Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

As enterprise-wide information systems grow more complex,configuration management becomes trivial.

(True/False)
4.9/5
(27)

One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid.In which of the following categories should George place this incident?

(Multiple Choice)
4.9/5
(36)

Preventative maintenance adds new capability and enhancements.

(True/False)
4.9/5
(30)

In a secluded engineering attack,an intruder uses social interaction to gain access to a computer system.

(True/False)
4.8/5
(31)

When a maintenance release methodology is used,all changes,critical and noncritical,are implemented consecutively as they arrive.

(True/False)
4.8/5
(31)

In maintenance management,_____ means examining the whole in order to learn about the individual elements.

(Multiple Choice)
4.9/5
(40)

One highly publicized form of social engineering is called post texting,which is a method of obtaining personal information under false pretenses.

(True/False)
4.8/5
(35)

A _____ is a security weakness or soft spot.

(Multiple Choice)
4.8/5
(36)

_____ is a process for controlling changes in system requirements during software development.

(Multiple Choice)
4.8/5
(34)

An incremental backup only includes recent files that have never been backed up by any method.

(True/False)
4.7/5
(28)

A(n)_____ is an attack that takes advantage of a vulnerability.

(Multiple Choice)
4.8/5
(38)

Backup media can include tape,hard drives,optical storage,and online storage.

(True/False)
4.9/5
(33)

Explain the importance of technical credentials and certification.

(Essay)
4.9/5
(38)

_____ describes the amount of data that a system can transfer in a fixed time period.

(Multiple Choice)
4.8/5
(34)

In maintenance management,_____ involves studying the parts of a system to understand the overall system.

(Multiple Choice)
4.8/5
(39)

Perfective maintenance _____.

(Multiple Choice)
4.9/5
(43)

_____ include changing programs,procedures,or documentation to ensure correct system performance;adapting the system to changing requirements;and making the system operate more efficiently.

(Multiple Choice)
4.8/5
(28)

Software leases are not considered an operational cost.

(True/False)
4.8/5
(33)

When network traffic is encrypted,it is invisible and its content and purpose are masked.

(True/False)
4.9/5
(36)

_____ develops safeguards that reduce risks and their impact.

(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)