Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ is a new feature or capability added to an operational system that makes the system easier to use.

(Short Answer)
4.8/5
(34)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -An asymmetric kind of encryption.

(Multiple Choice)
4.8/5
(46)

Explain configuration management in depth.

(Essay)
4.9/5
(31)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -An internal or external entity that could endanger an asset.

(Multiple Choice)
4.8/5
(39)

____ involves studying the parts to understand the overall system.

(Multiple Choice)
4.8/5
(40)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Triangle that shows the three main elements of system security.

(Multiple Choice)
4.9/5
(30)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -A hostile act that targets the system or the company itself.

(Multiple Choice)
4.8/5
(44)

____________________ is the overall time between a request for system activity and the delivery of the response.

(Short Answer)
4.9/5
(37)

____________________ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.

(Short Answer)
4.9/5
(39)

Attacks are hostile acts that target the system, or the company itself. _________________________

(True/False)
4.7/5
(40)

A ____ is an internal or external entity that could endanger an asset.

(Multiple Choice)
4.8/5
(36)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -A process for controlling changes in system requirements during software development.

(Multiple Choice)
4.9/5
(41)

Risk ____ analyzes the organization's assets, threats, and vulnerabilities.

(Multiple Choice)
4.9/5
(39)

To enhance security, many companies are installing ____________________ scanning systems, which map an individual's facial features, fingerprints, handprint, or eye characteristics.

(Short Answer)
4.9/5
(39)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Protects the system and keeps it safe, free from danger, and reliable.

(Multiple Choice)
4.9/5
(41)

One of his firm's clients details an incident in which a hacker - a former employee - stole trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories does Jamal place this incident?

(Multiple Choice)
4.8/5
(34)

  -As shown in the accompanying figure, ____________________ maintenance is a type of maintenance that improves efficiency. -As shown in the accompanying figure, ____________________ maintenance is a type of maintenance that improves efficiency.

(Short Answer)
4.9/5
(38)

____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.

(Multiple Choice)
4.8/5
(32)

Perfective maintenance usually is cost effective ____ the system's operational life.

(Multiple Choice)
4.9/5
(49)

The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

(True/False)
4.8/5
(44)
Showing 41 - 60 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)