Exam 12: Managing Systems Support and Security
Exam 1: Introduction to Systems Analysis and Design80 Questions
Exam 2: Analyzing the Business Case81 Questions
Exam 3: Managing Systems Projects78 Questions
Exam 4: Requirements Modeling98 Questions
Exam 5: Data and Process Modeling84 Questions
Exam 6: Object Modeling78 Questions
Exam 7: Development Strategies82 Questions
Exam 8: User Interface Design82 Questions
Exam 9: Data Design86 Questions
Exam 10: System Architecture78 Questions
Exam 11: Managing Systems Implementation81 Questions
Exam 12: Managing Systems Support and Security81 Questions
Exam 13: Appendix-The Systems Analyst’s Toolkit45 Questions
Exam 14: CASE Tools45 Questions
Exam 15: Financial Analysis Tools45 Questions
Exam 16: Internet Resource Tools44 Questions
Select questions type
In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.
(True/False)
4.9/5
(33)
The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
(Multiple Choice)
4.7/5
(40)
Matching
Identify the letters of the choices that best match the phrases or definitions.
-An asymmetric kind of encryption
(Multiple Choice)
4.9/5
(31)
A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.
(Multiple Choice)
4.9/5
(39)
Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
(Multiple Choice)
4.8/5
(40)
What is capacity planning? Include an explanation of what-if analysis in your answer.
(Essay)
4.8/5
(28)
_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
(Multiple Choice)
4.7/5
(38)
In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.
(True/False)
4.9/5
(34)
_____ describes the amount of data that a system can transfer in a fixed time period.
(Multiple Choice)
4.8/5
(35)
A(n) _____ is an attack that takes advantage of a vulnerability.
(Multiple Choice)
4.7/5
(30)
In dumpster diving attacks, an intruder raids desks or trash bins for valuable information.
(True/False)
4.9/5
(29)
In maintenance management, _____ means examining the whole in order to learn about the individual elements.
(Multiple Choice)
4.9/5
(35)
Matching
Identify the letters of the choices that best match the phrases or definitions.
-Might include company hardware, software, data, networks, people, or procedure
(Multiple Choice)
4.8/5
(38)
_____ is the overall time between a request for system activity and the delivery of the response.
(Multiple Choice)
4.9/5
(36)
_____ develops safeguards that reduce risks and their impact.
(Multiple Choice)
4.8/5
(31)
Matching
Identify the letters of the choices that best match the phrases or definitions.
-Uses a single key to encrypt and decrypt information
(Multiple Choice)
5.0/5
(33)
Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy.
(True/False)
4.9/5
(39)
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)