MIS Exam 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

LTE is ________ cellular technology. Question 1 options:

4G

A smart ID card is something the user _______.

Has

What technology has seen the largest increase in venture funding for products and services related to well-being and care delivery?

IOT (internet of things)

Who was Harald Blaatand "Bluetooth" II?

King of demark from 940 to 981

As a part of a developing a risk managment strategy, risk analysis considers all of the following except:

Motivation of the hacker

For the most residential ADSL and Cable network plans, upload (from the customer's network to the internet) data transmission speeds are generally:

Much slower than download (from the internet to the customer's network) data transmission speeds

________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.

NFC; Short

When designing a security-in-depth strategy, firewalls and VPNs would be examples of what type of control?

Network access

_______ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet.

Passive RFID (Radio Frequency Identification) devices

In the Neuro-ID video case "Intention, Friction and Fraud", all of the following are used to assess the behavior of online users, except:

Personally Identifiable Information

With respect to IOT security, what term is used to describe the digital and physical vulnerabilities of the IOT hardware and software environment?

attack surface

According to the World Economic Forum's "Future of Jobs Survey 2020," which of the following is most likely to be adopted by over 80% of the companies surveyed by 2025?

cloud computing

_________ is a communications control.

firewall

What term is used to describe the connection between an internet service provider and the customer, i.e., into your home?

last mile

Auditing __________ the computer means inputs, outputs, and processing are checked.

through

Honeywell, IBM, and Xerox the dominant companies in what industry during the 1970's?

time sharing industry

For Eller graduates with a degree in MIS/OSCM in 2021, what was the approximate average salary?

$65,000

On the U-System (u.arizona.edu) hosting server, ___(a)___ is the directory that contains the ___(b)___ website file.

(a) public_html, (b) index.html

What is the correct "port" number that should be used with the WinSCP or CyberDuck secure file transfer program?

22

As compated with pre-COVID levels, approximately how much as retail-oriented online credit-card and debit-card spend increased since March of 2020?

35%

On average, using the cloud deployment would result in a company reducing its annual operating cost of operation for power, labor, and hardware by approximately how much?

80%

________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it and are an underlying technology of ________.

A wireless sensor; the IoT (Internet of Things)

________ use internal batteries for power, and they broadcast radio waves to a reader.

Active RFID (Radio Frequency Identification) devices?

The advantage of ________________ is they can be read over greater distances because they use internal batteries for power.

Active RFID tags?

Also known as "Rijndael," what cipher has been the "official" encryption standard in the United States since 2002?

Advanced encryption standard

Which of the following applications would commonly use Ultra High Frequency (UHF 902-928 MHz) wireless communications? Question 3 options: Asset Management in Warehouses Electronic Door Locking Systems Automatic Toll Collection Systems Animal Identification

Asset management in warehouses

According to Forrester research, which of the following technologies is related to emerging field of "insight technologies"?

Augmented and Virtual Reality?

According to Forrester, what supporting technology commonly includes the emerging fields of fog computing, software-defined networking (SDN), and cloudlets?

Augmented and Virtual Reality?

Which of the "CIA-A" security goals relates to access control, verification, and repudiation? Question 1 options: Availability Authentication Confidentiality Integrity

Authentication

How do firewalls use an ACL (Access Control List) determine which devices are allowed to access the network?

Based on the requesting device's Internet Protocol (IP) address

According to the World Economic Forum's "Future of Jobs Survey 2020," which of the following do most companies surveyed report as most likely to have the highest increasing demand for a job role by 2025?

Big Data Specialists

Using the Caesar Cipher shown, which of the following messages is the correct decryption of the encrypted (ciipher text) message "vbt".

CIA

Also known as a "rotation cipher," what the more common name for a cipher that simply replaces a letter with another letter that is a fixed number of letters away?

Caesar Cipher

According to the "Future of Medtech" video case study, what is a potential new source of information to improve preventative care?

Data from consumer-focused technology companies

All of the following are factors contributing to the rapid growth of the cloud computing industry, except:

Declining costs of power, space, and maintenance needed to operate a data computer

Which of the following types of wireless communication used as part of a connected vehicle architecture would have a line-of-sight range of approximately 300 meters?

Dedicated short range communication

When connecting to the U-System (u.arizona.edu) server for the first time, WinSCP displays the warning message "the server's host key was not found in the cache," as shown below. This warning is related to what aspect of creating a channel for secure data transmission?

Defining the the U-System server as a trusted endpoint for tunneling

Which letter in the English language occurs most frequently?

E

Which of the following was NOT a known problem with the security of the ENIGMA machine?

ENIGMA machines emitted radios signals that were intercepted

The EC Hosting process of downloading a file from D2L to your local computer, modifying the file as required by the assignment, and then uploading the file to the U-System (u.arizona.edu) website hosting server is similar to what other process that we discussed earlier in the semester?

ETL (Extract-Transform-Load)

________ refers to efforts by unauthorized users to access data that are transmitted over wireless networks.

Eavesdropping

As discussed in the Neuro-ID video case study, in addition to measuring a customer's "friction" (e.g., frustration or satisfaction), the system also is able to measure what security-related aspect of customer "intent"?

Entering data in a way associated with fraudulent behaviors

Although it's not commonly available to most homes, which of the following wired technologies would provide the fastest data transmission speeds if all of these were available as choices to an individual for their "last mile" network connectivity?

Fiber optics (aka, Fiber-to-the-home or FTTH)

Which industrial revolution is bring together digital, physical and biological systems to power smart factories and agricultural & food industries using cyber-physical systems, robotics, 3D printing, and smart sensors and instrumentation?

Fourth Industrial Revolution

The adoption of __________ has been an important factor in the development and rapid expansion of the Internet of Things.

IPv6

As discussed in our topic overview lecture, the Health and Heathcare (HE) sector is most (highest %) likely to adopt what technology? Question 2 options: 3D and 4D printing and modelling Biotechnology Internet Of Things (IOT) and connected devices Augmented and virtual reality

Internet Of Things (IOT) and connected devices

Which of the following would NOT typically be an advantage of renting a DSL or cable home modem from your ISP provider?

It is usually much less expensive in the long run if you stay with the same ISP for years

Using the Caesar Cipher shown, which of the following messages is the correct decryption of the encrypted (ciipher text) message "dxr".

KEY

Typing in your password to access a system is an example of something the user _________.

Knows

If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems so you can enhance your security management to minimize the impact of theats to your business, you are using a risk _________ strategy.

Limitation

As Medtech and Healthtech incorportate Artificial Intelligence, Machine Learning and Deep Learning into patient care systems, what risk must be considered and managed?

Litigation Risks Related to Using Algorithms to Provide Medical 'Advice'

name is used to describe a network of connected Bluetooth devices?

Piconet

What security application is commonly integrated into email systems to allow messages to be sent securely using encryption?

Pretty good privacy

________________ are smaller because they store information both horizontally and vertically.

QR codes

Of the following technologies, which is typically implemented using a one-way directional communication channel?

RFID

______ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

RFID

How does adding a repeater in a home data network impact data tranmission latency?

Repeater retransmissions significantly add to network data tranmission latency

The collection of web services that are used to build a firm's IT applications constitutes a(n) ________.

SOA (Service Oriented Architecture)

With the ________ delivery model, cloud computing vendors provide computer hardware, operating systems, and applications software that is specific to their customers' requirements.

SaaS

With the ________ model, customers do not control either the software or the infrastructure.

SaaS

________ transmission systems can have a large coverage area but their signals experience longer propagation delays.

Satellite

Typically, applications are only managed by a vendor in which of the following models?

Software-as-a--Service (SaaS)

On the UofA CatCard, your personal signature is what type of authentication control?

Something you do

What type of Intrusion Detection and Prevention System (IDPS) uses a normal traffic baseline, alerts when traffic levels fall outside expected clipping (acceptable or anticipated) levels?

Statistical Anomaly-based

Which of the following did not contribute to the fact that messages sent by the Navajo Code Talkers were never successfully decoded during World War II?

The Navajo language was easily used in battle, since it already had many existing terms for military equipment and officer's ranks

What does an SSID (Service Set Indentifier) identify on wireless network?

The name of the base station (aka access point name) a computer uses to connect to the wireless network

In the "Introducing Cellular V2X" video case, all of the following were identified as common benefits of using vehicle communications technologies such as 802.11p DSRC (Dedicated Short Range Communications) except:

Theft prevention

In the video case "RFID Creates Value in Retail," all of the following were identified as steps businesses should take to create actionable information through the use of RFID (Radio Frequency Identification) except:

Training retail employees on how RFID sensors are able to collect data from tagged products

Which of the following web hosting services is acceptable for the EC Hosting assignment?

U-system (UArizona's web hosting service)

________ is a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. It is a ______-range wireless network technology.

UWB; Short

Which of the following applications of was an example of how MIS professionals must consider in their designs not only improving user convenience but also informing users the impact of using the design on community security?

Using a card reader to enter a residence hall (dorm)?

In the "Eye on Oversight" video case study, what was the name of a ransomware software that impacted the United Kingdom National Health Service in 2017?

Wannacry

___________ enables peer-to-peer communications and allows users to transfer content among devices without having to rely on a wireless antenna.

Wifi direct

In terms of maximum operating range, which of the following correctly orders the sort-range wireless technologies from longest range to shortest range?

Wifi, Bluetook, RFID, NFC

Risk _______________ means absorbing the costs associated with any damages that occur.

acceptance

You decide to use the password "1234" on your computer because you assume that you will be able to absorb any damages that might occur if a hacker steals your information or accesses your computer. This is a risk __________ strategy

acceptance

According to Forrester, which of the following emerging technologies is likely to have the disruptive potential to "change the world" in the next 3-5 years?

augmented and virtual reality?

As described by CapGemini, what aspect of smart products used an Industry 4.0 environment would focus on using sensor technology to give access to condition information regarding products and their environment?

aware

RFID was developed to replace ________.

bar codes

In the Bloomberg video case "Killing the Need for Passwords," what term is used to describe the science of measuring features or fuctions of the human body to establish your identity?

biometrics

The ownership of digtal assets in the emerging metaverse is being driven by what technology that enable the ownership of digital assets, such as Gucci digital sneaker?

blockchain technology

Which wireless technology offers a single wireless standard to integrate technologies previously connected with with cabling?

bluetooth

Which of the following is NOT typically considered an advantage of using a VPN (Virtual Private

business continunity

What term is used to describe the pre-printed codes that can be used as an alternate authentication method when your DuoMobile app isn't available?

bypass codes

What term is used to describe a shared pool of networks, servers, storage, applications and services that can be rapidly provisioned?

cloud computing

As described in our class discussion, OSCM (Operations and Supply Chain Management) professionals improve the operational quality of business processes by managing quality, and improving the efficiency, effectiveness and _____________.

consistency

Similar to a technology used as part of the sustainability efforts in residence halls on the UArizona campus, what decision support tool does Cisco describe as being commonly used in Smart Buildings to communicate information collected from the building's IOT sensor network?

dashboards

What security approach are you using for your home network if you combine changing your AP (access point) name, adding a strong password to access your wireless network, and also separately password protecting devices on your network?

defense in depth

All of the following are aspects of effective business that were included in our class discussion related to the discipline of MIS?

disruption

According to IT's About Business 8.6, FedEX launched EDEN (Equipment Detection, Event Notification) to improve the efficiency and effectiveness of its ____________.

dock operations

According to the "Cloud Computing Trends for 2020" video case, what term is used to describe a distributed computing model where information is processed closer to its source?

edge computing

In terms of internet speed (bandwidth), which of the following applications generally has the lowest recommended speed (bandwidth) requirements?

email

In the "Key Skills for the Future" video case, what skill was discussed that incorporated the prespective of diversity and inclusion?

empathy

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

encryption

When a cloud service vendor fails to meet their commitment to provide a specified level of service, such as system availability, what is the customer usually entitled to receive from the cloud service vendor?

financial compensation

As discussed in our topic overview lecture, both cloud computing and encryption & cyber security are likely to be adoption by the most (highest %) of companies in what industry sector?

financial services

During which industrial revolution did mechanized production using steam and water power replace human- and animal-powered machines?

first industrial revolution?

According to Forrester, all of the following are related to emerging artificial intelligence (AI) and cognitive technologies, except:

fog computing?

What term is used to describe a broad array of technologies associated with improving environmental sustainability and energy and other resource efficiencies?

greentech

Defining the encryption standard (e.g., DES, RSA, AES) to be used during transfers

http://www.u.arizona.edu/~wwildcat

Organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection should use a ________ cloud.

hybrid

According to Wikipedia, what term is used to describe a graphic image (icon) associated with a particular Web page and/or Web site and can serve as a visual reminder of the Web site identity in the address bar or in tabs?

icons or favicons

What dimension of the business use of cloud systems focus on the benefits of rapid deployment, on-demand provisioning, and disaster recovery?

increased flexibility

Which of the following is the full filename that should be used for your EC Hosting assignment in the public_html directory on the u.arizona.edu (U-System) server?

index.html

What term is used to describe technology that is shared broadly by all firms in an industry or region (e.g., rail, telegraph, telephone, electricity, IT)?

infrastructure?

According to Forrester, what emerging technology is likely to improve service and create efficiencies by replacing many tasks that depend upon humans, such as customer service representatives, truck drivers, and taxi drivers?

intelligent agents ?

As availability to proprietary technologies becomes increasely ubiquitious within an industry, how does the "advantage potential" of companies using that technology change over time?

it significantly decreases?

4.5 As discussed in All ABout Business 4.5, who assumes all of the risk in credit card transactions and suffer most of the financial damages when a fradulent transactions is made?

mechants

WiFi hotspots are an example of ______________ wireless networks.

medium-range

________ transmission systems are relatively inexpensive but must have unobstructed line of sight.

microwave

Increased visibility, Tracking, Traceability and Higher Quality are all attributes of what type of benefits for tracking items using RFID tags?

operational benefits

In the commonly used security acronym "PII" used when discussing information related to an individual's identify, the acronym "PII" means "___________ Identifiable Information."

personally

Issues relating to international laws affecting the physical location of the service provider's data center, regulatory compliance, legal liability, and breach & incident management are related to what type of cloud service risk?

privacy

According to Intel Canada's video "Public, Private and Hybrid Clouds," what type of cloud architecture offers a high level of control of the resources but the *least* (lowest ability for) scalability?

private

What term is used to describe technology that can be owned, actually or effectively, by a single firm (e.g., patents, secrets, exclusive licenses)?

proprietary?

Which of the following cloud computing characteristics gives customers elasticity and flexibility because it allows customers to access needed computing resources automatically?

providing on-demand self service

All of the following factors have resulted in the vanishing advantage of the competitive barriers for distinctive systems, except:

regulation?

As discussed in the "Eye on Oversight" video case, what term is used to describe an agency's ability to be proactive and identify vulnerabilities?

risk management

What the name of the device that is accessed using a public IP (Internet Protocol) address for the external internet while forwarding traffic from your home network devices that use private addresses assigned using Network Address Translation (NAT)?

router

NFC (Near Field Communication) is an example of ______________ wireless networks.

short range

What term is used to describe using the IOT (Internet of Things) to manage your home computer, television, lighting and heating controls, home security system (including smart window and door locks), thermostats, and appliances using embedded sensors and can communicate with one another through a home network?

smart home

Using IOT to track packages, containers, and other bulkware are examples of what type of "smart" IOT technologies?

smart logistics

As discussed in our topic overview lecture, what specialize skill would commonly require cross-cutting, specialized skills in Cloud computing, Data and AI (Artificial Intelligence), Engineering, Marketing, and Product Development?

software devleopment life cycle (SDLC)

In its key take-aways for 2022, Gartner forecasts that mid-sized enterprises will focus there use of emerging technologies in all of the following areas, except:

supporting remote work?

In the Breakthrough Energy Catalyst video case, investments are being made to develop technologies to convert biological inputs, including municipal waste, into what product?

sustain aviation fuel

As shown below, what "Host name" should be used with WinSCP (or equivalent field for CyberDuck) to connect to the UArizona personal web hosting server?

u.arizona.edu

In the URL "http://www.u.arizona.edu/~wtn", what part of the URL defines the hosting server?

u.arizona.edu

In "The Founder" video case, what term would be used to describe how customers would preceive the "lower cost" and "faster service" aspects of the McDonald's business operation?

value proposition

What term is used to describe the approach an attacker often uses to find open (unprotected) wireless networks by searching around a geographic area?

war driving

According to IT's About Business 8.3, Bobbejaanland Family Park implemented ________ technology to help park managers know more about what visitors did in order to increase visitor's enjoyment and to entice them to spend more money.

wifi


संबंधित स्टडी सेट्स

Prokaryotic v.s. Eukaryotic Cells

View Set

Chapter 3.2 Hinduism and Buddhism Development

View Set

Section 5.3 The Independence and Multiplication Rules

View Set

NCLEX Practice Questions HURST REVIEW (Adult Health)

View Set

Chapter 10: The Jacksonian Era, 1828-1840

View Set

Chapter 9, Chapter 10, Chapter 11, Chapter 12, Chapter 13, Chapter 14, Chapter 15, Chapter 17, Chapter 18, and Chapter 19

View Set