Chapter 12 Review
1.
A____ is an unauthorized attempt to increase
permission levels.
A: privilege escalation attack
B: denial-of-service attack
C: Trojan horse
D: identity management invasion
2.
____ also can be used to measure the quality
of IT support or services by measuring the time from a user request for help to
the resolution of the problem.
A: Bandwidth
B: Turnaround time
C: Throughput
D: Response time
3.
Risk ____ develops safeguards that reduce
risks and their impact.
A: assessment
B: management
C: identification
D: control
4.
The ____ is the configuration of a system
documented at the beginning of the project and consists of all necessary system
requirements and design constraints.
A: functional baseline
B: operational baseline
C: allocated baseline
D: product baseline
5.
____ shifts the risk to another asset or
party, such as an insurance company, in risk control.
A: Acceptance
B: Avoidance
C: Mitigation
D: Transference
6.
The release methodology offers all of the
following advantages except ____.
A: all changes are tested together before a
new system version is released
B: costs are reduced because only one set of
system tests is needed
C: documentation changes are coordinated and
become effective simultaneously
D: new features or upgrades are available more often
7.
____ prevents unauthorized users from
creating, modifying, or deleting information.
A: Availability
B: Integrity
C: Confidentiality
D: Risk management
8.
Depending on the system, bandwidth might be
measured in any of the following except ____.
A: Kbps (kilobits per second.
B: Mbps (megabits per second.
C: Dbps (decibits per second.
D: Gbps (gigabits per second.
9. In a typical system, the initial version of the system is
1.0, and the release that includes the first set of maintenance changes is
version ____.
A: 1.0
B: 1.1
C: 2.0
D: 2.1
10.____ means that nothing is done, in risk control.
A: Acceptance
B: Avoidance
C: Mitigation
D: Transference
11. The ____ triangle has three main elements
of system security: confidentiality, integrity, and availability.
A: CPA
B: CIA
C: CSI
D: CIS
12. ____ includes monitoring the system for
signs of trouble, logging all system failures, diagnosing the problem, and
applying corrective action.
A: Error analysis
B: Fault analysis
C: Error management
D: Fault management
13. When a____ methodology is used, all
noncritical changes are held until they can be implemented at the same time.
A: in-house development
B: version control
C: maintenance release
D: bug fix
14. The maintenance team includes a system
administrator and one or more ____.
A: systems analysts
B: programmers
C: both a. and b.
D: neither a. nor b.
15.
____ include items such as supplies, equipment rental, and software
leases.
A: Maintenance costs
B: Operational costs
C: Connection costs
D: User costs
16. ____ refers to copying data in prescribed
intervals, or continuously.
A: Security
B: Classifying
C: Backup
D: Recovery
17. ____
measures actual system performance under specific circumstances and is affected
by network loads and hardware efficiency.
A: Bandwidth
B: Throughput
C: Response time
D: Answer time
18. A ____ is a formal reference point that
measures system characteristics at a specific time.
A: baseline
B: foundation
C: bottom line
D: core
19. A____ programmer concentrates on
operating system software and utilities.
A: systems
B: security
C: applications
D: database
20. ____
maintenance reduces the possibility of future system failure.
A: Corrective
B: Adaptive
C: Perfective
D: Preventive
21. If significant changes take place in the
existing system, the IT department might develop a ____ that could include
online support, a special Web site, and formal training sessions.
A: user training package
B: management training package
C: buyer training package
D: seller training package
22. ____ protects information from
unauthorized disclosure and safeguards privacy.
A: Confidentiality
B: Availability
C: Integrity
D: Flexibility
23. To measure system performance, many firms
use ____ testing, which uses a set of standard tests to evaluate system
performance and capacity.
A: foundation
B: benchmark
C: comparison
D: baseline
24. In a typical system, the initial release
version of the system is ____.
A: 0.0
B: 0.1
C: 1.0
D: 10.0
25. A ____ manages computer and network
systems.
A: system supervisor
B: system administrator
C: system analyst
D: system programmer
26. ____ activities include changing
programs, procedures, or documentation to ensure correct system performance.
A: Maintenance
B: Operational
C: Connection
D: Analyst
27. A ____ network is a dedicated connection,
similar to a leased telephone line.
A: private
B: public
C: virtual
D: protected
28. Bandwidth requirements are made in ____.
A: bits per millisecond
B: bits per second
C: packets per millisecond
D: packets per second
29. The ____ baseline documents the system at
the end of the design phase.
A: functional
B: allocated
C: product
D: formal
30. A(n) ____ programmer focuses on creating
and supporting large-scale database systems.
A: systems
B: security
C: applications
D: database