Exam 12: Mis Management Processes: Process Management, systems Development, and Security
Exam 1: The Importance of Mis101 Questions
Exam 2: Business Processes, information Systems, and Information108 Questions
Exam 3: Hardware, software, and Networks119 Questions
Exam 4: Database Processing110 Questions
Exam 5: Using Is to Improve Processes109 Questions
Exam 6: Supporting Processes With Erp Systems113 Questions
Exam 7: Supporting the Procurement Process With Sap98 Questions
Exam 8: Supporting the Sales Process With Sap100 Questions
Exam 9: Collaboration and Is98 Questions
Exam 10: Social Media and Is98 Questions
Exam 11: Business Intelligence and Is105 Questions
Exam 12: Mis Management Processes: Process Management, systems Development, and Security112 Questions
Select questions type
Which of the following statements is true about administrating user accounts to safeguard against threats?
(Multiple Choice)
4.9/5
(37)
Information systems security is the process of preventing unauthorized access to an IS or modification of its data.
(True/False)
4.7/5
(38)
What is the difference between parallel installation and plunge installation?
(Essay)
4.9/5
(43)
A(n)________ is a formal description of a system's response to use and misuse scenarios.
(Multiple Choice)
4.9/5
(29)
What is the difference between pilot installation and phased installation?
(Essay)
4.9/5
(30)
An important function of the senior management is to eliminate risks,as risks cannot be managed.
(True/False)
4.8/5
(40)
Which of the following is a human safeguard for employees to protect against security threats?
(Multiple Choice)
4.9/5
(34)
You receive an email from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details.Later,you identify that the email was not sent by the company.This scenario exemplifies ________.
(Multiple Choice)
4.8/5
(42)
Which of the following is a principle of agile development methodologies?
(Multiple Choice)
4.7/5
(39)
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
(True/False)
5.0/5
(36)
Describe the importance of position definitions as human safeguards for employees.
(Essay)
4.9/5
(27)
Balancing the risks and costs of a security system is the responsibility of system developers.
(True/False)
4.8/5
(34)
Both Scrum and SDLC are processes that create and update existing information systems.
(True/False)
4.7/5
(31)
________ refers to a social engineering attack in which someone deceives by pretending to be someone else.
(Multiple Choice)
4.8/5
(33)
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.
(Multiple Choice)
4.8/5
(40)
A public key is used for decoding messages in public key/private key asymmetric encryption used over the Internet.
(True/False)
4.8/5
(33)
With regard to people,the design stage in SDLC involves developing job descriptions.
(True/False)
4.9/5
(45)
Showing 41 - 60 of 112
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)