Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ costs include expenses for items such as supplies, equipment rental, and software leases.

(Multiple Choice)
4.7/5
(38)

One of Jamal's clients reports that the traffic on their network is being intercepted and scanned for valuable information. How does Jamal categorize this incident?

(Multiple Choice)
5.0/5
(35)

____ shifts the risk to another asset or party, such as an insurance company, in risk control.

(Multiple Choice)
4.8/5
(48)

Companies with limited resources always consider new systems development, adaptive maintenance, and corrective maintenance less important than perfective maintenance.

(True/False)
4.8/5
(36)

The use of a(n) ____________________ password requires that the password be entered before the computer can be started.

(Short Answer)
4.8/5
(35)

Requests for corrective and adaptive maintenance normally come from the IT department, while users usually initiate perfective maintenance.

(True/False)
4.7/5
(34)

Corrective maintenance ____.

(Multiple Choice)
4.8/5
(37)

When corrective action cannot occur immediately, users appreciate feedback from the system administrator and should be kept informed of any decisions or actions that affect their maintenance requests.

(True/False)
4.8/5
(40)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Uses analytical techniques to identify potential quality and performance improvements in an information system.

(Multiple Choice)
4.9/5
(43)

Bandwidth requirements are expressed in bytes per minute.

(True/False)
4.7/5
(45)

What is capacity planning? Include an explanation of what-if analysis in your answer.

(Essay)
4.8/5
(31)

____ prevents unauthorized users from creating, modifying, or deleting information.

(Multiple Choice)
4.9/5
(36)

____________________ means that in normal operating conditions, any transaction that occurs on the primary system must automatically propagate to the hot site.

(Short Answer)
4.8/5
(26)

  -As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance. -As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance.

(Multiple Choice)
5.0/5
(38)

  -As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by ____ maintenance. -As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by ____ maintenance.

(Multiple Choice)
4.9/5
(39)

Using software ____________________ techniques, an analyst can analyze a system's quality or performance.

(Short Answer)
4.9/5
(23)

____ ensures that authorized users have timely and reliable access to necessary information.

(Multiple Choice)
4.9/5
(36)

When a(n) ____________________ is used, all noncritical changes to a system are held until they can be implemented at the same time.

(Short Answer)
4.8/5
(35)

Depending on the system, bandwidth might be measured in any of the following except ____.

(Multiple Choice)
4.8/5
(32)

IT staff members usually initiate requests for perfective and preventive maintenance.

(True/False)
4.9/5
(44)
Showing 81 - 100 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)