Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Decision Support and Artificial Intelligence

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
17-07-2025
Written in
2024/2025

Decision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial IntelligenceDecision Support and Artificial Intelligence

Show more Read less
Institution
Course

Content preview

MIS Chapter 12 Test Bank



Save




A ________ is a person or organization that seeks to obtain data or other assets illegally,

without the owner's permission and often without the owner's knowledge.

A) target

B) vulnerability

C) threat

D) warning - (correct Answer) - C

Which of the following is considered a threat caused by human error?

A) An employee inadvertently installs an old database on top of the current one.

B) An employee intentionally destroys data and system components.

C) A virus and worm writer infects computer systems.

D) A hacker breaks into a system to steal for financial gain. - (correct Answer) - A

Which of the following is considered a computer crime?

A) accidentally deleting customer records

B) poorly written programs resulting in data losses

C) loss of data as a result of flooding

D) hacking of information systems - (correct Answer) - D

________ occurs when someone deceives by pretending to be someone else.

A) Hacking

B) Baiting

C) Sniffing

D) Pretexting - (correct Answer) - D

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all

,examples of ________.

A) unauthorized data disclosure

B) incorrect data modification

C) faulty services

D) loss of infrastructure - (correct Answer) - A

A ________ pretends to be a legitimate company and sends an email requesting confidential

data, such as account numbers, Social Security numbers, account passwords, and so forth.

A) hacker

B) phisher

C) safeguard

D) sniffer - (correct Answer) - B

Email spoofing is a synonym for ________.

A) hacking

B) phishing

C) usurping

D) sniffing - (correct Answer) - B

________ is a technique for intercepting computer communications, either through a physical

connection to a network or, in the case of wireless networks, with no physical connection.

A) Spoofing

B) Phishing

C) Sniffing

D) Pretexting - (correct Answer) - C

________ take computers with wireless connections through an area and search for

unprotected wireless networks and then monitor and intercept wireless traffic at will.

A) Drive-by spoofers

B) Pretexters

C) Drive-by sniffers

, D) Phishers - (correct Answer) - C

Which of the following is an example of a sniffing technique?

A) IP spoofing

B) caches

C) ad blockers

D) adware - (correct Answer) - D

________ occurs when a person breaks into a network to steal data such as customer lists,

product inventory data, employee data, and other proprietary and confidential data.

A) Pretexting

B) Phishing

C) Hacking

D) Spoofing - (correct Answer) - C

Which of the following is most likely to be the result of hacking?

A) certain Web sites being blocked from viewing for security reasons

B) small amounts of spam in your inbox

C) an unexplained reduction in your account balance

D) pop-up ads appearing frequently - (correct Answer) - C

________ occurs through human error when employees do not follow proper procedures or

when procedures have not been well designed.

A) Unauthorized data disclosure

B) Incorrect data modification

C) Denial of service

D) Loss of infrastructure - (correct Answer) - B

________ occurs when computer criminals invade a computer system and replace legitimate

programs with their own unauthorized ones that shut down legitimate applications and substitute

their own processing to spy, steal and manipulate data, or other purposes.

A) Hacking

Written for

Course

Document information

Uploaded on
July 17, 2025
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
jamrefjm

Get to know the seller

Seller avatar
jamrefjm NURSING
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
1
Documents
768
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions