0% found this document useful (0 votes)
45 views10 pages

Assessment 2 - Attempt Review

Uploaded by

khophosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views10 pages

Assessment 2 - Attempt Review

Uploaded by

khophosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

UNISA  2024  INF1505-24-Y  Welcome to the module INF1505: An Introduction to Business Information Systems  Assessment 2

QUIZ

Started on Wednesday, 26 June 2024, 11:08 PM


State Finished
Completed on Wednesday, 26 June 2024, 11:48 PM
Time taken 39 mins 59 secs
Grade 21.00 out of 25.00 (84%)

Question 1

Correct

Mark 1.00 out of 1.00

The main function of Cyber Incident Response Capability (CIRC) is to _____.

a. provide information on security incidents 

b. provide level 1 security

c. restrict access controls to unauthorized personnel

d. create backdoors to bypass security protocols

LEARNING OBJECTIVES: MIS.10e.5.5

The correct answer is:


provide information on security incidents

Question 2

Correct

Mark 1.00 out of 1.00

In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for
decision making.

a. immersion

b. convergence 

c. integration

d. telepresence

LEARNING OBJECTIVES: MIS.10e.6.9

The correct answer is:


convergence
Question 3

Correct

Mark 1.00 out of 1.00

Which federal law is intended to protect data collected from children?

a. HIPAA

b. GDPR

c. COPPA 

d. FACTA

LEARNING OBJECTIVES: MIS.10e.4.3

The correct answer is:


COPPA

Question 4

Correct

Mark 1.00 out of 1.00

According to the 1980 revisions to the Copyright Act of 1976, _____.

a. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers

b. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs 

c. copyright holders can perform a copyrighted work by means of digital audio transmission

d. copyright protection extends to original works of authorship in architectural fields

LEARNING OBJECTIVES: MIS.10e.4.5

The correct answer is:


both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs

Question 5

Correct

Mark 1.00 out of 1.00

In which architecture is the application logic usually on the client side?

a. middle-tier

b. data tier

c. two-tier 

d. session tier

LEARNING OBJECTIVES: MIS.10e.6.6

The correct answer is:


two-tier
Question 6

Correct

Mark 1.00 out of 1.00

A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent
from computer to computer over a network.

a. packet 

b. bandwidth

c. protocol

d. topology

LEARNING OBJECTIVES: MIS.10e.6.6

The correct answer is:


packet

Question 7

Correct

Mark 1.00 out of 1.00

A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.

a. controller area network

b. metropolitan area network 

c. local area network

d. wide area network

LEARNING OBJECTIVES: MIS.10e.6.4

The correct answer is:


metropolitan area network
Question 8

Correct

Mark 1.00 out of 1.00

The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information
security.

a. SWOT analysis

b. McCumber cube 

c. Bohr model

d. Six Sigma model

LEARNING OBJECTIVES: MIS.10e.5.3

The correct answer is:


McCumber cube

Question 9

Correct

Mark 1.00 out of 1.00

Deepfakes  are fake videos or audio recordings that look and sound just like the real thing.

Section 4.1

The correct answer is: Deepfakes

Question 10

Correct

Mark 1.00 out of 1.00

Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal
information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

a. cybersquatting

b. screening

c. sniffing

d. pharming 

LEARNING OBJECTIVES: MIS.10e.5.2

The correct answer is:


pharming
Question 11

Correct

Mark 1.00 out of 1.00

_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.

a. Code division multiple access

b. An analog modem

c. A cable modem

d. Digital subscriber line 

LEARNING OBJECTIVES: MIS.10e.6.2

The correct answer is:


Digital subscriber line

Question 12

Incorrect

Mark 0.00 out of 1.00

Social engineering is an attack that takes advantage of the backdoors in security systems.

True 
False

The correct answer is 'False'.

Question 13

Correct

Mark 1.00 out of 1.00

A rootkit  is a series of software tools that enable an unauthorized user to gain access to a computer or
network system without being detected.

The correct answer is: rootkit


Question 14

Correct

Mark 1.00 out of 1.00

Protocols are devices that connect users to the Internet.

True

False 

LEARNING OBJECTIVES: MIS.10e.6.2

The correct answer is 'False'.

Question 15

Correct

Mark 1.00 out of 1.00

Identify a true statement about copyright laws.

a. They protect product identifying marks, such as logos.

b. They protect tangible material, such as books. 

c. They protect new processes.

d. They protect product names.

LEARNING OBJECTIVES: MIS.10e.4.5

The correct answer is:


They protect tangible material, such as books.

Question 16

Correct

Mark 1.00 out of 1.00

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

a. spear phishing involves monitoring and recording keystrokes.

b. in spear phishing, hackers capture and record network traffic.

c. spear phishing involves collecting sensitive information via phone calls.

d. in spear phishing, the attack is targeted toward a specific person or a group. 

LEARNING OBJECTIVES: MIS.10e.5.2

The correct answer is:


in spear phishing, the attack is targeted toward a specific person or a group.
Question 17

Correct

Mark 1.00 out of 1.00

In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:

a. a system can easily be restored to operational status.

b. the person using a credit card number is the card’s legitimate owner. 

c. the accuracy of information resources within an organization is maintained.

d. a system quickly recovers in the event of a system failure or disaster.

LEARNING OBJECTIVES: MIS.10e.5.5

The correct answer is:


the person using a credit card number is the card’s legitimate owner.

Question 18

Correct

Mark 1.00 out of 1.00

Unlike the other disadvantages of wireless, throughput is expected to become a bigger problem in the future.

True 

False

The correct answer is 'True'.

Question 19

Correct

Mark 1.00 out of 1.00

_____ is one of the most popular password managers.

a. CounterSpy

b. Dashlane 

c. FilePro

d. STOPzilla

LEARNING OBJECTIVES: MIS.10e.5.5

The correct answer is:


Dashlane
Question 20

Correct

Mark 1.00 out of 1.00

Which is a potential benefit of telecommuting?

a. It increases the interaction with coworkers.

b. It separates work and home life.

c. It increases productivity. 

d. It regulates work routine.

LEARNING OBJECTIVES: MIS.10e.4.6

The correct answer is:


It increases productivity.

Question 21

Incorrect

Mark 0.00 out of 1.00

Which of the following is true of the 3G network?

a. Has less advanced network capacity than 2G 

b. Features a wider range of services than 2G

c. Is unable to accommodate streaming video

d. Requires a nearby Wi-Fi network

LEARNING OBJECTIVES: MIS.10e.6.9

The correct answer is:


Features a wider range of services than 2G

Question 22

Correct

Mark 1.00 out of 1.00

__________ are the top three countries for generating spam.

a. China, South Africa, and Germany

b. The United States, China, and Russia 

c. Nigeria, the Ukraine, and Mexico

d. Iceland, Chile, and India

LEARNING OBJECTIVES: MIS.10e.4.3

The correct answer is:


The United States, China, and Russia
Question 23

Correct

Mark 1.00 out of 1.00

In the context of information privacy, which of the following is true of spam?

a. It is sent in bulk using automated mailing software. 

b. It can only be used to provide access to legitimate e-mails.

c. It can only be send to a small number of people.

d. It is solicited e-mail sent for business purposes.

LEARNING OBJECTIVES: MIS.10e.4.1

The correct answer is:


It is sent in bulk using automated mailing software.

Question 24

Incorrect

Mark 0.00 out of 1.00

Using _____ is a way to solve health issues related to computer equipment.

a. wired keyboards

b. a high speed Internet

c. correct lighting

d. a high capacity RAM 

LEARNING OBJECTIVES: MIS.10e.4.6

The correct answer is:


correct lighting

Question 25

Not answered

Marked out of 1.00

_____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of
the mind” developed by people or businesses.

a. An identity log file

b. Information policy

c. A virtual organization

d. Intellectual property

LEARNING OBJECTIVES: MIS.10e.4.5

The correct answer is:


Intellectual property

You might also like