Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Processes Systems
Exam 12: Mis Management Processes: Process Management, systems Development, and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
________ occurs when a person breaks into computers,servers,or networks to steal data.
Question 2
True/False
Cookies are small files that browsers store on a computer when a user visits a Web site.
Question 3
True/False
Most secure communication over the Internet uses a protocol called HTTP.
Question 4
True/False
Maintaining the same password for a long duration will increase system security.
Question 5
True/False
Firewalls can block traffic from particular sites known for malicious content to any user behind it.
Question 6
True/False
A business process may use one or more information systems,but an information system may be used by only one business process.
Question 7
Multiple Choice
During the modeling activity of BPM,teams build an as-is model which ________.
Question 8
True/False
A key is a physical device that is used to lock and unlock a message.
Question 9
Multiple Choice
How is scrum distinguished from SDLC ?
Question 10
Multiple Choice
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf.This attack is an example of ________.
Question 11
True/False
Drive-by sniffers often target protected wireless networks to monitor and intercept the wireless traffic at will.
Question 12
Essay
Describe some data safeguards taken against security threats.
Question 13
True/False
Agile development methodologies support just-in-time design.
Question 14
Multiple Choice
Which of the following is the first activity in the SDLC process?
Question 15
True/False
Business analysts work primarily with systems development,but they are also involved in business processes to a small extent.
Question 16
True/False
Secure Socket Layer uses a combination of public key/private key and symmetric encryption.
Question 17
True/False
Tasks in the implementation activity of the SDLC process involve building and testing system components and converting users to the new system and possibly new business processes.