Filters
Question type

Study Flashcards

Both adaptive and perfective maintenance activities decrease in a dynamic business environment.

A) True
B) False

Correct Answer

verifed

verified

_____ ensures that authorized users have timely and reliable access to necessary information.


A) Availability
B) Integrity
C) Confidentiality
D) Concealability

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Perfective maintenance _____.


A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient, reliable, or maintainable
D) competes for resources in an operational system

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

_____ protects information from unauthorized disclosure and safeguards privacy.


A) Availability
B) Integrity
C) Confidentiality
D) Accessibility

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Hostile act that targets systems or a company itself


A) Private key encryption
B) Public key encryption
C) Network interface
D) Asset
E) Mitigation
F) Transference
G) Attack
H) Security
I) Keystroke logger
J) Software reengineering

K) B) and I)
L) D) and J)

Correct Answer

verifed

verified

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Records everything that is typed into the keyboard, including passwords, while the system continues to function normally


A) Private key encryption
B) Public key encryption
C) Network interface
D) Asset
E) Mitigation
F) Transference
G) Attack
H) Security
I) Keystroke logger
J) Software reengineering

K) B) and J)
L) A) and E)

Correct Answer

verifed

verified

The hardening process that makes a system more secure is fully automatic.

A) True
B) False

Correct Answer

verifed

verified

In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.

A) True
B) False

Correct Answer

verifed

verified

The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.


A) functional baseline
B) extension baseline
C) allocated baseline
D) product baseline

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

_____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.


A) Team building activities
B) Elicitation activities
C) Maintenance activities
D) Testing activities

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.


A) high-level synthesis
B) wireless fidelity
C) word editing software
D) remote control software

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.

A) True
B) False

Correct Answer

verifed

verified

_____ is a process for controlling changes in system requirements during software development.


A) Data management
B) Disk management
C) Configuration management
D) Email management

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Matching ​Identify the letters of the choices that best match the phrases or definitions. -Uses analytical techniques to identify potential quality and performance improvements in an information system


A) Private key encryption
B) Public key encryption
C) Network interface
D) Asset
E) Mitigation
F) Transference
G) Attack
H) Security
I) Keystroke logger
J) Software reengineering

K) C) and J)
L) D) and E)

Correct Answer

verifed

verified

_____ develops safeguards that reduce risks and their impact.


A) Risk assessment
B) Risk verification
C) Risk identification
D) Risk control

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

_____ prevents unauthorized users from creating, modifying, or deleting information.


A) Availability
B) Integrity
C) Confidentiality
D) Evacuation

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.


A) privilege escalation attack
B) denial-of-service attack
C) malware penetration attack
D) identity management invasion

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

To avoid problems, preventive maintenance _____.


A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient, reliable, or maintainable
D) requires analysis of areas where trouble is likely to occur

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.


A) help desk
B) white spot
C) maintenance software module
D) utility point

E) None of the above
F) All of the above

Correct Answer

verifed

verified

  -As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance. A) corrective B) adaptive C) perfective D) preventive -As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.


A) corrective
B) adaptive
C) perfective
D) preventive

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 81

Related Exams

Show Answer