Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ prevents unauthorized users from creating, modifying, or deleting information.​

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

A _____ is a security weakness or soft spot.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

B

Perfective maintenance usually is cost effective _____ a system's operational life.​

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

B

  -As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.​ -As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.​

(Multiple Choice)
4.9/5
(29)

A _____ is the main line of defense between a local network, or intranet, and the Internet.

(Multiple Choice)
4.8/5
(37)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Records everything that is typed into the keyboard, including passwords, while the system continues to function normally

(Multiple Choice)
4.8/5
(30)

_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.​

(Multiple Choice)
4.8/5
(34)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A risk control strategy that reduces the impact of a risk by careful planning and preparation

(Multiple Choice)
4.8/5
(36)

_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.​

(Multiple Choice)
4.7/5
(36)

Perfective maintenance _____.​

(Multiple Choice)
4.8/5
(29)

_____ ensures that authorized users have timely and reliable access to necessary information.​

(Multiple Choice)
4.9/5
(31)

In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.

(True/False)
4.9/5
(33)

_____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.​

(Multiple Choice)
4.9/5
(28)

To avoid problems, preventive maintenance _____.​

(Multiple Choice)
4.7/5
(37)

  -As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.​ -As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.​

(Multiple Choice)
4.8/5
(34)

_____ measures the time between submitting a request for information and the fulfillment of the request.​

(Multiple Choice)
4.8/5
(31)

Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.​

(Multiple Choice)
4.7/5
(27)

One highly publicized form of social engineering is called post texting, which is a method of obtaining personal information under false pretenses.

(True/False)
4.9/5
(30)

_____ measures risk likelihood and impact.

(Multiple Choice)
4.8/5
(37)

_____ is concerned with managerial policies and controls that ensure secure operations.

(Multiple Choice)
4.7/5
(33)
Showing 1 - 20 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)