Exam 12: Mis Management Processes: Process Management, systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ occurs when a person breaks into computers,servers,or networks to steal data.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

D

Cookies are small files that browsers store on a computer when a user visits a Web site.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

True

Most secure communication over the Internet uses a protocol called HTTP.

Free
(True/False)
4.9/5
(26)
Correct Answer:
Verified

False

Maintaining the same password for a long duration will increase system security.

(True/False)
4.8/5
(39)

Firewalls can block traffic from particular sites known for malicious content to any user behind it.

(True/False)
4.7/5
(39)

A business process may use one or more information systems,but an information system may be used by only one business process.

(True/False)
4.7/5
(35)

During the modeling activity of BPM,teams build an as-is model which ________.

(Multiple Choice)
4.7/5
(30)

A key is a physical device that is used to lock and unlock a message.

(True/False)
4.9/5
(32)

How is scrum distinguished from SDLC ?

(Multiple Choice)
4.8/5
(39)

A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf.This attack is an example of ________.

(Multiple Choice)
4.7/5
(37)

Drive-by sniffers often target protected wireless networks to monitor and intercept the wireless traffic at will.

(True/False)
4.7/5
(35)

Describe some data safeguards taken against security threats.

(Essay)
4.9/5
(35)

Agile development methodologies support just-in-time design.

(True/False)
4.9/5
(35)

Which of the following is the first activity in the SDLC process?

(Multiple Choice)
4.8/5
(40)

Business analysts work primarily with systems development,but they are also involved in business processes to a small extent.

(True/False)
4.8/5
(35)

Secure Socket Layer uses a combination of public key/private key and symmetric encryption.

(True/False)
4.8/5
(44)

Tasks in the implementation activity of the SDLC process involve building and testing system components and converting users to the new system and possibly new business processes.

(True/False)
4.8/5
(32)

A malicious hacker flooded an online retailer's server with millions of bogus transactions.Due to this,the Web site's server was overloaded and the site was unable to process legitimate customer orders.Which of the following is being illustrated in this scenario?

(Multiple Choice)
4.8/5
(37)

How should organizations respond to security incidents?

(Multiple Choice)
4.8/5
(42)

Key escrow refers to the practice of ________.

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)