Chapter 12 Review



Chapter 12 Review

1.     A____ is an unauthorized attempt to increase permission levels.
A: privilege escalation attack
B: denial-of-service attack
C: Trojan horse
D: identity management invasion

2.     ____ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.
A: Bandwidth
B: Turnaround time
C: Throughput
D: Response time

3.     Risk ____ develops safeguards that reduce risks and their impact.
A: assessment
B: management
C: identification
D: control

4.     The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
A: functional baseline
B: operational baseline
C: allocated baseline
D: product baseline

5.     ____ shifts the risk to another asset or party, such as an insurance company, in risk control.
A: Acceptance
B: Avoidance
C: Mitigation
D: Transference

6.     The release methodology offers all of the following advantages except ____.
A: all changes are tested together before a new system version is released
B: costs are reduced because only one set of system tests is needed
C: documentation changes are coordinated and become effective simultaneously
D: new features or upgrades are available more often

7.     ____ prevents unauthorized users from creating, modifying, or deleting information.
A: Availability
B: Integrity
C: Confidentiality
D: Risk management

8.    Depending on the system, bandwidth might be measured in any of the following except ____.
A: Kbps (kilobits per second.
B: Mbps (megabits per second.
C: Dbps (decibits per second.
D: Gbps (gigabits per second.

9.   In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.
A: 1.0
B: 1.1
C: 2.0
D: 2.1

10.____ means that nothing is done, in risk control.
A: Acceptance
B: Avoidance
C: Mitigation
D: Transference

11. The ____ triangle has three main elements of system security: confidentiality, integrity, and availability.
A: CPA
B: CIA
C: CSI
D: CIS

12. ____ includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
A: Error analysis
B: Fault analysis
C: Error management
D: Fault management
           
13. When a____ methodology is used, all noncritical changes are held until they can be implemented at the same time.
A: in-house development
B: version control
C: maintenance release
D: bug fix
           
14. The maintenance team includes a system administrator and one or more ____.
A: systems analysts
B: programmers
C: both a. and b.
D: neither a. nor b.
           
15.  ____ include items such as supplies, equipment rental, and software leases.
A: Maintenance costs
B: Operational costs
C: Connection costs
D: User costs
           
16. ____ refers to copying data in prescribed intervals, or continuously.
A: Security
B: Classifying
C: Backup
D: Recovery
           
17.        ____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.
A: Bandwidth
B: Throughput
C: Response time
D: Answer time
           
18. A ____ is a formal reference point that measures system characteristics at a specific time.
A: baseline
B: foundation
C: bottom line
D: core
           
19. A____ programmer concentrates on operating system software and utilities.
A: systems
B: security
C: applications
D: database
           
20.        ____ maintenance reduces the possibility of future system failure.
A: Corrective
B: Adaptive
C: Perfective
D: Preventive
           
21. If significant changes take place in the existing system, the IT department might develop a ____ that could include online support, a special Web site, and formal training sessions.
A: user training package
B: management training package
C: buyer training package
D: seller training package
           
22. ____ protects information from unauthorized disclosure and safeguards privacy.
A: Confidentiality
B: Availability
C: Integrity
D: Flexibility
           
23. To measure system performance, many firms use ____ testing, which uses a set of standard tests to evaluate system performance and capacity.
A: foundation
B: benchmark
C: comparison
D: baseline
           
24. In a typical system, the initial release version of the system is ____.
A: 0.0
B: 0.1
C: 1.0
D: 10.0
           
25. A ____ manages computer and network systems.
A: system supervisor
B: system administrator
C: system analyst
D: system programmer

26. ____ activities include changing programs, procedures, or documentation to ensure correct system performance.
A: Maintenance
B: Operational
C: Connection
D: Analyst
           
27. A ____ network is a dedicated connection, similar to a leased telephone line.
A: private
B: public
C: virtual
D: protected

28. Bandwidth requirements are made in ____.
A: bits per millisecond
B: bits per second
C: packets per millisecond
D: packets per second

29. The ____ baseline documents the system at the end of the design phase.
A: functional
B: allocated
C: product
D: formal

30. A(n) ____ programmer focuses on creating and supporting large-scale database systems.
A: systems
B: security
C: applications
D: database

0 comments:

Post a Comment