Exam 12: MIS Management Processes: Process Management, Systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Differentiate between a hot site and a cold site.

(Essay)
4.8/5
(33)

Designing system components is the first step in the SDLC process.

(True/False)
4.7/5
(29)

A public key is used for decoding messages in asymmetric encryption.

(True/False)
4.8/5
(37)

Phishing is a social engineering technique for obtaining unauthorized data via e-mail pretexting.

(True/False)
4.9/5
(35)

A test plan is an informal description of how an information system's components should be tested.

(True/False)
4.8/5
(34)

Briefly explain the modeling activity of BPM.

(Essay)
4.8/5
(36)

Account administration and systems procedures are examples of ________ safeguards.

(Multiple Choice)
4.9/5
(35)

________ are viruses that masquerade as useful programs or files.

(Multiple Choice)
4.9/5
(35)

Which of the following is a disadvantage of building information systems before business processes?

(Multiple Choice)
4.8/5
(34)

BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes.

(True/False)
4.8/5
(39)

________ refers to social engineering in which someone deceives by pretending to be someone else.

(Multiple Choice)
4.8/5
(37)

What is the difference between pilot installation and phased installation?

(Essay)
4.9/5
(40)

Briefly describe management's role in information systems security.

(Essay)
4.7/5
(35)

A(n)________ is a computer program that is surreptitiously installed and that takes actions unknown and uncontrolled by the computer's owner or administrator.

(Multiple Choice)
4.8/5
(38)

What are the major sources of security vulnerabilities?

(Essay)
4.7/5
(35)

Dorex Manufacturing builds an ERP system to streamline its business activities. After being tested, the company implements the system only in the procurement department. This is an example of ________ installation.

(Multiple Choice)
4.7/5
(40)

A firewall is a computing device that prevents unauthorized network access.

(True/False)
4.9/5
(46)

A ________ is a computing device or a program that prevents unauthorized network access.

(Multiple Choice)
4.9/5
(40)

The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.

(True/False)
4.8/5
(31)

Worms are viruses that masquerade as useful programs or files.

(True/False)
4.9/5
(36)
Showing 61 - 80 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)