MIS PAR exam with Complete Solutions 100%
Verified | Updated Questions
IT makes managers ___ productive and ___ the number of employees who can report to
a single manager - ANSWER more; increases
In the case study "IT's About Business 1.3" ( at the beginning of section 1.4 of the
textbook), approximately ____ percent of Cuba's citizens have Internet access at home.
- ANSWER 5
IT changes managers' job by - ANSWER providing near real-time information so
managers can make quicker decisions.
Which company used software to disrupt the previous market-leading companies in the
book industry? - ANSWER Amazon
IT __________ be used to create a competitive advantage ___________. - ANSWER can;
when it is used effectively
Wireless is a(n) inherently _________ network. - ANSWER untrusted
_____ is an attack in which the perpetrator uses social skills to trick or manipulate
legitimate employees into providing confidential company information such as
passwords - ANSWER Social engineering
A _____ is a remote attack requiring user action. - ANSWER Phishing attack
_____ is a remote attack requiring user action. - ANSWER Virus
, _____ is any danger to which a system may be exposed - ANSWER Threat
Mainframes make it easy to communicate freely and seamlessly with everyone. -
ANSWER FALSE
Social engineering is a(n) ____ threat on the part of the employee and a(n) ______
threat on the part of the social engineer. - ANSWER unintentional; deliberate
Coca-Cola's formula is an example of a ___________. - ANSWER Trade secret
__________ is an identity theft technique. - ANSWER Dumpster diving
________ is any danger to which a system may be exposed. - ANSWER Threat
You have a small business that has had problems with malware on your employees'
computers. You decide to hire a third-party company such as GFI Software to implement
security controls and then monitor your company's systems. You are adopting a risk
_______ strategy. - ANSWER Transference
Auditing __________ the computer means inputs, outputs, and processing are checked.
A. Around
B. Into
C. Through
D. With - ANSWER Through
______ is one common example of TLS ( formerly SSL). - ANSWER https
Verified | Updated Questions
IT makes managers ___ productive and ___ the number of employees who can report to
a single manager - ANSWER more; increases
In the case study "IT's About Business 1.3" ( at the beginning of section 1.4 of the
textbook), approximately ____ percent of Cuba's citizens have Internet access at home.
- ANSWER 5
IT changes managers' job by - ANSWER providing near real-time information so
managers can make quicker decisions.
Which company used software to disrupt the previous market-leading companies in the
book industry? - ANSWER Amazon
IT __________ be used to create a competitive advantage ___________. - ANSWER can;
when it is used effectively
Wireless is a(n) inherently _________ network. - ANSWER untrusted
_____ is an attack in which the perpetrator uses social skills to trick or manipulate
legitimate employees into providing confidential company information such as
passwords - ANSWER Social engineering
A _____ is a remote attack requiring user action. - ANSWER Phishing attack
_____ is a remote attack requiring user action. - ANSWER Virus
, _____ is any danger to which a system may be exposed - ANSWER Threat
Mainframes make it easy to communicate freely and seamlessly with everyone. -
ANSWER FALSE
Social engineering is a(n) ____ threat on the part of the employee and a(n) ______
threat on the part of the social engineer. - ANSWER unintentional; deliberate
Coca-Cola's formula is an example of a ___________. - ANSWER Trade secret
__________ is an identity theft technique. - ANSWER Dumpster diving
________ is any danger to which a system may be exposed. - ANSWER Threat
You have a small business that has had problems with malware on your employees'
computers. You decide to hire a third-party company such as GFI Software to implement
security controls and then monitor your company's systems. You are adopting a risk
_______ strategy. - ANSWER Transference
Auditing __________ the computer means inputs, outputs, and processing are checked.
A. Around
B. Into
C. Through
D. With - ANSWER Through
______ is one common example of TLS ( formerly SSL). - ANSWER https