100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MSIS 2103 Exam 1 CH 1-4 Questions And Answers With Complete Study Tests $12.99   Add to cart

Exam (elaborations)

MSIS 2103 Exam 1 CH 1-4 Questions And Answers With Complete Study Tests

 2 views  0 purchase
  • Course
  • MSIS 2103
  • Institution
  • MSIS 2103

MSIS 2103 Exam 1 CH 1-4 Questions And Answers With Complete Study Tests

Preview 2 out of 8  pages

  • August 26, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • msis 2103 exam 1 ch 1 4
  • msis 2103 exam 1
  • MSIS 2103
  • MSIS 2103
avatar-seller
Labtech
MSIS 2103 Exam 1 CH 1-4 Questions And Answers With
Complete Study Tests
Identify two key management responsibilities in implementing successful information systems ANS 1) people;
the most important element of info systems. They need to train employees, motivate them, and help them gain an
understanding of the importance of the information system.

2) Technology Infrastructure; Resources include hardware, software, databases, networks, facilities, and third-party
services. Required to meet customers', suppliers', key business partners', regulatory agencies', and employees'
needs. Forms the foundation of every computer-based information system



State 3 reasons why organizations employ the Leavitt’s Diamond Model to introduce new systems into the
workplace ANS lower stress, encourage teamwork, and increase successful implementation



describe 4 fundamental information system types based on their sphere of influence ANS Personal

Workgroup

Enterprise

Interorganizational



discuss the traditional and contemporary view of the role that information systems play in an organizations value
chains ANS Traditional: Organizations use info systems to control and monitor processes and to ensure
effectiveness and efficiency... (IS is external to the supply chain and serve to control it) // Contemporary: Info
systems are just a part of the process itself... it plays an integral role in the process, whether providing input, aiding
public transformation, or producing output



identify 4 benefits of creating a strategic plan ANS Provides a framework and clearly defined direction to guide
decision making, Provides effective use of organization's resources, Allows organization to be proactive, Improves
communication



identify 4 drivers that helps set the information system organizational strategy ANS technology innovations,
innovative thinking, corporate strategy, business unit strategy



identify 3 ways the IS organization can be perceived by the rest of the organization, and how each can influence the
IS strategy ANS cost center, business partner, and game changer

, identify 6 non-technical skills needed to be an effective information system worker ANS Data analysis, Mobile
device application design/build skills, Traditional programming and application development, Technical support
expertise, Project management, Networking and cloud computing



identify 2 benefits of obtaining a certification in an IS subject area ANS new career possibilities and potential
increase in salary



state 4 reasons why computer incidents have become so prevalent ANS increasing computer system complexity

BYOD policies

using software with known vulnerabilities

increasing sophistication of those who would do harm



identify 4 classes of perpetrators most likely to initiate a cyberattack ANS careless insider, malicious employees,
cybercriminal, hacktivist, cyberterrorist, lone wolf attacker



define the term attack vector ANS the technique used to gain unauthorized access to a device or a network



Identify at least three commonly used attack vectors. ANS blended threat, phishing, virus



Identify five cyberthreats that pose a serious threat for organizations. ANS ransomware, distributed denial of
service attacks, botnet, data breach, cyberrespionage



Identify five consequences of a successful cyberattack. ANS direct cost, business disruption, legal
consequences, recovery cost, reputation damage



Identify five federal laws that address computer crime. ANS Computer Fraud and Abuse Act

Fraud and Related Activity inConnection with Access Devices Statute

Identity Theft and AssumptionDeterrence Act

Stored Wire and Electronic Communications and Transactional Records Access Statutes

USA Patriot Act

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Labtech. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart