Exam 7: Enterprise Architecture and Security
Exam 1: Information Systems Are Business72 Questions
Exam 2: Our Connected World74 Questions
Exam 3: E-Business Mobile Business70 Questions
Exam 4: Decisions and Processes80 Questions
Exam 5: Essentials of Information Systems76 Questions
Exam 6: Systems Development and Project Management77 Questions
Exam 7: Enterprise Architecture and Security73 Questions
Exam 8: Data and Business Intelligence80 Questions
Exam 9: Enterprise Information Systems: ERP and SCN77 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems81 Questions
Exam 11: Ethics, Privacy, Social Media and Future Trends80 Questions
Select questions type
Through ________,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Free
(Short Answer)
4.9/5
(40)
Correct Answer:
social engineering
Which of the following is a benefit of a solid enterprise architecture?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
Identify the three primary areas associated with an information architecture.
Free
(Essay)
4.9/5
(40)
Correct Answer:
1 Backup and recovery
2 Disaster recovery(DR)
3 Business continuity planning (BCP)
Performance measures how quickly a system performs a process or transaction.
(True/False)
4.9/5
(39)
Each year businesses lose time and money because of system crashes and failures.Which of the following offers the best way to protect a system from crashes and failures?
(Multiple Choice)
4.8/5
(32)
With grid computing,a problem is broken into pieces and distributed to many machines,allowing _________ processing than could occur with a single system.
(Multiple Choice)
4.8/5
(30)
Dynamic scaling means the enterprise architecture can be automatically scaled up or down based on needed requirements.
(True/False)
4.8/5
(42)
Cloud computing allows users to connect via a web browser and stores all of their software documents 'in the cloud',which means there is no more need for users to have ___________.
(Multiple Choice)
4.9/5
(41)
What is the safe disposal of IT assets at the end of their life cycle called?
(Multiple Choice)
4.8/5
(30)
Cloud computing often uses grid computing,though grid computing does not necessarily use a cloud.
(True/False)
4.9/5
(40)
Grid computing takes advantage of the available 75 per cent of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks.
(Multiple Choice)
4.9/5
(38)
Maintainability means the system can quickly transform to support environmental changes.
(True/False)
4.7/5
(33)
Who is a person who is grounded in technology,fluent in business,and able to provide the important bridge between IT and the business?
(Multiple Choice)
5.0/5
(32)
Usability means the system functions correctly and provides accurate information.
(True/False)
5.0/5
(39)
Enterprise architecture is a communications system created by linking two or more devices and establishing a standard methodology for communication.
(True/False)
4.8/5
(33)
What type of software searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm?
(Multiple Choice)
4.8/5
(34)
As soon as an organisation has protected its intellectual capital by arming its people with a detailed information security plan,it can begin to focus on deploying ________ to help combat attack.
(Short Answer)
4.7/5
(29)
Sustainable or 'green' IT describes the production,management,use and disposal of technology in a way that maximises damage to the environment.
(True/False)
4.8/5
(35)
Showing 1 - 20 of 73
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)