Exam 12: Mis Management Processes: Process Management, systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements is true about administrating user accounts to safeguard against threats?

(Multiple Choice)
4.9/5
(37)

Information systems security is the process of preventing unauthorized access to an IS or modification of its data.

(True/False)
4.7/5
(38)

What is the difference between parallel installation and plunge installation?

(Essay)
4.9/5
(43)

What is spoofing? What are the two types of spoofing?

(Essay)
4.9/5
(40)

A(n)________ is a formal description of a system's response to use and misuse scenarios.

(Multiple Choice)
4.9/5
(29)

What is the difference between pilot installation and phased installation?

(Essay)
4.9/5
(30)

An important function of the senior management is to eliminate risks,as risks cannot be managed.

(True/False)
4.8/5
(40)

Which of the following is a human safeguard for employees to protect against security threats?

(Multiple Choice)
4.9/5
(34)

You receive an email from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details.Later,you identify that the email was not sent by the company.This scenario exemplifies ________.

(Multiple Choice)
4.8/5
(42)

Which of the following is a principle of agile development methodologies?

(Multiple Choice)
4.7/5
(39)

List the activities in the SDLC process.

(Essay)
4.8/5
(31)

What are cookies? How are they a threat to data security?

(Essay)
4.9/5
(26)

The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.

(True/False)
5.0/5
(36)

Describe the importance of position definitions as human safeguards for employees.

(Essay)
4.9/5
(27)

Balancing the risks and costs of a security system is the responsibility of system developers.

(True/False)
4.8/5
(34)

Both Scrum and SDLC are processes that create and update existing information systems.

(True/False)
4.7/5
(31)

________ refers to a social engineering attack in which someone deceives by pretending to be someone else.

(Multiple Choice)
4.8/5
(33)

________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

(Multiple Choice)
4.8/5
(40)

A public key is used for decoding messages in public key/private key asymmetric encryption used over the Internet.

(True/False)
4.8/5
(33)

With regard to people,the design stage in SDLC involves developing job descriptions.

(True/False)
4.9/5
(45)
Showing 41 - 60 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)