You are on page 1of 3

MIS107 Midterm 2b | Covers: Telecom, Security & Ethics, Security Mgt.

Lab Google Sheets


MCQ/TF 10x1 + Broad Question 2x5 = 20 %; Answer all questions
Answer objectively considering the textbook, and lectures. Answer within the context of a manager within an organization.

1 A ___ is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
◯ traffic control ◯ VPN ◯ firewall ◯ encryption

2 Orbiting devices that provide multiple communication channels over a large geographical area are
referred to as wireless LAN.
◯ True ◯ False

3 The standard suite of protocols used by the Internet, intranets, extranets, and some other networks.
◯ TCP/IP ◯ Open Systems Interconnection (OSI) ◯ http/ftp
◯ Client/server networks ◯ Peer-to-peer networks ◯ TLS/AES

4 Extranets are internet-like networks that improve communications and collaboration, publish and
share information, and develop applications to support business operations and decision making
within an organization.
◯ True ◯ False

5 ... refers to using your voice or fingerprints to identify yourself electronically.


◯ Barcode ◯ RFID
◯ Cyber Law ◯ Biometric security ◯ Audit trail

6 Unauthorized copying of software refers to ...


◯ hacking ◯ cracking
◯ software piracy ◯ Computer crime ◯ hi-jacking

7 Public-key cryptography is a cryptographic system that uses pairs of keys: public keys and private
keys. The public keys are known only to the owner.
◯ True ◯ False

8 Software that causes unintentional harm due to some deficiency is typically described as a ___.
◯ patch ◯ malware
◯ update ◯ software error ◯ software bug

9 ___ is the act of creating a website, as a hoax, with the intention of misleading visitors to the site.
◯ IP spoofing ◯ Email spoofing
◯ DNS spoofing ◯ Website spoofing

1 Using sniffing tools, attackers can sniff sensitive information from a network, including Email traffic
0 (SMTP, POP, IMAP traffic), Web traffic (HTTP), FTP traffic (Telnet authentication, FTP Passwords,
SMB, NFS) and many more.
◯ True ◯ False

Bonus: Draw the diagram on the back of this page- “ how DDOS attack works”.

222-MIS107 Midterm2b NSU ID-> Page 1 of 3


1. Explain five different (IS related) unethical behaviors at the workplace and how to manage them within
an organization (e.g. Daraz)..

Chosen Organization:

Behavior Solution at the chosen organization

222-MIS107 Midterm2b NSU ID-> Page 2 of 3


2. List five telecommunication media and explain why an organization (e.g. Daraz) might use them.

Chosen Organization:

Telecom. media Business use at the chosen organization

222-MIS107 Midterm2b NSU ID-> Page 3 of 3

You might also like