Exam 12: MIS Management Processes: Process Management, Systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Systems analysts are IS professionals who understand both business and technology.

(True/False)
4.8/5
(27)

Most secure communication over the Internet uses a protocol called HTTP.

(True/False)
5.0/5
(37)

Balancing the risks and costs of a security system is the responsibility of system developers.

(True/False)
4.8/5
(35)

Discuss the approach of designing business processes before building information systems.

(Essay)
4.8/5
(40)

Documenting position sensitivity enables security personnel to prioritize their activities in accordance with possible risks and losses.

(True/False)
4.8/5
(29)

Briefly describe the tasks in the implementation activity of the SDLC process.

(Essay)
5.0/5
(32)

Safeguards are protections against security vulnerabilities.

(True/False)
4.9/5
(41)

Passwords are the primary means of authentication for information systems.

(True/False)
4.8/5
(27)

Explain the importance of position definitions in information security.

(Essay)
4.9/5
(33)

Pretexting is social engineering in which someone gains unauthorized access to a computer without the user's knowledge.

(True/False)
4.8/5
(31)

Which of the following is a valid observation of determining the requirements of an information system?

(Multiple Choice)
4.8/5
(35)

Establishing security policies is a security function of senior management.

(True/False)
4.8/5
(38)

With asymmetric encryption, ________.

(Multiple Choice)
4.9/5
(31)

As a source of security vulnerabilities, malicious human activity includes ________.

(Multiple Choice)
4.7/5
(35)

What is BPM? What are the basic activities in BPM?

(Essay)
4.7/5
(28)

What is biometric authentication? What are its advantages and disadvantages?

(Essay)
4.9/5
(26)

In the context of information systems, what is meant by safeguards?

(Essay)
4.9/5
(35)

An incident response plan includes how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.

(True/False)
4.9/5
(32)

Denial-of-service attacks involve the sending of anonymous e-mails to users.

(True/False)
4.9/5
(46)

With pilot installation, an organization implements a limited portion of a new business process on the entire organization.

(True/False)
4.8/5
(33)
Showing 21 - 40 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)