Exam 7: Enterprise Architecture and Security
Exam 1: Information Systems Are Business72 Questions
Exam 2: Our Connected World74 Questions
Exam 3: E-Business Mobile Business70 Questions
Exam 4: Decisions and Processes80 Questions
Exam 5: Essentials of Information Systems76 Questions
Exam 6: Systems Development and Project Management77 Questions
Exam 7: Enterprise Architecture and Security73 Questions
Exam 8: Data and Business Intelligence80 Questions
Exam 9: Enterprise Information Systems: ERP and SCN77 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems81 Questions
Exam 11: Ethics, Privacy, Social Media and Future Trends80 Questions
Select questions type
Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.
(True/False)
4.9/5
(36)
What are the seven characteristics of an agile infrastructure architecture?
(Multiple Choice)
4.9/5
(35)
What determines future environmental infrastructure requirements that ensure high-quality system performance?
(Multiple Choice)
4.8/5
(35)
Organisations address security risks through two lines of defence,namely:
(Multiple Choice)
4.8/5
(34)
Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.
(True/False)
4.7/5
(32)
A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
(True/False)
4.7/5
(43)
e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.
(True/False)
4.8/5
(39)
Portability determines future environmental infrastructure requirements to ensure high-quality system performance.
(True/False)
4.8/5
(39)
Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.
(Multiple Choice)
4.9/5
(31)
________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.
(Short Answer)
4.9/5
(38)
The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.
(True/False)
4.9/5
(38)
__________ are one of the most ineffective ways of determining authentication.
(Short Answer)
4.7/5
(31)
Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.
(Short Answer)
4.8/5
(34)
Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?
(Multiple Choice)
4.9/5
(31)
The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.
(True/False)
4.9/5
(41)
________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
(Short Answer)
4.8/5
(31)
Which of the following is an example of sustainable enterprise architecture?
(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 73
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)