MIS Exam 1 (Part 3)

MIS Exam 1 (Part 3)

University

59 Qs

quiz-placeholder

Similar activities

Understanding Sole Proprietorships

Understanding Sole Proprietorships

University

54 Qs

FMGT55 CHAPTER1

FMGT55 CHAPTER1

University

54 Qs

IBM160 - Final Exam - Part 1

IBM160 - Final Exam - Part 1

University

60 Qs

Accounting Information Systems

Accounting Information Systems

University

64 Qs

BSBA SM Midterm test

BSBA SM Midterm test

University

60 Qs

EBA 27/11/24

EBA 27/11/24

University

60 Qs

Basics of Accounting

Basics of Accounting

University

60 Qs

MIS Exam 1 (Part 3)

MIS Exam 1 (Part 3)

Assessment

Quiz

Business

University

Easy

Created by

Samuel Eastman

Used 4+ times

FREE Resource

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that secretly gathers information about users while they browse the Web. 

Spyware

Adware

Phishing

Pharming

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a password to identify someone makes use of which authentication factor.

  1. Something they know

  1. Something they have

  1. Something they are

  1. Something they think

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An _______________ is a access control method that identifies a list of users who have the capability to take specific actions with an information resource.

ACL

CIA

RBAC

Token

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technical controls can only protect an information system so far. A comprehensive information security system will include the development of ___________ which should be a starting point in developing an overall security plan.

Access Control Lists

  1. Administrative Controls

  1. Intrusion Detection System

  1. Security Policies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security measure used at SHSU is DUO. One feature of DUO calls or texts the person trying to log into the SHSU network at a predetermined number. DUO is an example of a ________________.

  1. Biometric Security Measure

  1. Callback Modem

  1. Firewall

  1. Intrusion Detection System

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Iris analysis could be used as a physiological element to uniquely identify a person. This would be considered a _________________.

  1. Access control measure

  1. Biometric security measure

  1. Nonbiometric security measure

  1. Physical security measure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a biometrics to identify someone makes use of which authentication factor.

  1. Something they know

  1. Something they have

  1. Something they are

  1. Something they think

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?