Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.

Free
(Multiple Choice)
5.0/5
(27)
Correct Answer:
Verified

D

To avoid problems,preventive maintenance _____.

Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
Verified

D

_____ is the process of tracking system releases.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

_____ is the overall time between a request for system activity and the delivery of the response.

(Multiple Choice)
4.7/5
(37)

Perfective maintenance usually is cost effective _____ a system's operational life.

(Multiple Choice)
4.8/5
(30)

_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.

(Multiple Choice)
4.9/5
(32)

When a user submits a maintenance request,the system administrator makes an initial determination.

(True/False)
4.8/5
(34)

Retention periods of backups can be a specific number of months or years,depending on legal requirements and company policy.

(True/False)
4.9/5
(27)

A continuous backup only backs up files that are new or changed since the last full backup.

(True/False)
4.9/5
(31)

Define network.What is required to connect to a network?

(Essay)
4.9/5
(42)

In a broad sense,credentials include formal degrees,diplomas,or certificates granted by learning institutions to show that a certain level of education has been achieved.

(True/False)
4.8/5
(27)

_____,a risk control strategy,eliminates risks by adding protective safeguards.

(Multiple Choice)
4.8/5
(36)

When a new version of a system is installed,the prior release is _____,or stored.

(Multiple Choice)
4.9/5
(36)

_____ analyzes an organization's assets,threats,and vulnerabilities.

(Multiple Choice)
4.7/5
(32)

A _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.

(Multiple Choice)
4.8/5
(28)

_____ ensures that authorized users have timely and reliable access to necessary information.

(Multiple Choice)
4.7/5
(31)

What is capacity planning? Include an explanation of what-if analysis in your answer.

(Essay)
4.7/5
(34)

Another of George's clients has software that is outdated and has become increasingly vulnerable to attack.How does George categorize this threat?

(Multiple Choice)
4.9/5
(34)

A _____ is a formal reference point that measures system characteristics at a specific time.

(Multiple Choice)
4.8/5
(34)

Hard skills include communications,interpersonal,and perceptive abilities.

(True/False)
4.9/5
(33)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)