MIS 111 Exam Questions With Correct
Answers
When off campus, using a VPN when accessing campus information systems affords all of the
following advantages except: - answerIncreases the speed of your broadband connection to
the internet
Social Engineering Threats Video: In the video, how could ...
When off campus, using a VPN when accessing campus information systems affords all of the
following advantages except: - answer✔✔Increases the speed of your broadband connection to
the internet
Social Engineering Threats Video: In the video, how could a hacker break two-factor
authentication on an account of yours without access to your phone and without phishing you? -
answer✔✔Call the phone company and pretend to be you, getting the phone company to switch
the phone number to a new sim card
What term is used to describe the process of "hacking into a person" using psychological
manipulation, trickery or deception for the purpose of stealing valuable information? -
answer✔✔Social Engineering
Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login
from being hacked through what method? - answer✔✔2FA Requires hackers also have your
physical device (second factor)
Which of the following is NOT a correct statement about the UArizona WiFi wireless network
system? - answer✔✔Open access wireless network availabe to guests when on the UArizona
campus
How VPNs Improve Security Video: What technique does a VPN use to allow access to services
in a company or on campus to all be accessible to a remote user as if they were on campus or at
the workplace? - answer✔✔The user get a company internal IP address
In the TechInsider video case, hackers we able to defeat the two-factor authentication used to
protect the account of Deray McKesson by doing what? - answer✔✔Using social engineering to
get Verizon to activate a new SIM card for his phone
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used
when your Duo App cannot be used for authentication? - answer✔✔Bypass codes
According to Siemens Enterprise Communications, what is one of the most effective routes to
stealing confidential data from organizations? - answer✔✔Social engineering
How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping
on a public network from seeing your data? - answer✔✔Tunneling, encryption
According to our class on "Information System's Impact on Organizations and Society", MIS
Integrates what three key dimensions in its Design Perspective? - answer✔✔People, Process, and
Technology
According to Dr. Jay Nunamaker, Regents Professor and Founding Chair, UofA MIS Dept., what
do information Systems professionals really do? - answer✔✔"Solves Real Problems for Real
People"
________ is a suite of enterprise-ready artificial intelligence services, applications, and software
tools labeled as cognitive computing. - answer✔✔Watson
________ are machines designed to be used in ______ where there are interactions with humans
within a shared space. - answer✔✔Cobots; collaborative applications
In 2000, operating a basic internet application costs businesses approximately ________ per
month. By mid-2020, operating the same application in Amazon's cloud cost approximately
________ per month. - answer✔✔$150,000; $100
Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise
the theory of machine-independent programming languages. She also noted the first actual
computer bug in 1945, what was the bug? - answer✔✔a moth stuck between the contacts of a
mechanical relay in the machine
Commonly used in the field of broadcast television videography, what technology, also called
chroma-key technology, creates the special effect of layering images together in a way that the a
video journalist background can be replace an with another setting . - answer✔✔Green screen
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
positive application of these deepfake videos that benefits individuals struck by disease? -
answer✔✔Allowing people who have lost their voice to have synthetic voices
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
negative application that could cause great harm to well known people? - answer✔✔Committing
fraud by creating a fake video that could be used to blackmail an individual or ruin their
reputation
As the mayor of Fortaleza, Brazil, Roberto Claudio (UA PhD) partnered with the University of
Arizona to use data analytics and visualizations to make significant reductions in the occurrence
of what type of event in Fortaleza? - answer✔✔Accidental road deaths
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Thebright. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €11,23. Je zit daarna nergens aan vast.