Exam 12: Mis Management Processes: Process Management, systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of the sources of threats,computer crime involves ________.

(Multiple Choice)
4.9/5
(28)

The term system conversion refers to the process of testing software.

(True/False)
4.8/5
(29)

The nature of the SDLC process accepts that systems requirements are always changing.

(True/False)
4.9/5
(41)

With asymmetric encryption,________.

(Multiple Choice)
4.7/5
(33)

What is a vulnerability? Explain with an example.

(Essay)
4.9/5
(34)

With ________ installation,an organization shuts off the old system/business process and starts the new one.

(Multiple Choice)
4.8/5
(35)

How can individuals safeguard their data from being misused?

(Multiple Choice)
4.8/5
(41)

Which of the following is a valid difference between a password and user name?

(Multiple Choice)
4.8/5
(34)

Impractical information systems projects are eliminated after assessing its feasibility with an organization's objectives.

(True/False)
4.8/5
(43)

Which of the following statements is true about biometric authentication?

(Multiple Choice)
4.9/5
(45)

IP spoofing is a situation in which a computer registers on a network without using an IP address.

(True/False)
4.9/5
(31)

A ________ is a computing device that prevents unauthorized network access.

(Multiple Choice)
4.9/5
(34)

Which of the following is characteristic of a strong password?

(Multiple Choice)
4.8/5
(26)

Systems analysts are IS professionals who understand both business and technology.

(True/False)
4.7/5
(41)

Describe pretexting and phishing.

(Essay)
4.9/5
(26)

Organizations should avoid using security considerations as a criterion while hiring employees.

(True/False)
4.8/5
(37)

Using HTTP rather than HTTPS will provide an effective safeguard against security threats.

(True/False)
4.8/5
(46)

How do organizations use incident response plans to respond to security threats?

(Essay)
4.8/5
(34)

When organizations store databases in the cloud,all safeguard measures should be exclusive of the cloud service contract.

(True/False)
4.9/5
(38)

Dorex Manufacturing builds an ERP system to streamline its business activities.After being tested,the company implements the system only in the procurement department.This is an example of ________ installation.

(Multiple Choice)
4.8/5
(41)
Showing 61 - 80 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)