Exam 12: Managing Systems Support and Security
Exam 1: Introduction to Systems Analysis and Design76 Questions
Exam 2: Analyzing the Business Case80 Questions
Exam 3: Managing Systems Projects80 Questions
Exam 4: Requirements Engineering79 Questions
Exam 5: Data and Process Modeling69 Questions
Exam 6: Object Modeling76 Questions
Exam 7: Development Strategies80 Questions
Exam 8: User Interface Design74 Questions
Exam 9: Data Design74 Questions
Exam 10: System Architecture80 Questions
Exam 11: Managing Systems Implementation74 Questions
Exam 12: Managing Systems Support and Security80 Questions
Exam 13: Communication-Tools45 Questions
Exam 14: Case-Tools45 Questions
Exam 15: Financial-Analysis-Tools45 Questions
Exam 16: Internet-Resource-Tools44 Questions
Select questions type
_____ describes the amount of data that a system can transfer in a fixed time period.
(Multiple Choice)
4.9/5
(36)
_____ is a process that monitors current activity and performance levels,anticipates future activity,and forecasts the resources needed to provide desired levels of service.
(Multiple Choice)
4.8/5
(37)
_____ prevents unauthorized users from creating,modifying,or deleting information.
(Multiple Choice)
4.9/5
(32)
One highly publicized form of social engineering is called post texting,which is a method of obtaining personal information under false pretenses.
(True/False)
4.8/5
(31)
Hard skills include communications,interpersonal,and perceptive abilities.
(True/False)
4.8/5
(41)
_____,a risk control strategy,eliminates risks by adding protective safeguards.
(Multiple Choice)
4.9/5
(38)
The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
(Multiple Choice)
4.8/5
(33)
Perfective maintenance usually is cost effective _____ a system's operational life.
(Multiple Choice)
4.8/5
(34)
In a secluded engineering attack,an intruder uses social interaction to gain access to a computer system.
(True/False)
4.8/5
(26)
Adaptive maintenance involves changing an operational system to make it more efficient,reliable,or maintainable.
(True/False)
4.7/5
(34)
Backup media can include tape,hard drives,optical storage,and online storage.
(True/False)
4.7/5
(27)
In maintenance management,_____ means examining the whole in order to learn about the individual elements.
(Multiple Choice)
5.0/5
(43)
As enterprise-wide information systems grow more complex,configuration management becomes trivial.
(True/False)
4.8/5
(22)
In a typical system,the initial version of the system is 1.0,and the release that includes the first set of maintenance changes is version _____.
(Multiple Choice)
4.8/5
(31)
The main objective of training is to show users how the system can help them perform their jobs.
(True/False)
4.9/5
(32)
The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
(Multiple Choice)
4.8/5
(30)
A system in its final stages requires corrective maintenance only to keep the system operational.
(True/False)
4.8/5
(36)
If significant changes take place in an existing system or if a new version is released,the IT department might develop a _____.
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)