,
,
,13) Which of the following is a strategy to minimize the damage of social engineering?
A) Access data frequently to ensure it has not been compromised.
B) Limit access privileges based on job necessity.
C) Update antivirus software frequently.
D) Use older technology that hackers do not understand.
Answer: B
Diff: 1
Section Reference: IT's About Business 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
Bloomcode: Knowledge
Standard: AACSB || Technology
14) Which of the following is a strategy to minimize the damage of social engineering?
A) Access data frequently to ensure it has not been compromised.
B) Remove access to data as soon as employees, contractors, or consultants leave or change jobs.
C) Update antivirus software frequently.
D) Use older technology that hackers do not understand.
Answer: B
Diff: 1
Section Reference: IT's About Business 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
Bloomcode: Knowledge
Standard: AACSB || Technology
15) Which of the following is the first and most important strategy to prevent social engineering?
A) Limiting access to data
B) Training employees
C) Removing access to systems as soon as someone leaves the company
D) Utilizing identity and access management structures
Answer: B
Diff: 1
Section Reference: IT's About Business 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
Bloomcode: Knowledge
Standard: AACSB || Technology
16) MIT Technology Review refers to 18—22-year-olds as Homo ________.
A) Conectums
B) Conexus
C) Technologus
D) Techies
Answer: B
Diff: 1
Section Reference: 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
5
, Bloomcode: Knowledge
Standard: AACSB || Technology
17) The term Homo Conexus refers to people who practice ________.
A) continuous computing
B) informed usership
C) technology use
D) useful computing
Answer: A
Diff: 1
Section Reference: 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
Bloomcode: Knowledge
Standard: AACSB || Technology
18) ________ users obtain greater value from whichever technologies they use.
A) Continuous
B) Computer
C) Informed
D) Technology
Answer: C
Diff: 1
Section Reference: 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
Bloomcode: Knowledge
Standard: AACSB || Technology
19) Which of the following is NOT associated with being an informed user?
A) Understanding why IT picks and installs specific applications for your use
B) Enhancing the quality of your organization's IT applications with your input
C) Keeping abreast of both new IT and rapid developments in existing technologies
D) Improving your organization's performance and your own productivity
Answer: A
Diff: 1
Section Reference: 1.1
Learning Objective: 1.1: Identify the reasons why being an informed user of information systems
is important in today's world.
Bloomcode: Knowledge
Standard: AACSB || Technology
20) ________ is the business strategy that leverages IT to dramatically improve employee,
customer, and business partner relationships; to support continuous improvement in business
operations and business processes; and to develop new business models and businesses.
A) Digital transformation
B) Digital vision
C) Technology transformation
D) Technology vision
6