Exam 12: Managing Systems Support and Security
Exam 1: Introduction to Systems Analysis and Design80 Questions
Exam 2: Analyzing the Business Case80 Questions
Exam 3: Managing Systems Projects80 Questions
Exam 4: Requirements Engineering79 Questions
Exam 5: Data and Process Modeling80 Questions
Exam 6: Object Modeling74 Questions
Exam 7: Development Strategies80 Questions
Exam 8: User Interface Design79 Questions
Exam 9: Data Design80 Questions
Exam 10: System Architecture80 Questions
Exam 11: Managing Systems Implementation80 Questions
Exam 12: Managing Systems Support and Security80 Questions
Exam 13: Communication-Tools45 Questions
Exam 14: Case-Tools45 Questions
Exam 15: Financial-Analysis-Tools42 Questions
Exam 16: Internet-Resource-Tools44 Questions
Select questions type
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
Free
(Multiple Choice)
5.0/5
(27)
Correct Answer:
D
To avoid problems,preventive maintenance _____.
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
D
_____ is the process of tracking system releases.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
_____ is the overall time between a request for system activity and the delivery of the response.
(Multiple Choice)
4.7/5
(37)
Perfective maintenance usually is cost effective _____ a system's operational life.
(Multiple Choice)
4.8/5
(30)
_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.
(Multiple Choice)
4.9/5
(32)
When a user submits a maintenance request,the system administrator makes an initial determination.
(True/False)
4.8/5
(34)
Retention periods of backups can be a specific number of months or years,depending on legal requirements and company policy.
(True/False)
4.9/5
(27)
A continuous backup only backs up files that are new or changed since the last full backup.
(True/False)
4.9/5
(31)
In a broad sense,credentials include formal degrees,diplomas,or certificates granted by learning institutions to show that a certain level of education has been achieved.
(True/False)
4.8/5
(27)
_____,a risk control strategy,eliminates risks by adding protective safeguards.
(Multiple Choice)
4.8/5
(36)
When a new version of a system is installed,the prior release is _____,or stored.
(Multiple Choice)
4.9/5
(36)
_____ analyzes an organization's assets,threats,and vulnerabilities.
(Multiple Choice)
4.7/5
(32)
A _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.
(Multiple Choice)
4.8/5
(28)
_____ ensures that authorized users have timely and reliable access to necessary information.
(Multiple Choice)
4.7/5
(31)
What is capacity planning? Include an explanation of what-if analysis in your answer.
(Essay)
4.7/5
(34)
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack.How does George categorize this threat?
(Multiple Choice)
4.9/5
(34)
A _____ is a formal reference point that measures system characteristics at a specific time.
(Multiple Choice)
4.8/5
(34)
Hard skills include communications,interpersonal,and perceptive abilities.
(True/False)
4.9/5
(33)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)