Exam 12: MIS Management Processes: Process Management, Systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is a social engineering technique in which a person pretends to be a legitimate company and sends e-mails requesting confidential data.

(Multiple Choice)
4.8/5
(33)

A smart card has a magnetic strip.

(True/False)
4.8/5
(36)

A(n)________ is a formal description of a system's response to use and misuse scenarios.

(Multiple Choice)
4.7/5
(39)

An organization purchases SAP's ERP system. After customizing the system and training employees, the organization shuts down the old system and implements the new one across all business processes. This is an example of ________ installation.

(Multiple Choice)
4.9/5
(38)

Biometric authentication uses personal physical characteristics to authenticate users.

(True/False)
4.9/5
(37)

Worms are specifically programmed to spread, and they spread faster than other virus types.

(True/False)
4.9/5
(34)

What is spoofing? What are the two types of spoofing?

(Essay)
4.8/5
(28)

A malicious hacker flooded an online retailer's server with millions of bogus service requests. Due to this, the Web site's server was overloaded and the site was unable to service legitimate customer requests. This attack is an example of which of the following security threats?

(Multiple Choice)
4.8/5
(35)

New process modeling is not necessary if a process change involves only alterations in human resources.

(True/False)
4.8/5
(29)

What is hacking?

(Essay)
5.0/5
(35)

Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new information system.

(True/False)
4.9/5
(41)

________ occurs when a person gains unauthorized access to a computer system.

(Multiple Choice)
4.9/5
(26)

A virus is a computer program that ________.

(Multiple Choice)
4.9/5
(39)

Which of the following is the first activity in the SDLC process?

(Multiple Choice)
4.9/5
(28)

Which of the following is true of systems analysts?

(Multiple Choice)
4.9/5
(32)

The term system conversion refers to the process of testing software.

(True/False)
4.9/5
(35)

Adware is a program that is installed on a system after seeking the user's permission.

(True/False)
4.9/5
(22)

A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf. This attack is an example of ________.

(Multiple Choice)
4.8/5
(36)

Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States. The company implements Oracle SCM to reduce its operational costs. Even after the implementation of the SCM system, the company does not shut down the old system and runs both the systems simultaneously. This is an example of ________ installation.

(Multiple Choice)
4.9/5
(33)

Which of the following is a valid difference between a password and user name?

(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)