Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In addition to benchmark testing,performance measurements,called _____,can monitor the number of transactions processed in a given time period,the number of records accessed,and the volume of online data.

(Multiple Choice)
4.8/5
(38)

_____ includes monitoring a system for signs of trouble,logging all system failures,diagnosing the problem,and applying corrective action.

(Multiple Choice)
4.8/5
(37)

In a public key encryption environment,each user on the network has a pair of keys: a foreign key and a private key.

(True/False)
4.9/5
(36)

_____ prevents unauthorized users from creating,modifying,or deleting information.

(Multiple Choice)
4.8/5
(37)

Provide three signs indicating a system has reached the end of its economically useful life.

(Essay)
4.7/5
(30)

_____ measures the time between submitting a request for information and the fulfillment of the request.

(Multiple Choice)
4.9/5
(40)

The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

(Multiple Choice)
4.7/5
(28)

A help desk can boost its productivity by using _____,which allows IT staff to take over a user's workstation and provide support and troubleshooting.

(Multiple Choice)
4.7/5
(44)

Cloud computing provides the IT infrastructure that enables service orientation.

(True/False)
4.8/5
(41)

Adaptive maintenance _____.

(Multiple Choice)
4.8/5
(41)

_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.

(Multiple Choice)
4.8/5
(39)

A patch is a specially written software module that provides temporary repairs so operations can resume.

(True/False)
4.8/5
(36)

A _____ is an internal or external entity that could endanger an asset.

(Multiple Choice)
4.8/5
(33)

_____ protects information from unauthorized disclosure and safeguards privacy.

(Multiple Choice)
4.9/5
(36)

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

(Multiple Choice)
4.8/5
(33)

If significant changes take place in an existing system or if a new version is released,the IT department might develop a _____.

(Multiple Choice)
4.8/5
(35)

The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

(Multiple Choice)
4.7/5
(30)

Both adaptive and perfective maintenance activities decrease in a dynamic business environment.

(True/False)
4.9/5
(39)

Corrective maintenance _____.

(Multiple Choice)
4.8/5
(32)

In dumpster diving attacks,an intruder raids desks or trash bins for valuable information.

(True/False)
4.7/5
(36)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)