Exam 12: MIS Management Processes: Process Management, Systems Development, and Security
Exam 1: Introduction to MIS101 Questions
Exam 2: Business Processes, Information Systems, and Information109 Questions
Exam 3: Hardware, Software, and Networks124 Questions
Exam 4: Database Processing115 Questions
Exam 5: Using IS to Improve Processes120 Questions
Exam 6: Supporting Processes with ERP Systems117 Questions
Exam 7: Supporting the Procurement Process with SAP105 Questions
Exam 8: Supporting the Sales Process with SAP108 Questions
Exam 9: Collaboration Processes and Information Systems116 Questions
Exam 10: The Impact of Web 2.0 and Social Media on Business Processes116 Questions
Exam 11: Business Intelligence119 Questions
Exam 12: MIS Management Processes: Process Management, Systems Development, and Security119 Questions
Select questions type
________ is a social engineering technique in which a person pretends to be a legitimate company and sends e-mails requesting confidential data.
(Multiple Choice)
4.8/5
(33)
A(n)________ is a formal description of a system's response to use and misuse scenarios.
(Multiple Choice)
4.7/5
(39)
An organization purchases SAP's ERP system. After customizing the system and training employees, the organization shuts down the old system and implements the new one across all business processes. This is an example of ________ installation.
(Multiple Choice)
4.9/5
(38)
Biometric authentication uses personal physical characteristics to authenticate users.
(True/False)
4.9/5
(37)
Worms are specifically programmed to spread, and they spread faster than other virus types.
(True/False)
4.9/5
(34)
A malicious hacker flooded an online retailer's server with millions of bogus service requests. Due to this, the Web site's server was overloaded and the site was unable to service legitimate customer requests. This attack is an example of which of the following security threats?
(Multiple Choice)
4.8/5
(35)
New process modeling is not necessary if a process change involves only alterations in human resources.
(True/False)
4.8/5
(29)
Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new information system.
(True/False)
4.9/5
(41)
________ occurs when a person gains unauthorized access to a computer system.
(Multiple Choice)
4.9/5
(26)
Which of the following is the first activity in the SDLC process?
(Multiple Choice)
4.9/5
(28)
The term system conversion refers to the process of testing software.
(True/False)
4.9/5
(35)
Adware is a program that is installed on a system after seeking the user's permission.
(True/False)
4.9/5
(22)
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf. This attack is an example of ________.
(Multiple Choice)
4.8/5
(36)
Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States. The company implements Oracle SCM to reduce its operational costs. Even after the implementation of the SCM system, the company does not shut down the old system and runs both the systems simultaneously. This is an example of ________ installation.
(Multiple Choice)
4.9/5
(33)
Which of the following is a valid difference between a password and user name?
(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)