Exam 12: Managing Systems Support and Security
Exam 1: Introduction to Systems Analysis and Design112 Questions
Exam 2: Analyzing the Business Case112 Questions
Exam 3: Managing Systems Projects112 Questions
Exam 4: Requirements Modeling112 Questions
Exam 5: Data and Process Modeling112 Questions
Exam 6: Object Modeling112 Questions
Exam 7: Development Strategies112 Questions
Exam 8: User Interface Design112 Questions
Exam 9: Data Design112 Questions
Exam 10: System Architecture111 Questions
Exam 11: Managing Systems Implementation112 Questions
Exam 12: Managing Systems Support and Security112 Questions
Exam 13: Communication Tools45 Questions
Exam 14: CASE Tools44 Questions
Exam 15: Financial Analysis Tools44 Questions
Exam 16: Internet Resource Tools45 Questions
Select questions type
In many companies, the systems review committee separates maintenance requests from new systems development requests when evaluating requests and setting priorities.
(True/False)
4.8/5
(46)
____ protects information from unauthorized disclosure and safeguards privacy.
(Multiple Choice)
4.7/5
(30)
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
(Multiple Choice)
4.9/5
(29)
If a maintenance request involves a severe problem, a system administrator either accepts or rejects the request or postpones action pending further study.
(True/False)
5.0/5
(32)
One technique that can be used in perfective maintenance is software reengineering.
(True/False)
4.9/5
(34)
Adaptive maintenance always is less difficult than new systems development because the enhancements need not work within the constraints of an existing system.
(True/False)
4.7/5
(43)
In a PKE environment, each user on the network has a pair of keys: a public key and a private key.
(True/False)
4.9/5
(40)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-Uses a single key to encrypt and decrypt information.
(Multiple Choice)
4.8/5
(40)
As enterprise-wide information systems grow more complex, configuration management becomes less and less useful.
(True/False)
4.8/5
(46)
Using a release methodology increases the documentation burden. _________________________
(True/False)
4.9/5
(46)
A(n) ____________________ is defined as two or more devices that are connected for the purpose of sending, receiving, and sharing data.
(Short Answer)
5.0/5
(42)
With a release methodology, even when changes would improve system efficiency or user productivity, the potential savings must wait until the next release date, which might increase operational costs.
(True/False)
4.8/5
(41)
The release methodology offers all of the following advantages except ____.
(Multiple Choice)
4.9/5
(26)
A ____ is a formal reference point that measures system characteristics at a specific time.
(Multiple Choice)
4.8/5
(37)
In addition to functioning as a valuable link between IT staff and users, a help desk is a central contact point for all IT maintenance activities.
(True/False)
4.9/5
(36)
____________________ is the process of tracking system releases.
(Short Answer)
4.8/5
(33)
Preset ____ determine whether a firewall will allow network traffic to pass.
(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 112
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)