Exam 12: Managing Systems Support and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

As enterprise-wide information systems grow more complex, configuration management becomes trivial.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

In maintenance management, _____ involves studying the parts of a system to understand the overall system.

(Multiple Choice)
5.0/5
(29)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Combination of hardware and software that allows computers to interact with a network

(Multiple Choice)
4.7/5
(38)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A risk control strategy that reduces the impact of a risk by careful planning and preparation

(Multiple Choice)
4.8/5
(29)

Response time is affected by _____.

(Multiple Choice)
4.8/5
(33)

In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.

(True/False)
4.9/5
(30)

_____ costs include expenses for items such as supplies, equipment rental, and software leases.

(Multiple Choice)
4.9/5
(38)

Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.

(Multiple Choice)
4.9/5
(38)

A _____ is the main line of defense between a local network, or intranet, and the Internet.

(Multiple Choice)
4.8/5
(31)

_____ is the overall time between a request for system activity and the delivery of the response.

(Multiple Choice)
4.8/5
(34)

The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.

(Multiple Choice)
4.8/5
(36)

A _____ is a security weakness or soft spot.

(Multiple Choice)
4.7/5
(32)

A(n) _____ is an attack that takes advantage of a vulnerability.

(Multiple Choice)
4.9/5
(37)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A risk control strategy that shifts risks to another asset or party

(Multiple Choice)
4.9/5
(33)

_____ measures risk likelihood and impact.

(Multiple Choice)
4.8/5
(32)

  -As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____. -As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.

(Multiple Choice)
4.8/5
(38)

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

(Multiple Choice)
4.8/5
(30)

Corrective maintenance _____.

(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)