Exam 7: Enterprise Architecture and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Through ________,hackers use their social skills to trick people into revealing access credentials or other valuable information.

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

social engineering

Which of the following is a benefit of a solid enterprise architecture?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

Identify the three primary areas associated with an information architecture.

Free
(Essay)
4.9/5
(40)
Correct Answer:
Verified

1 Backup and recovery
2 Disaster recovery(DR)
3 Business continuity planning (BCP)

Performance measures how quickly a system performs a process or transaction.

(True/False)
4.9/5
(39)

Each year businesses lose time and money because of system crashes and failures.Which of the following offers the best way to protect a system from crashes and failures?

(Multiple Choice)
4.8/5
(32)

With grid computing,a problem is broken into pieces and distributed to many machines,allowing _________ processing than could occur with a single system.

(Multiple Choice)
4.8/5
(30)

Enterprise architecture is __________ and ___________.

(Multiple Choice)
4.9/5
(34)

Dynamic scaling means the enterprise architecture can be automatically scaled up or down based on needed requirements.

(True/False)
4.8/5
(42)

Cloud computing allows users to connect via a web browser and stores all of their software documents 'in the cloud',which means there is no more need for users to have ___________.

(Multiple Choice)
4.9/5
(41)

What is the safe disposal of IT assets at the end of their life cycle called?

(Multiple Choice)
4.8/5
(30)

Cloud computing often uses grid computing,though grid computing does not necessarily use a cloud.

(True/False)
4.9/5
(40)

Grid computing takes advantage of the available 75 per cent of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks.

(Multiple Choice)
4.9/5
(38)

Maintainability means the system can quickly transform to support environmental changes.

(True/False)
4.7/5
(33)

Who is a person who is grounded in technology,fluent in business,and able to provide the important bridge between IT and the business?

(Multiple Choice)
5.0/5
(32)

Usability means the system functions correctly and provides accurate information.

(True/False)
5.0/5
(39)

Enterprise architecture is a communications system created by linking two or more devices and establishing a standard methodology for communication.

(True/False)
4.8/5
(33)

________ is a method of confirming users' identities.

(Short Answer)
4.8/5
(27)

What type of software searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm?

(Multiple Choice)
4.8/5
(34)

As soon as an organisation has protected its intellectual capital by arming its people with a detailed information security plan,it can begin to focus on deploying ________ to help combat attack.

(Short Answer)
4.7/5
(29)

Sustainable or 'green' IT describes the production,management,use and disposal of technology in a way that maximises damage to the environment.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 73
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)