Exam 12: Mis Management Processes: Process Management, systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)________ is a computer program that replicates itself.

(Multiple Choice)
4.9/5
(32)

A number used to encrypt data is called a(n)________.

(Multiple Choice)
4.7/5
(43)

Parallel installation is also called direct installation.

(True/False)
4.9/5
(37)

Which of the following is a technique for intercepting computer communications?

(Multiple Choice)
4.9/5
(30)

Hackers use Big Data software to acquire data to find out passwords and other sensitive data.

(True/False)
5.0/5
(33)

How do agile techniques overcome the problems of the SDLC?

(Multiple Choice)
4.7/5
(38)

The term system conversion refers to the phase in which an organization ________.

(Multiple Choice)
4.9/5
(29)

Symmetric encryption is simpler and much more faster than asymmetric encryption.

(True/False)
5.0/5
(28)

During the ________ activity of BPM,managers evaluate process measures against their objectives and respond to changes in the business climate.

(Multiple Choice)
4.7/5
(34)

Browsing through an online blog,Ronnie clicks on one of the blogger's links and is logged out of his system.He loses access to his system due to a malicious code that was downloaded from the link.This is a clear case of ________.

(Multiple Choice)
4.8/5
(40)

________ is a social engineering technique in which a person pretends to be a legitimate company and sends emails requesting confidential data.

(Multiple Choice)
4.8/5
(34)

A vulnerability is some measure that individuals or organizations take to block the threat from obtaining the asset.

(True/False)
4.8/5
(38)
Showing 101 - 112 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)