MIS 300 UPDATED ACTUAL Questions and CORRECT Answers
0 view 0 purchase
Course
MIS 300
Institution
MIS 300
IS 300 UPDATED ACTUAL Questions
and CORRECT Answers
Valencia, a business unit manager, must keep several things in mind when choosing from
alternative strategies for her department. Which statement about Valencia's decision making is
false?
*She should choose strategies that are consistent ...
MIS 300 UPDATED ACTUAL Questions
and CORRECT Answers
Valencia, a business unit manager, must keep several things in mind when choosing from
alternative strategies for her department. Which statement about Valencia's decision making is
false?
*She should choose strategies that are consistent with those of competitors.
*She should consider the amount and types of resources that each strategy will require.
*She should choose strategies that are consistent with the overall organizational plan.
*She should consider the long-term impact of each strategy on revenue and profit. - CORRECT
ANSWER - She should choose strategies that are consistent with those of competitors.
Which component of Leavitt's Diamond defines roles, responsibilities, and lines of authority
among members of the organization, which must be understood and accepted for the
organization to operate successfully?
*structure
*processes
*technology infrastructure
*people - CORRECT ANSWER - structure
June and her team are planning the implementation of a new company-wide order processing
information system. One of June's major concerns is the need to _____.
*complete stand-alone tasks
*collaborate with others
*redesign key work processes
*comply with EDI standards - CORRECT ANSWER - redesign key work processes
When Josephine uses an instant messaging application to ask her coworkers questions related to
a presentation she is developing for an upcoming conference, she is improving her productivity
using a(n) _____.
*workgroup information system
,*interorganizational information system
*personal information system
*enterprise information system - CORRECT ANSWER - workgroup information system
Corporate strategy, business unit strategies, innovative thinking, and technology innovations are
all _____.
*spheres of influence for types of information systems
*drivers that set information system organizational strategy
*components of Leavitt's Diamond
*elements of the value chain - CORRECT ANSWER - drivers that set information system
organizational strategy
When the IS organization and its resources are focused on efforts that support the key objectives
defined in the managers' strategic plan for the business, the organization is in _________.
*alignment
*compliance
*construction
*development - CORRECT ANSWER - alignment
A high-level IS manager has his firm utilize sophisticated information systems to digitally design
its products so that design defects can be detected and removed early in the process, reducing
development cost. What business strategy does this represent?
*focus
*high standards
*cost leadership
A successful IS manager recognizes that sustaining a competitive advantage _____.
*is outside the IS department's roles in most organizations
*requires little effort compared with initially gaining that advantage
,*means evolving to account for changes in customer needs
*primarily involves consistency in product and service offerings - CORRECT ANSWER -
means evolving to account for changes in customer needs
Why would Claire, who has a Certified Information Systems Security Professional credential,
object to shadow IT efforts at her company?
*Shadow IT systems and processes may lack necessary levels of security required to meet
compliance standards.
*Shadow IT provides the opportunity to evaluate and test many more information system
initiatives.
*Shadow IT delays testing of quick solutions to business needs.
*Issues can arise over the responsibility to fix shadow IT solutions when they break. -
CORRECT ANSWER - Shadow IT systems and processes may lack necessary levels of
security required to meet compliance standards.
Bubba creates a web application that allows his coworkers to generate reports providing
information on sales, costs, and inventory that they need for their job functions without
assistance. Bubba has developed a(n) _____.
*enterprise information system
*personal information system
*interorganizational information system
*workgroup information system - CORRECT ANSWER - personal information system
Brandon, a security specialist, explains that IS security managers must use their judgment to
ensure that the cost of security risk control does not exceed the system's benefits or the risks
involved. Brandon is discussing the concept of _____.
*the CIA security triad
*business continuity
*reasonable assurance
, You have been hired as the new Information Security consultant at XYZ Inc. Which of these
employee behaviors would be a top security concern?
*leaving laptop computers unattended in public spaces.
*using office computers for personal emails.
*banging on the keyboard when the computer is running slowly.
*drinking water or coffee while working on computers. - CORRECT ANSWER - leaving
laptop computers unattended in public spaces.
The first two steps an organization must take to perform a security risk assessment are to identify
_____, respectively.
*the current protections against cyberattacks that are already in place and the least expensive
ways to upgrade or expand them
*the costs of each possible loss event and the benefits of investing resources to prevent each
*the impact and frequency of each possible loss event
*hardware, software, and information systems used to achieve business objectives and possible
occurrences that would negatively impact them - CORRECT ANSWER - hardware,
software, and information systems used to achieve business objectives and possible occurrences
that would negatively impact them
The US-CERT incident reporting system is used to ____.
*alert the Department of Homeland Security about information security incidents
*alert the government about missing computers
*alert the Border Patrol about undocumented workers
*alert the bank about stolen credit cards - CORRECT ANSWER - alert the Department of
Homeland Security about information security incidents
Your business has a web server that has suddenly become unresponsive. When you study the
server's logs there are a huge number of requests from what appear to be legitimate computers.
The problem is likely because of _____.
*a logic bomb
*a CAPTCHA issue
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.