Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Bandwidth requirements are expressed in bytes per minute.

(True/False)
4.9/5
(32)

List at least eight different tasks a service desk staff member might have to perform during a typical day.

(Essay)
4.9/5
(34)

When network traffic is encrypted,it is invisible and its content and purpose are masked.

(True/False)
4.7/5
(30)

The first step in managing IT security is to develop a _____ based on confidentiality,integrity,and availability.

(Multiple Choice)
4.8/5
(36)

A patch is a specially written software module that provides temporary repairs so operations can resume.

(True/False)
4.8/5
(28)

_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.

(Multiple Choice)
4.8/5
(40)

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

(Multiple Choice)
4.9/5
(39)

Critical Thinking Questions 12-1 George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories. -One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid.In which of the following categories should George place this incident?

(Multiple Choice)
4.7/5
(31)

In maintenance management,_____ involves studying the parts of a system to understand the overall system.

(Multiple Choice)
4.9/5
(37)

Preventative maintenance adds new capability and enhancements.

(True/False)
4.8/5
(53)

Wrapping refers to the practice of storing backup media away from the main business location,in order to mitigate the risk of a catastrophic disaster,such as a flood,fire,or earthquake.

(True/False)
4.7/5
(30)

_____ analyzes an organization's assets,threats,and vulnerabilities.

(Multiple Choice)
4.8/5
(35)

The _____ documents a system at the end of the design phase,identifies any changes since the beginning of the project,and includes testing and verification of all system requirements and features.

(Multiple Choice)
4.8/5
(31)

Another of George's clients has software that is outdated and has become increasingly vulnerable to attack.How does George categorize this threat?

(Multiple Choice)
4.9/5
(29)

Maintenance expense stay consistently the same during the system's operational life.

(True/False)
4.8/5
(40)

Using a release methodology reduces the documentation burden.

(True/False)
4.8/5
(28)

In dumpster diving attacks,an intruder raids desks or trash bins for valuable information.

(True/False)
4.8/5
(33)

In a public key encryption environment,each user on the network has a pair of keys: a foreign key and a private key.

(True/False)
4.9/5
(32)

A _____ is a security weakness or soft spot.

(Multiple Choice)
4.9/5
(42)

What is capacity planning? Include an explanation of what-if analysis in your answer.

(Essay)
4.9/5
(36)
Showing 61 - 80 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)