Exam 12: Managing Systems Support and Security
Exam 1: Introduction to Systems Analysis and Design76 Questions
Exam 2: Analyzing the Business Case80 Questions
Exam 3: Managing Systems Projects80 Questions
Exam 4: Requirements Engineering79 Questions
Exam 5: Data and Process Modeling69 Questions
Exam 6: Object Modeling76 Questions
Exam 7: Development Strategies80 Questions
Exam 8: User Interface Design74 Questions
Exam 9: Data Design74 Questions
Exam 10: System Architecture80 Questions
Exam 11: Managing Systems Implementation74 Questions
Exam 12: Managing Systems Support and Security80 Questions
Exam 13: Communication-Tools45 Questions
Exam 14: Case-Tools45 Questions
Exam 15: Financial-Analysis-Tools45 Questions
Exam 16: Internet-Resource-Tools44 Questions
Select questions type
List at least eight different tasks a service desk staff member might have to perform during a typical day.
(Essay)
4.9/5
(34)
When network traffic is encrypted,it is invisible and its content and purpose are masked.
(True/False)
4.7/5
(30)
The first step in managing IT security is to develop a _____ based on confidentiality,integrity,and availability.
(Multiple Choice)
4.8/5
(36)
A patch is a specially written software module that provides temporary repairs so operations can resume.
(True/False)
4.8/5
(28)
_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.
(Multiple Choice)
4.8/5
(40)
The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.
(Multiple Choice)
4.9/5
(39)
Critical Thinking Questions 12-1
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
-One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid.In which of the following categories should George place this incident?
(Multiple Choice)
4.7/5
(31)
In maintenance management,_____ involves studying the parts of a system to understand the overall system.
(Multiple Choice)
4.9/5
(37)
Wrapping refers to the practice of storing backup media away from the main business location,in order to mitigate the risk of a catastrophic disaster,such as a flood,fire,or earthquake.
(True/False)
4.7/5
(30)
_____ analyzes an organization's assets,threats,and vulnerabilities.
(Multiple Choice)
4.8/5
(35)
The _____ documents a system at the end of the design phase,identifies any changes since the beginning of the project,and includes testing and verification of all system requirements and features.
(Multiple Choice)
4.8/5
(31)
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack.How does George categorize this threat?
(Multiple Choice)
4.9/5
(29)
Maintenance expense stay consistently the same during the system's operational life.
(True/False)
4.8/5
(40)
In dumpster diving attacks,an intruder raids desks or trash bins for valuable information.
(True/False)
4.8/5
(33)
In a public key encryption environment,each user on the network has a pair of keys: a foreign key and a private key.
(True/False)
4.9/5
(32)
What is capacity planning? Include an explanation of what-if analysis in your answer.
(Essay)
4.9/5
(36)
Showing 61 - 80 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)