
and
prevention
and
resistance.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AnswersCOM. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart