Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.

(True/False)
4.9/5
(33)

The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.​

(Multiple Choice)
4.7/5
(40)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -An asymmetric kind of encryption

(Multiple Choice)
4.9/5
(31)

A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.​

(Multiple Choice)
4.9/5
(39)

Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.

(Multiple Choice)
4.8/5
(40)

What is capacity planning? Include an explanation of what-if analysis in your answer.

(Essay)
4.8/5
(28)

_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.​

(Multiple Choice)
4.7/5
(38)

In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.​

(True/False)
4.9/5
(34)

_____ describes the amount of data that a system can transfer in a fixed time period.​

(Multiple Choice)
4.8/5
(35)

A(n) _____ is an attack that takes advantage of a vulnerability.

(Multiple Choice)
4.7/5
(30)

In dumpster diving attacks, an intruder raids desks or trash bins for valuable information.

(True/False)
4.9/5
(29)

Corrective maintenance _____.​

(Multiple Choice)
4.9/5
(40)

In maintenance management, _____ means examining the whole in order to learn about the individual elements.​

(Multiple Choice)
4.9/5
(35)

Response time is affected by _____.

(Multiple Choice)
4.7/5
(35)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Might include company hardware, software, data, networks, people, or procedure

(Multiple Choice)
4.8/5
(38)

_____ is the overall time between a request for system activity and the delivery of the response.

(Multiple Choice)
4.9/5
(36)

_____ develops safeguards that reduce risks and their impact.

(Multiple Choice)
4.8/5
(31)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Uses a single key to encrypt and decrypt information

(Multiple Choice)
5.0/5
(33)

Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy.

(True/False)
4.9/5
(39)

A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.​

(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)