Exam 12: Managing Systems Support and Security
Exam 1: Introduction to Systems Analysis and Design112 Questions
Exam 2: Analyzing the Business Case112 Questions
Exam 3: Managing Systems Projects112 Questions
Exam 4: Requirements Modeling112 Questions
Exam 5: Data and Process Modeling112 Questions
Exam 6: Object Modeling112 Questions
Exam 7: Development Strategies112 Questions
Exam 8: User Interface Design112 Questions
Exam 9: Data Design112 Questions
Exam 10: System Architecture111 Questions
Exam 11: Managing Systems Implementation112 Questions
Exam 12: Managing Systems Support and Security112 Questions
Exam 13: Communication Tools45 Questions
Exam 14: CASE Tools44 Questions
Exam 15: Financial Analysis Tools44 Questions
Exam 16: Internet Resource Tools45 Questions
Select questions type
A(n) ____________________ is a new feature or capability added to an operational system that makes the system easier to use.
(Short Answer)
4.8/5
(34)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-An asymmetric kind of encryption.
(Multiple Choice)
4.8/5
(46)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-An internal or external entity that could endanger an asset.
(Multiple Choice)
4.8/5
(39)
____ involves studying the parts to understand the overall system.
(Multiple Choice)
4.8/5
(40)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-Triangle that shows the three main elements of system security.
(Multiple Choice)
4.9/5
(30)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-A hostile act that targets the system or the company itself.
(Multiple Choice)
4.8/5
(44)
____________________ is the overall time between a request for system activity and the delivery of the response.
(Short Answer)
4.9/5
(37)
____________________ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.
(Short Answer)
4.9/5
(39)
Attacks are hostile acts that target the system, or the company itself. _________________________
(True/False)
4.7/5
(40)
A ____ is an internal or external entity that could endanger an asset.
(Multiple Choice)
4.8/5
(36)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-A process for controlling changes in system requirements during software development.
(Multiple Choice)
4.9/5
(41)
Risk ____ analyzes the organization's assets, threats, and vulnerabilities.
(Multiple Choice)
4.9/5
(39)
To enhance security, many companies are installing ____________________ scanning systems, which map an individual's facial features, fingerprints, handprint, or eye characteristics.
(Short Answer)
4.9/5
(39)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-Protects the system and keeps it safe, free from danger, and reliable.
(Multiple Choice)
4.9/5
(41)
One of his firm's clients details an incident in which a hacker - a former employee - stole trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories does Jamal place this incident?
(Multiple Choice)
4.8/5
(34)
-As shown in the accompanying figure, ____________________ maintenance is a type of maintenance that improves efficiency.

(Short Answer)
4.9/5
(38)
____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
(Multiple Choice)
4.8/5
(32)
Perfective maintenance usually is cost effective ____ the system's operational life.
(Multiple Choice)
4.9/5
(49)
The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life.
(True/False)
4.8/5
(44)
Showing 41 - 60 of 112
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)