UNISA 2024 INF1505-24-Y Welcome to the module INF1505: An Introduction to Business Information Systems Assessment 2
QUIZ
Started on Thursday, 30 May 2024, 11:14 AM
State Finished
Completed on Thursday, 30 May 2024, 11:37 AM
Time taken 22 mins 57 secs
Grade 23.00 out of 25.00 (92%)
Question 1
The main function of Cyber Incident Response Capability (CIRC) is to _____.
Correct
Mark 1.00 out of
1.00
a. provide information on security incidents
b. restrict access controls to unauthorized personnel
c. create backdoors to bypass security protocols
d. provide level 1 security
LEARNING OBJECTIVES: MIS.10e.5.5
The correct answer is:
provide information on security incidents
Question 2
Which of the following is recommended in the context of a comprehensive security plan?
Correct
Mark 1.00 out of
1.00
a. Management should expect employees to implement their own training.
b. Employees should be trained in security measures.
c. Employee passwords and ID badges should be periodically revoked.
d. Participants should receive certificates before training sessions.
LEARNING OBJECTIVES: MIS.10e.5.6
The correct answer is:
Employees should be trained in security measures.
,Question 3
Social engineering is an attack that takes advantage of the backdoors in security systems.
Correct
Mark 1.00 out of
1.00
True
False
LEARNING OBJECTIVES: MIS.10e.5.4
The correct answer is 'False'.
Question 4
In the context of information privacy, which of the following is true of spam?
Correct
Mark 1.00 out of
1.00
a. It can only be send to a small number of people.
b. It can only be used to provide access to legitimate e-mails.
c. It is solicited e-mail sent for business purposes.
d. It is sent in bulk using automated mailing software.
LEARNING OBJECTIVES: MIS.10e.4.1
The correct answer is:
It is sent in bulk using automated mailing software.
Question 5 _____ are small text files with unique ID tags that are embedded in a Web browser and saved on the
Correct user’s hard drive.
Mark 1.00 out of
1.00
a. Firewalls
b. Kernels
c. Cookies
d. Applets
LEARNING OBJECTIVES: MIS.10e.4.3
The correct answer is:
Cookies
, Question 6
WiMAX usually has a range of about _______ for fixed stations.
Incorrect
Mark 0.00 out of
1.00
a. 28 miles
b. 60 miles
c. 48 miles
d. 8 miles
LEARNING OBJECTIVES: MIS.10e.6.7
The correct answer is:
48 miles
Question 7
The bus topology connects nodes along a network segment, with the ends connected in a manner
Correct
similar to a ring topology.
Mark 1.00 out of
1.00
True
False
LEARNING OBJECTIVES: MIS.10e.6.5
The correct answer is 'False'.
Question 8
_____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and
Correct patents for “creations of the mind” developed by people or businesses.
Mark 1.00 out of
1.00
a. Information policy
b. Intellectual property
c. An identity log file
d. A virtual organization
LEARNING OBJECTIVES: MIS.10e.4.5
The correct answer is:
Intellectual property
QUIZ
Started on Thursday, 30 May 2024, 11:14 AM
State Finished
Completed on Thursday, 30 May 2024, 11:37 AM
Time taken 22 mins 57 secs
Grade 23.00 out of 25.00 (92%)
Question 1
The main function of Cyber Incident Response Capability (CIRC) is to _____.
Correct
Mark 1.00 out of
1.00
a. provide information on security incidents
b. restrict access controls to unauthorized personnel
c. create backdoors to bypass security protocols
d. provide level 1 security
LEARNING OBJECTIVES: MIS.10e.5.5
The correct answer is:
provide information on security incidents
Question 2
Which of the following is recommended in the context of a comprehensive security plan?
Correct
Mark 1.00 out of
1.00
a. Management should expect employees to implement their own training.
b. Employees should be trained in security measures.
c. Employee passwords and ID badges should be periodically revoked.
d. Participants should receive certificates before training sessions.
LEARNING OBJECTIVES: MIS.10e.5.6
The correct answer is:
Employees should be trained in security measures.
,Question 3
Social engineering is an attack that takes advantage of the backdoors in security systems.
Correct
Mark 1.00 out of
1.00
True
False
LEARNING OBJECTIVES: MIS.10e.5.4
The correct answer is 'False'.
Question 4
In the context of information privacy, which of the following is true of spam?
Correct
Mark 1.00 out of
1.00
a. It can only be send to a small number of people.
b. It can only be used to provide access to legitimate e-mails.
c. It is solicited e-mail sent for business purposes.
d. It is sent in bulk using automated mailing software.
LEARNING OBJECTIVES: MIS.10e.4.1
The correct answer is:
It is sent in bulk using automated mailing software.
Question 5 _____ are small text files with unique ID tags that are embedded in a Web browser and saved on the
Correct user’s hard drive.
Mark 1.00 out of
1.00
a. Firewalls
b. Kernels
c. Cookies
d. Applets
LEARNING OBJECTIVES: MIS.10e.4.3
The correct answer is:
Cookies
, Question 6
WiMAX usually has a range of about _______ for fixed stations.
Incorrect
Mark 0.00 out of
1.00
a. 28 miles
b. 60 miles
c. 48 miles
d. 8 miles
LEARNING OBJECTIVES: MIS.10e.6.7
The correct answer is:
48 miles
Question 7
The bus topology connects nodes along a network segment, with the ends connected in a manner
Correct
similar to a ring topology.
Mark 1.00 out of
1.00
True
False
LEARNING OBJECTIVES: MIS.10e.6.5
The correct answer is 'False'.
Question 8
_____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and
Correct patents for “creations of the mind” developed by people or businesses.
Mark 1.00 out of
1.00
a. Information policy
b. Intellectual property
c. An identity log file
d. A virtual organization
LEARNING OBJECTIVES: MIS.10e.4.5
The correct answer is:
Intellectual property