exam questions
QUESTION 27 are defined as collections of related tasks that receive inputs and produce outputs. In a business process, O presentations O resources data stores activities databases QUESTION 28 In the context of system implementation phase of the systems development life cycle (SDLC), a(n) _____installation is the riskiest because the old system is shut down and the new system is introduced. immersion Ophased pilot parallel plunge QUESTION 29 One of the major functions of the information systems (IS) department is to develop, operate, and maintain applications. True False QUESTION 24 Removing and disabling cookies presents an excellent example of the trade-off between improved security and cost. True False QUESTION 25 for encoding messages. In a special version of asymmetric encryption, each site has a public key botnet O private key cookie cipher QUESTION 26 In the information system (IS) department, the group manages the process of creating new information systems as well as maintaining existing information systems. operations outsourcing relations development technology networking cookie smart card ATM card dropper QUESTION 21 Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack. True False QUESTION 22 Melissa is in charge of creating a Business Process Modeling Notation (BPMN) diagram for the procurement department. The diagram will represent the separate paths to be followed for an old supplier and a new supplier. Which of the following shapes should Melissa use to represent the question "old supplier?" which can be answered with a yes or no as applicable? ovals rectangles diamonds circles squares QUESTION 23 SDLC rose to prominence when the U.S. Department of Defense required it on government contracts. True False Remaining Time: 1 hour, 25 minutes, 54 seconds. Question Completion Status: QUESTION 18 A _examines each part of a message and determines whether to let that part pass. O packet-filtering firewall nmap O private key mail server wardriver QUESTION 19 John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility? knowing whom to contact when a security breach occurs creating a backup of system databases using systems to perform job tasks writing software program codes prepare for loss of system functionality QUESTION 20 An) _ _has a microchip in it to hold data. key escrow cookie smart card ATM card dropper Click Save and Shine and itchie A l tan Remaining Time: 1 hour, 25 minutes, 43 seconds. Question Completion Status: All of the following are keys to success when managing a SDLC project except create a work breakdown structure create a prototype O estimate time and costs adjust the plan via trade-offs manage development challenges QUESTION 15 In the context of outsourcing, once a company has chosen a vendor, further risk management is up to that vendor. True False QUESTION 16 In the system implementation phase of the systems development life cycle (SDLC) with _installation, the organization implements the entire new system/business processes on a limited portion of the business. phased immersion plunge parallel pilot QUESTION 17 One of the personal security safeguards is to use https at trusted, reputable vendors. True False Click Save and Submit to save and submit. Click Save All answers to sour all ansacers Save All And