Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) _____ can prevent an unauthorized person from booting a computer by using a CD-ROM or USB device.

(Multiple Choice)
4.7/5
(46)

_____ costs include expenses for items such as supplies, equipment rental, and software leases.​

(Multiple Choice)
4.9/5
(35)

As enterprise-wide information systems grow more complex, configuration management becomes trivial.

(True/False)
5.0/5
(35)

The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.​

(Multiple Choice)
4.8/5
(34)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Combination of hardware and software that allows computers to interact with a network

(Multiple Choice)
4.9/5
(36)

Wrapping refers to the practice of storing backup media away from the main business location, in order to mitigate the risk of a catastrophic disaster, such as a flood, fire, or earthquake.

(True/False)
4.8/5
(28)

When a new version of a system is installed, the prior release is _____, or stored.​

(Multiple Choice)
4.9/5
(35)

As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.​ -Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?

(Multiple Choice)
4.7/5
(38)

  -As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system.​ -As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system.​

(Multiple Choice)
4.8/5
(36)

To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.​

(Multiple Choice)
4.7/5
(37)

In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.​

(Multiple Choice)
4.9/5
(43)

A _____ is a formal reference point that measures system characteristics at a specific time.​

(Multiple Choice)
4.8/5
(31)

As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.​ -One of George's clients reports that the traffic on their network is being intercepted and scanned for valuable information. How does George categorize this incident?

(Multiple Choice)
4.7/5
(27)

_____ analyzes an organization's assets, threats, and vulnerabilities.​

(Multiple Choice)
4.7/5
(36)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Hostile act that targets systems or a company itself

(Multiple Choice)
4.9/5
(24)

In maintenance management, _____ involves studying the parts of a system to understand the overall system.

(Multiple Choice)
4.9/5
(31)

_____, a risk control strategy, eliminates risks by adding protective safeguards.

(Multiple Choice)
4.8/5
(33)

If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.​

(Multiple Choice)
5.0/5
(41)

_____ is a process for controlling changes in system requirements during software development.​

(Multiple Choice)
4.8/5
(43)

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.​

(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)