Deck 12: MIS Management Processes: Process Management, Systems Development, and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/119
Play
Full screen (f)
Deck 12: MIS Management Processes: Process Management, Systems Development, and Security
1
With parallel installation, a new information system/business process is installed in phases across an organization.
False
2
As a source of security vulnerabilities, malicious human activity includes physical accidents.
False
3
Phishing is a social engineering technique for obtaining unauthorized data via e-mail pretexting.
True
4
Designing system components is the first step in the SDLC process.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
5
With pilot installation, an organization implements a limited portion of a new business process on the entire organization.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
6
Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new information system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
7
Pretexting is social engineering in which someone gains unauthorized access to a computer without the user's knowledge.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
8
Systems analysts are IS professionals who understand both business and technology.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
9
Managers evaluate process measures against their objectives and respond to changes in the business climate during the modeling activity of BPM.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
10
Tasks in the implementation activity of the SDLC process are to build and test system components and to convert users to the new system and possibly new business processes.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
11
With regard to people, design involves developing role job descriptions.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
12
Information systems security is the process of protecting information systems vulnerabilities from threats by creating appropriate safeguards.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
13
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
14
New process modeling is not necessary if a process change involves only alterations in human resources.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
15
Organizational feasibility refers to whether a new information system is economically feasible for an organization.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
16
A test plan is an informal description of how an information system's components should be tested.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
17
Business analysts work primarily with systems development, but they are also involved in business processes.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
18
BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
19
The term system conversion refers to the process of testing software.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
20
Parallel installation is also called direct installation.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
21
Worms are viruses that masquerade as useful programs or files.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
22
A firewall is a computing device that prevents unauthorized network access.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
23
IP spoofing is a situation in which a computer registers on a network without using an IP address.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
24
Sniffing is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
25
A public key is used for decoding messages in asymmetric encryption.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
26
Worms are specifically programmed to spread, and they spread faster than other virus types.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
27
Hacking occurs when a person gains unauthorized access to a computer system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
28
Balancing the risks and costs of a security system is the responsibility of system developers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
29
A smart card has a magnetic strip.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
30
Adware is a program that is installed on a system after seeking the user's permission.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
31
Natural disasters present the largest risk for infrastructure loss.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
32
Establishing security policies is a security function of senior management.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
33
Systems use user names to authenticate users.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
34
Biometric authentication uses personal physical characteristics to authenticate users.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
35
With HTTPS, data are encrypted using a protocol called the Transmission Control Protocol.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
36
Two different keys are used for coding and decoding in symmetric encryption.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
37
Safeguards are protections against security vulnerabilities.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
38
Most secure communication over the Internet uses a protocol called HTTP.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
39
A key is a number used to encrypt data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
40
Denial-of-service attacks involve the sending of anonymous e-mails to users.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
41
Passwords are the primary means of authentication for information systems.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
42
The practice of keeping a copy of an encryption key with a trusted party is referred to as key escrow.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
43
A firm considers a proposal for the implementation of a supply chain management system. After evaluating the proposal, the directors of the firm conclude that the system is not in line with the firm's culture and customs. This system lacks ________ feasibility.
A) economic
B) technical
C) schedule
D) organizational
A) economic
B) technical
C) schedule
D) organizational
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
44
________ feasibility concerns whether the new system fits within the customs, culture, charter, or legal requirements of a firm.
A) Economical
B) Technical
C) Schedule
D) Organizational
A) Economical
B) Technical
C) Schedule
D) Organizational
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
45
Account management concerns the modification of existing account permissions and the removal of unneeded accounts.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is the last activity in the SDLC process?
A) implement the system
B) test the system
C) create system components
D) maintain the system
A) implement the system
B) test the system
C) create system components
D) maintain the system
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
47
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with possible risks and losses.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
48
A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
49
Hot sites are cheaper to lease than cold sites.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is true of systems analysts?
A) They integrate the work of programmers, testers, and users.
B) They work primarily with business processes.
C) They are active mainly during the system conversion phase of the systems development process.
D) They focus on information systems development and lack knowledge on process design.
A) They integrate the work of programmers, testers, and users.
B) They work primarily with business processes.
C) They are active mainly during the system conversion phase of the systems development process.
D) They focus on information systems development and lack knowledge on process design.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
51
Switching between two passwords periodically will increase system security.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is a valid observation of determining the requirements of an information system?
A) Determining system requirements is the final step in the SDLC process.
B) Systems analysts interview users and record the results to determine system requirements.
C) System requirements are determined after making a basic design of the system.
D) Existing systems are typically not used as a source for determining system requirements.
A) Determining system requirements is the final step in the SDLC process.
B) Systems analysts interview users and record the results to determine system requirements.
C) System requirements are determined after making a basic design of the system.
D) Existing systems are typically not used as a source for determining system requirements.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is the first activity in the SDLC process?
A) design system components
B) determine requirements
C) define the system
D) develop technical safeguards
A) design system components
B) determine requirements
C) define the system
D) develop technical safeguards
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
54
During the integrated testing and conversion phase of the SDLC process, the project team will be heavy with ________.
A) business analysts
B) programmers
C) business users
D) process specialists
A) business analysts
B) programmers
C) business users
D) process specialists
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
55
A cold site is a utility company that can take over another company's processing with no forewarning.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
56
During the modeling activity of BPM, teams build an as-is model which ________.
A) simulates the ideal situation
B) designs new business processes
C) documents the current situation
D) models the ideal behavior of team members
A) simulates the ideal situation
B) designs new business processes
C) documents the current situation
D) models the ideal behavior of team members
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
57
An incident response plan includes how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
58
During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate.
A) component creation
B) monitoring
C) modeling
D) process implementation
A) component creation
B) monitoring
C) modeling
D) process implementation
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
59
Organizations should not use security considerations as a criterion for hiring employees.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is the most important activity in the systems development process?
A) defining the system
B) maintaining the system
C) designing the system's components
D) determining the system's requirements
A) defining the system
B) maintaining the system
C) designing the system's components
D) determining the system's requirements
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
61
A malicious hacker flooded an online retailer's server with millions of bogus service requests. Due to this, the Web site's server was overloaded and the site was unable to service legitimate customer requests. This attack is an example of which of the following security threats?
A) spoofing
B) sniffing
C) phishing
D) denial-of-service
A) spoofing
B) sniffing
C) phishing
D) denial-of-service
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
62
Account administration and systems procedures are examples of ________ safeguards.
A) data
B) hardware
C) human
D) software
A) data
B) hardware
C) human
D) software
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
63
Dorex Manufacturing builds an ERP system to streamline its business activities. After being tested, the company implements the system only in the procurement department. This is an example of ________ installation.
A) parallel
B) phased
C) pilot
D) plunge
A) parallel
B) phased
C) pilot
D) plunge
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
64
As a source of security vulnerabilities, malicious human activity includes ________.
A) poorly designed procedures
B) intentional destruction of data
C) physical accidents
D) poorly written applications
A) poorly designed procedures
B) intentional destruction of data
C) physical accidents
D) poorly written applications
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
65
With ________ installation, a new system/business process is installed in stages across an organization.
A) parallel
B) pilot
C) plunge
D) phased
A) parallel
B) pilot
C) plunge
D) phased
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
66
With ________ installation, an organization shuts off the old system/business process and starts the new one.
A) parallel
B) pilot
C) plunge
D) phased
A) parallel
B) pilot
C) plunge
D) phased
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
67
________ occurs when a person gains unauthorized access to a computer system.
A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
68
________ refers to social engineering in which someone deceives by pretending to be someone else.
A) Pretexting
B) Spyware
C) Sniffing
D) Denial-of-service
A) Pretexting
B) Spyware
C) Sniffing
D) Denial-of-service
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
69
Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States. The company implements Oracle SCM to reduce its operational costs. Even after the implementation of the SCM system, the company does not shut down the old system and runs both the systems simultaneously. This is an example of ________ installation.
A) plunge
B) pilot
C) phased
D) parallel
A) plunge
B) pilot
C) phased
D) parallel
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
70
With ________ installation, a new system/business process is installed and operated alongside the old system until the new system is tested and fully operational.
A) parallel
B) pilot
C) plunge
D) phased
A) parallel
B) pilot
C) plunge
D) phased
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
71
The term system conversion refers to the phase in which an organization ________.
A) designs the software for a new system
B) installs a new system
C) tests a new system
D) designs the hardware of a new system
A) designs the software for a new system
B) installs a new system
C) tests a new system
D) designs the hardware of a new system
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
72
An organization purchases SAP's ERP system. After customizing the system and training employees, the organization shuts down the old system and implements the new one across all business processes. This is an example of ________ installation.
A) parallel
B) plunge
C) pilot
D) phased
A) parallel
B) plunge
C) pilot
D) phased
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
73
You receive an e-mail from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details. Later, you identify that the e-mail was not sent by the company. This e-mail is an example of ________.
A) sniffing
B) spyware
C) phishing
D) denial-of-service
A) sniffing
B) spyware
C) phishing
D) denial-of-service
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
74
An organization protects important information by using passwords. This is an example of a ________ safeguard.
A) procedural
B) data
C) software
D) hardware
A) procedural
B) data
C) software
D) hardware
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
75
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf. This attack is an example of ________.
A) sniffing
B) spyware
C) spoofing
D) denial-of-service
A) sniffing
B) spyware
C) spoofing
D) denial-of-service
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
76
________ is a social engineering technique in which a person pretends to be a legitimate company and sends e-mails requesting confidential data.
A) Phishing
B) Spyware
C) Sniffing
D) Denial-of-service
A) Phishing
B) Spyware
C) Sniffing
D) Denial-of-service
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is a technique for intercepting computer communications?
A) phishing
B) sniffing
C) keystroke logging
D) pretexting
A) phishing
B) sniffing
C) keystroke logging
D) pretexting
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is a disadvantage of building information systems before business processes?
A) Some aspects of business processes are unlikely to be considered when the system is constructed first.
B) System requirements cannot be collected if systems are developed before business processes.
C) Organizations will lose focus on building hardware and software if information systems are built first.
D) Organizations will lose focus on data procedures and training if information systems are developed first.
A) Some aspects of business processes are unlikely to be considered when the system is constructed first.
B) System requirements cannot be collected if systems are developed before business processes.
C) Organizations will lose focus on building hardware and software if information systems are built first.
D) Organizations will lose focus on data procedures and training if information systems are developed first.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
79
With ________ installation, organizations implement an entire system/business process on a limited portion of the business.
A) parallel
B) phased
C) pilot
D) plunge
A) parallel
B) phased
C) pilot
D) plunge
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
80
A(n)________ is a formal description of a system's response to use and misuse scenarios.
A) test plan
B) as-is model
C) digital certificate
D) code injection
A) test plan
B) as-is model
C) digital certificate
D) code injection
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck