Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Ok, I understand!
Your school or university
Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Week 6a: RISK ASSESSMENT

1	Belmont State Bank (mini-case)

2	What is the definition of CDP?

3	What is the difference between the firewall and the NAT?



Week 6b:SECURITY SYSTEM

1	Biometric System: Explain how biometric systems can improve security? What are the advantages and disadvantages of using biometric systems? Are there privacy issues with biometric systems?

2	Please give two examples if exactly how biometrics improves security?

3	Good posting. What are the top three reasons why ...
MIS 589 Week 6 Discussion Questions
Last document update:
ago
Week 6a: RISK ASSESSMENT

1	Belmont State Bank (mini-case)

2	What is the definition of CDP?

3	What is the difference between the firewall and the NAT?



Week 6b:SECURITY SYSTEM

1	Biometric System: Explain how biometric systems can improve security? What are the advantages and disadvantages of using biometric systems? Are there privacy issues with biometric systems?

2	Please give two examples if exactly how biometrics improves security?

3	Good posting. What are the top three reasons why ...
MIS 589 WEEK 6 QUIZ

QUESTIONS ANS ANSWERS1 / 1 pts

(TCO E) Which of the following is not one of the major categories (or sub-categories) into which network

security threats can be placed?



Disruption



Destruction

Correct!

Controlled chaos



Intrusion



Disaster

Question 2

1 / 1 pts

(TCO E) An example of _____ data would be if a computer virus eliminated files on that computer.



disruption



controlled chaosCorrect!



destruction



intrusion



disaster

Question 3

...
MIS 589 WEEK 6 QUIZ QUESTIONS ANS ANSWERS
Last document update:
ago
MIS 589 WEEK 6 QUIZ

QUESTIONS ANS ANSWERS1 / 1 pts

(TCO E) Which of the following is not one of the major categories (or sub-categories) into which network

security threats can be placed?



Disruption



Destruction

Correct!

Controlled chaos



Intrusion



Disaster

Question 2

1 / 1 pts

(TCO E) An example of _____ data would be if a computer virus eliminated files on that computer.



disruption



controlled chaosCorrect!



destruction



intrusion



disaster

Question 3

...
MIS 589 Week 5 quizTCO C) _____ are companies that build a data and telecommunications infrastructure from which other

companies can lease services for WANs and MANs.Correct!



Common carriers



Router manufacturers



Standards organizations



CSUs



PUCs

Question 2

1 / 1 pts

(TCO C) A _____ are devices that permit a user to connect to a digital T-carrier service.



modem



codec

Correct!

CSU/DSU



NIC



ATM

Question 3

1 / 1 pts

(TCO C) _____ are dedicated digital ci...
MIS 589 Week 5 quiz| GRADED A
Last document update:
ago
MIS 589 Week 5 quizTCO C) _____ are companies that build a data and telecommunications infrastructure from which other

companies can lease services for WANs and MANs.Correct!



Common carriers



Router manufacturers



Standards organizations



CSUs



PUCs

Question 2

1 / 1 pts

(TCO C) A _____ are devices that permit a user to connect to a digital T-carrier service.



modem



codec

Correct!

CSU/DSU



NIC



ATM

Question 3

1 / 1 pts

(TCO C) _____ are dedicated digital ci...
MIS 589 Week 8 Final Exam with Answers | LATEST ANSWERS
Exam (elaborations) • 10
pages
• 2022
MIS 589 Week 8 Final Exam with

Answers

1.

Question :

Student Answer:

(TCO A) Which of the following is not true about a server?

Stores data and software that can be accessed by the client

May be a personal computer or a mainframe on the network

In client or server computing, they work together over the network

with client computers to support the business application.

Stores documents and graphics that can be accessed from any

web browser

Can only perform one function on a network

I...
MIS 589 Week 8 Final Exam with Answers | LATEST ANSWERS
Last document update:
ago
MIS 589 Week 8 Final Exam with

Answers

1.

Question :

Student Answer:

(TCO A) Which of the following is not true about a server?

Stores data and software that can be accessed by the client

May be a personal computer or a mainframe on the network

In client or server computing, they work together over the network

with client computers to support the business application.

Stores documents and graphics that can be accessed from any

web browser

Can only perform one function on a network

I...
MIS 589 Week 2 Quiz with

Answers

Question 1

1 / 1 pts

(TCO B) Two fundamentally different types of data are

DSL and ADSL.

asymmetric and symmetric.

Microsoft and IBM.Correct!

digital and analog.

local area and wide area.

Question 2

1 / 1 pts

(TCO B) Having a conversation with someone using a cellular phone is an example of _____

transmission.

simplexCorrect!

full-duplex

half-duplex

analog

digital

Question 3

1 / 1 pts

(TCO B) Which of the following would be considered a type ...
MIS 589 Week 2 Quiz with Answers
Last document update:
ago
MIS 589 Week 2 Quiz with

Answers

Question 1

1 / 1 pts

(TCO B) Two fundamentally different types of data are

DSL and ADSL.

asymmetric and symmetric.

Microsoft and IBM.Correct!

digital and analog.

local area and wide area.

Question 2

1 / 1 pts

(TCO B) Having a conversation with someone using a cellular phone is an example of _____

transmission.

simplexCorrect!

full-duplex

half-duplex

analog

digital

Question 3

1 / 1 pts

(TCO B) Which of the following would be considered a type ...
MIS 589 WEEK 6 QUIZ

QUESTIONS ANS ANSWERS

Question 1

1 / 1 pts

(TCO E) Which of the following is not one of the major categories (or sub-categories) into which network

security threats can be placed?

Disruption

Destruction

Correct!

Controlled chaos

Intrusion

Disaster

Question 2

1 / 1 pts

(TCO E) An example of _____ data would be if a computer virus eliminated files on that computer.

disruption

controlled chaosCorrect!

destruction

intrusion

disaster

Question 3

1 / 1 pts

(TCO...
MIS 589 WEEK 6 QUIZ QUESTIONS ANS ANSWERS
Last document update:
ago
MIS 589 WEEK 6 QUIZ

QUESTIONS ANS ANSWERS

Question 1

1 / 1 pts

(TCO E) Which of the following is not one of the major categories (or sub-categories) into which network

security threats can be placed?

Disruption

Destruction

Correct!

Controlled chaos

Intrusion

Disaster

Question 2

1 / 1 pts

(TCO E) An example of _____ data would be if a computer virus eliminated files on that computer.

disruption

controlled chaosCorrect!

destruction

intrusion

disaster

Question 3

1 / 1 pts

(TCO...
MIS 589 Week 3 Quiz with

Answers

Question 1. 1. (TCO B) The

layer links the application layer with the network layer and is

responsible for end-to-end delivery of messages. (Points : 1)

physical

transport

session

presentation

data link

Question 2. 2. (TCO B) Transmission control protocol and Internet protocol was developed for

1974. (Points : 1)

in

ARPANET

IBM

Hewlett-Packard

University of Minnesota

Xerox

Question 3. 3. (TCO B) The source destination port identifier tells the d...
MIS 589 Week 3 Quiz with Answers
Last document update:
ago
MIS 589 Week 3 Quiz with

Answers

Question 1. 1. (TCO B) The

layer links the application layer with the network layer and is

responsible for end-to-end delivery of messages. (Points : 1)

physical

transport

session

presentation

data link

Question 2. 2. (TCO B) Transmission control protocol and Internet protocol was developed for

1974. (Points : 1)

in

ARPANET

IBM

Hewlett-Packard

University of Minnesota

Xerox

Question 3. 3. (TCO B) The source destination port identifier tells the d...
MIS 589 Week 4 Quiz with Answers

Question 1. 1. (TCO C) A(n)

disk drive. (Points : 1)

allows many users to share the same set of files on a common, shared

print server

database server

file server

piconet server

local area and wide area

Question 2. 2. (TCO C) Which of the following is not an advantage of using CAT5 unshielded twisted pair

for cabling LANs? (Points : 1)

Cost (relative to fiber)

Thickness (relative to coax)

Weight (relative to coax)

Flexibility (relative to coax)

Sec...
MIS 589 Week 4 Quiz with Answers
Last document update:
ago
MIS 589 Week 4 Quiz with Answers

Question 1. 1. (TCO C) A(n)

disk drive. (Points : 1)

allows many users to share the same set of files on a common, shared

print server

database server

file server

piconet server

local area and wide area

Question 2. 2. (TCO C) Which of the following is not an advantage of using CAT5 unshielded twisted pair

for cabling LANs? (Points : 1)

Cost (relative to fiber)

Thickness (relative to coax)

Weight (relative to coax)

Flexibility (relative to coax)

Sec...
As you read this, a fellow student has made another $4.70
How did he do that? By selling his study resources on Stuvia. Try it yourself!
Discover all about earning on Stuvia