Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Indicate the answer choice that best completes the statement or answers the question. 1. The _____ describes a system at the beginning of system operation

Indicate the answer choice that best completes the statement or answers the question.

1. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

a.

functional baseline

b.

operational baseline

c.

allocated baseline

d.

product baseline

2. _____ analyzes an organization's assets, threats, and vulnerabilities.

a.

Risk uncertainty

b.

Risk diversification

c.

Risk identification

d.

Risk control

3. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.

a.

2.1

b.

1.1

c.

0.1

d.

2.1

4. Corrective maintenance _____.

a.

adds enhancements to an operational system and makes the system easier to use

b.

diagnoses and corrects errors in an operational system

c.

involves changing an operational system to make it more efficient, reliable, or maintainable

d.

competes for resources in an operational system

5. When comparing search engines, it is important to know the companys policy toward allowing commercial sites to boost their ranking in a _____ arrangement.

a.

fee for service

b.

pay for none

c.

free for all

d.

pay for performance

6. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

a.

functional baseline

b.

operational baseline

c.

allocated baseline

d.

product baseline

7. To avoid problems, preventive maintenance _____.

a.

adds enhancements to an operational system and makes the system easier to use

b.

diagnoses and corrects errors in an operational system

c.

involves changing an operational system to make it more efficient, reliable, or maintainable

d.

requires analysis of areas where trouble is likely to occur

8. _____ measures the time between submitting a request for information and the fulfillment of the request.

a.

Bandwidth

b.

Turnaround time

c.

Throughput

d.

Frequency

9. A collection of related webpages is called a _____.

a.

web browser

b.

web layer

c.

website

d.

weblink

10. A _____ is the main line of defense between a local network, or intranet, and the Internet.

a.

malware

b.

firewall

c.

spyware

d.

threat

11. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.

a.

metrics

b.

wireframes

c.

viewports

d.

baselines

Critical Thinking Questions

As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.

12. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?

a.

Social engineering

b.

Mail bombing

c.

Spoofing

d.

Privilege escalation

13. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.

a.

tester/programmer

b.

strategist/analyst

c.

programmer/analyst

d.

designer/debugger

14. When the _____ logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword.

a.

OR

b.

AND

c.

IF

d.

NOT

15. A _____ is a formal reference point that measures system characteristics at a specific time.

a.

feature line

b.

baseline

c.

product point

d.

viewport

16. _____ ensures that authorized users have timely and reliable access to necessary information.

a.

Availability

b.

Integrity

c.

Confidentiality

d.

Concealability

17. As shown in the accompanying figure, near the end of a systems useful life, _____ when it becomes clear that a company plans to replace the system.

a.

adaptive, corrective, and perfective maintenance expenses all increase rapidly

b.

perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease

c.

adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases

d.

adaptive, corrective, and perfective maintenance expenses all decrease rapidly

18. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.

a.

corrective maintenance

b.

adaptive maintenance

c.

perfective maintenance

d.

obsolete maintenance

19. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.

a.

privilege escalation attack

b.

denial-of-service attack

c.

malware penetration attack

d.

identity management invasion

20. Search engines use a specialized computer program called a _____ that travels from site to site indexing, or cataloging, the contents of the pages based on keywords.

a.

wireframe

b.

topology

c.

thread

d.

spider

Identify the letters of the choices that best match the phrases or definitions.

a.

Private key encryption

b.

Public key encryption

c.

Network interface

d.

Asset

e.

Mitigation

f.

Transference

g.

Attack

h.

Security

i.

Keystroke logger

j.

Software reengineering

21. An asymmetric kind of encryption

22. A risk control strategy that shifts risks to another asset or party

23. Hostile act that targets systems or a company itself

24. Protects the system and keeps it safe, free from danger, and reliable

25. Combination of hardware and software that allows computers to interact with a network

26. A risk control strategy that reduces the impact of a risk by careful planning and preparation

27. Uses a single key to encrypt and decrypt information

28. Uses analytical techniques to identify potential quality and performance improvements in an information system

29. Might include company hardware, software, data, networks, people, or procedures

30. Records everything that is typed into the keyboard, including passwords, while the system continues to function normally

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

What does the disclosure principle require?

Answered: 1 week ago