MIS 111 Exam Questions With Correct
Answers
When off campus, using a VPN when accessing campus information systems affords all of the
following advantages except: - answerIncreases the speed of your broadband connection to
the internet
Social Engineering Threats Video: In the video, how could ...
When off campus, using a VPN when accessing campus information systems affords all of the
following advantages except: - answer✔✔Increases the speed of your broadband connection to
the internet
Social Engineering Threats Video: In the video, how could a hacker break two-factor
authentication on an account of yours without access to your phone and without phishing you? -
answer✔✔Call the phone company and pretend to be you, getting the phone company to switch
the phone number to a new sim card
What term is used to describe the process of "hacking into a person" using psychological
manipulation, trickery or deception for the purpose of stealing valuable information? -
answer✔✔Social Engineering
Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login
from being hacked through what method? - answer✔✔2FA Requires hackers also have your
physical device (second factor)
Which of the following is NOT a correct statement about the UArizona WiFi wireless network
system? - answer✔✔Open access wireless network availabe to guests when on the UArizona
campus
How VPNs Improve Security Video: What technique does a VPN use to allow access to services
in a company or on campus to all be accessible to a remote user as if they were on campus or at
the workplace? - answer✔✔The user get a company internal IP address
In the TechInsider video case, hackers we able to defeat the two-factor authentication used to
protect the account of Deray McKesson by doing what? - answer✔✔Using social engineering to
get Verizon to activate a new SIM card for his phone
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used
when your Duo App cannot be used for authentication? - answer✔✔Bypass codes
According to Siemens Enterprise Communications, what is one of the most effective routes to
stealing confidential data from organizations? - answer✔✔Social engineering
How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping
on a public network from seeing your data? - answer✔✔Tunneling, encryption
According to our class on "Information System's Impact on Organizations and Society", MIS
Integrates what three key dimensions in its Design Perspective? - answer✔✔People, Process, and
Technology
According to Dr. Jay Nunamaker, Regents Professor and Founding Chair, UofA MIS Dept., what
do information Systems professionals really do? - answer✔✔"Solves Real Problems for Real
People"
________ is a suite of enterprise-ready artificial intelligence services, applications, and software
tools labeled as cognitive computing. - answer✔✔Watson
________ are machines designed to be used in ______ where there are interactions with humans
within a shared space. - answer✔✔Cobots; collaborative applications
In 2000, operating a basic internet application costs businesses approximately ________ per
month. By mid-2020, operating the same application in Amazon's cloud cost approximately
________ per month. - answer✔✔$150,000; $100
Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise
the theory of machine-independent programming languages. She also noted the first actual
computer bug in 1945, what was the bug? - answer✔✔a moth stuck between the contacts of a
mechanical relay in the machine
Commonly used in the field of broadcast television videography, what technology, also called
chroma-key technology, creates the special effect of layering images together in a way that the a
video journalist background can be replace an with another setting . - answer✔✔Green screen
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
positive application of these deepfake videos that benefits individuals struck by disease? -
answer✔✔Allowing people who have lost their voice to have synthetic voices
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential
negative application that could cause great harm to well known people? - answer✔✔Committing
fraud by creating a fake video that could be used to blackmail an individual or ruin their
reputation
As the mayor of Fortaleza, Brazil, Roberto Claudio (UA PhD) partnered with the University of
Arizona to use data analytics and visualizations to make significant reductions in the occurrence
of what type of event in Fortaleza? - answer✔✔Accidental road deaths
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Thebright. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.