Exam 6: Foundations for Systems Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which user is known to the system and is authorized to access all or certain parts of it?​

(Multiple Choice)
4.9/5
(44)

Which is not a model normally produced as part of application component design?​

(Multiple Choice)
4.8/5
(39)

Which is NOT an objective of integrity controls?​

(Multiple Choice)
4.9/5
(37)

The majority of new systems today must be integrated into existing networks without disrupting existing applications.

(True/False)
4.8/5
(32)

What are two key elements of describing the environment?​

(Multiple Choice)
4.9/5
(40)

Using digital signatures is primarily a technique to ____.​

(Multiple Choice)
4.9/5
(37)

Which is NOT an objective of integrity controls?​

(Multiple Choice)
4.7/5
(37)

What is the name of a general control technique used to ensure that entered data is correct?​

(Multiple Choice)
4.8/5
(33)

According to an Agile iterative development process in which iteration would design activities normally start?​

(Multiple Choice)
4.9/5
(38)

A design class diagram is also called a data model.​

(True/False)
4.8/5
(36)

An objective of security controls is to maintain a stable operating environment for users.

(True/False)
4.8/5
(36)

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.​

(Multiple Choice)
4.7/5
(33)

One of the first steps in designing the application components is to divide the software into subsystems.​

(True/False)
5.0/5
(32)

Since the design activities all interact with each other,it really doesn't matter which activity occurs first.​

(True/False)
4.9/5
(41)

It is just as important to have heavy user involvement during analysis as it is during design.​

(True/False)
4.8/5
(39)

A deployment diagram is most useful for which design activity?​

(Multiple Choice)
4.8/5
(41)

Three types of users that are considered in the design of a security system are ____.​

(Multiple Choice)
4.8/5
(43)

Symmetric key encryption uses a public key and a private key.​

(True/False)
4.8/5
(33)

Limiting user access to the system is considered what type of design activity?​

(Multiple Choice)
4.8/5
(50)

A major comparison between analsys and design can be stated as:​

(Multiple Choice)
4.8/5
(30)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)