Exam 12: Mis Management Processes: Process Management, systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An incident response plan includes how employees are to respond to security problems,whom they should contact,and the steps they can take to reduce further loss.

(True/False)
4.9/5
(27)

Poorly written application programs and procedures are sources of security threats.

(True/False)
4.9/5
(37)

In the case of ________,the same key is used to encode and to decode a message.

(Multiple Choice)
4.7/5
(28)

What is cross site scripting?

(Essay)
4.9/5
(40)

With ________ installation,organizations implement an entire system/business process on a limited portion of the business.

(Multiple Choice)
4.8/5
(37)

When a pilot implementation fails,the failure is contained within a boundary.

(True/False)
4.9/5
(44)

BPM is a cyclical process for systematically monitoring,modeling,creating,and implementing business processes.

(True/False)
4.8/5
(39)

An organization purchases SAP's ERP system.After customizing the system and training employees,the organization shuts down the old system and implements the new one across all business processes.This is an example of ________ installation.

(Multiple Choice)
4.8/5
(39)

Passwords are the primary means of authentication for information systems.

(True/False)
4.8/5
(42)

Which of the following is a difference between a public key and a private key?

(Multiple Choice)
4.7/5
(36)

Briefly describe the tasks in the implementation activity of the SDLC process.

(Essay)
4.9/5
(40)

________ are malware installed on a user's computer without the user's knowledge or permission.

(Multiple Choice)
4.9/5
(29)

Once the goals and scope of a new information system is defined,the next immediate task is to ________.

(Multiple Choice)
4.9/5
(23)

With ________ installation,a new system/business process is installed in stages across an organization.

(Multiple Choice)
4.7/5
(23)

What is biometric authentication? What are its advantages and disadvantages?

(Essay)
4.7/5
(36)

Account administration and recovery procedures are examples of ________ safeguards.

(Multiple Choice)
4.9/5
(27)

Explain the importance of the requirements determination stage of the SDLC process.

(Essay)
5.0/5
(45)

Which of the following is a senior management's function to safeguard against security threats to an organization?

(Multiple Choice)
4.9/5
(31)

In a typical project team,________ integrate the work of the programmers,testers,and users.

(Multiple Choice)
4.7/5
(30)

Individuals holding multiple accounts should have different passwords for each account to safeguard against security threats.

(True/False)
4.9/5
(34)
Showing 21 - 40 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)