MIS 111 Exam Questions With Correct
Answers
When off campus, using a VPN when accessing campus information systems affords all of the
following advantages except: - answerIncreases the speed of your broadband connection to
the internet
Social Engineering Threats Video: In the video, how could ...
When off campus, using a VPN when accessing campus information systems affords all of the
following advantages except: - answer✔✔Increases the speed of your broadband connection to
the internet
Social Engineering Threats Video: In the video, how could a hacker break two-factor
authentication on an account of yours without access to your phone and without phishing you? -
answer✔✔Call the phone company and pretend to be you, getting the phone company to switch
the phone number to a new sim card
What term is used to describe the process of "hacking into a person" using psychological
manipulation, trickery or deception for the purpose of stealing valuable information? -
answer✔✔Social Engineering
Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login
from being hacked through what method? - answer✔✔2FA Requires hackers also have your
physical device (second factor)
Which of the following is NOT a correct statement about the UArizona WiFi wireless network
system? - answer✔✔Open access wireless network availabe to guests when on the UArizona
campus
How VPNs Improve Security Video: What technique does a VPN use to allow access to services
in a company or on campus to all be accessible to a remote user as if they were on campus or at
the workplace? - answer✔✔The user get a company internal IP address
In the TechInsider video case, hackers we able to defeat the two-factor authentication used to
protect the account of Deray McKesson by doing what? - answer✔✔Using social engineering to
get Verizon to activate a new SIM card for his phone
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used
when your Duo App cannot be used for authentication? - answer✔✔Bypass codes
According to Siemens Enterprise Communications, what is one of the most effective routes to
stealing confidential data from organizations? - answer✔✔Social engineering
How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping
on a public network from seeing your data? - answer✔✔Tunneling, encryption
According to our class on "Information System's Impact on Organizations and Society", MIS
Integrates what three key dimensions in its Design Perspective? - answer✔✔People, Process, and
Technology
According to Dr. Jay Nunamaker, Regents Professor and Founding Chair, UofA MIS Dept., what
do information Systems professionals really do? - answer✔✔"Solves Real Problems for Real
People"
________ is a suite of enterprise-ready artificial intelligence services, applications, and software
tools labeled as cognitive computing. - answer✔✔Watson
________ are machines designed to be used in ______ where there are interactions with humans
within a shared space. - answer✔✔Cobots; collaborative applications
In 2000, operating a basic internet application costs businesses approximately ________ per
month. By mid-2020, operating the same application in Amazon's cloud cost approximately
________ per month. - answer✔✔$150,000; $100
Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise
the theory of machine-independent programming languages. She also noted the first actual
computer bug in 1945, what was the bug? - answer✔✔a moth stuck between the contacts of a
mechanical relay in the machine
Commonly used in the field of broadcast television videography, what technology, also called
chroma-key technology, creates the special effect of layering images together in a way that the a
video journalist background can be replace an with another setting . - answer✔✔Green screen
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
positive application of these deepfake videos that benefits individuals struck by disease? -
answer✔✔Allowing people who have lost their voice to have synthetic voices
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
negative application that could cause great harm to well known people? - answer✔✔Committing
fraud by creating a fake video that could be used to blackmail an individual or ruin their
reputation
As the mayor of Fortaleza, Brazil, Roberto Claudio (UA PhD) partnered with the University of
Arizona to use data analytics and visualizations to make significant reductions in the occurrence
of what type of event in Fortaleza? - answer✔✔Accidental road deaths
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur Thebright. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €11,19. Vous n'êtes lié à rien après votre achat.