Exam 7: Enterprise Architecture and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.

(True/False)
4.9/5
(36)

What are the seven characteristics of an agile infrastructure architecture?

(Multiple Choice)
4.9/5
(35)

What determines future environmental infrastructure requirements that ensure high-quality system performance?

(Multiple Choice)
4.8/5
(35)

Organisations address security risks through two lines of defence,namely:

(Multiple Choice)
4.8/5
(34)

Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.

(True/False)
4.7/5
(32)

A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

(True/False)
4.7/5
(43)

e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.

(True/False)
4.8/5
(39)

What is usability?

(Multiple Choice)
4.8/5
(37)

Portability determines future environmental infrastructure requirements to ensure high-quality system performance.

(True/False)
4.8/5
(39)

Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.

(Multiple Choice)
4.9/5
(31)

________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.

(Short Answer)
4.9/5
(38)

How do authentication and authorisation differ?

(Essay)
4.8/5
(46)

The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.

(True/False)
4.9/5
(38)

__________ are one of the most ineffective ways of determining authentication.

(Short Answer)
4.7/5
(31)

Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.

(Short Answer)
4.8/5
(34)

Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?

(Multiple Choice)
4.9/5
(31)

Fault tolerance is an exact copy of a system's information.

(True/False)
4.9/5
(43)

The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.

(True/False)
4.9/5
(41)

________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.

(Short Answer)
4.8/5
(31)

Which of the following is an example of sustainable enterprise architecture?

(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 73
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)