Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Systems Analysis and Design Study Set 6
Exam 12: Managing Systems Support and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
_____ prevents unauthorized users from creating, modifying, or deleting information.
Question 22
Multiple Choice
_____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
Question 23
True/False
Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
Question 24
Multiple Choice
-As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.
Question 25
Multiple Choice
Perfective maintenance _____.
Question 26
Multiple Choice
A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.
Question 27
Multiple Choice
Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
Question 28
True/False
In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.
Question 29
Multiple Choice
Matching Identify the letters of the choices that best match the phrases or definitions. -Uses analytical techniques to identify potential quality and performance improvements in an information system
Question 30
Multiple Choice
_____ develops safeguards that reduce risks and their impact.
Question 31
Multiple Choice
_____ ensures that authorized users have timely and reliable access to necessary information.
Question 32
True/False
The hardening process that makes a system more secure is fully automatic.
Question 33
True/False
In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.
Question 34
Multiple Choice
_____ protects information from unauthorized disclosure and safeguards privacy.
Question 35
Multiple Choice
A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.
Question 36
Multiple Choice
Matching Identify the letters of the choices that best match the phrases or definitions. -Records everything that is typed into the keyboard, including passwords, while the system continues to function normally