Search Header Logo

MIS Exam 1 (Part 3)

Authored by Samuel Eastman

Business

University

Used 4+ times

MIS Exam 1 (Part 3)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that secretly gathers information about users while they browse the Web. 

Spyware

Adware

Phishing

Pharming

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a password to identify someone makes use of which authentication factor.

  1. Something they know

  1. Something they have

  1. Something they are

  1. Something they think

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An _______________ is a access control method that identifies a list of users who have the capability to take specific actions with an information resource.

ACL

CIA

RBAC

Token

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technical controls can only protect an information system so far. A comprehensive information security system will include the development of ___________ which should be a starting point in developing an overall security plan.

Access Control Lists

  1. Administrative Controls

  1. Intrusion Detection System

  1. Security Policies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security measure used at SHSU is DUO. One feature of DUO calls or texts the person trying to log into the SHSU network at a predetermined number. DUO is an example of a ________________.

  1. Biometric Security Measure

  1. Callback Modem

  1. Firewall

  1. Intrusion Detection System

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Iris analysis could be used as a physiological element to uniquely identify a person. This would be considered a _________________.

  1. Access control measure

  1. Biometric security measure

  1. Nonbiometric security measure

  1. Physical security measure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a biometrics to identify someone makes use of which authentication factor.

  1. Something they know

  1. Something they have

  1. Something they are

  1. Something they think

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?