Deck 8: Managing Partnership-Based It Operations

ملء الشاشة (f)
exit full mode
سؤال
When a business unit within an organization acts to optimize its own business objective, it could reduce the effectiveness/efficiency of another unit.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The most expensive computer crime in the past five years has been financial fraud.
سؤال
IT Systems operations problems are never obvious to the entire organization.
سؤال
Outsourcing all or most of a reengineered process is referred to as shared services outsourcing.
سؤال
IT operations budgets contain hardware expenses only, software is budgeted with new development projects.
سؤال
Security authentication prevents parties from denying actions they have taken.
سؤال
Problems reported by the external operational measures can be generally explained by deviations in the internal operational measures.
سؤال
In order to effectively manage IT operations, only internal measures such as network downtime are needed.
سؤال
According to Congleton, it is easier to recruit IT operations managers than IT project managers because of the large budgets that they manage.
سؤال
Managing outsourcing simplifies IT operations consisting solely of tracking project status.
سؤال
Managing IT operations requires facilitation, mediation, trade-offs, and consensus within and beyond the IT department.
سؤال
Disaster recovery planning is typically part of the IS operations budget.
سؤال
The sole job of IT management is to participate in the organization's quest for technology-enabling business opportunities.
سؤال
Service level agreements are an important part of any outsourcing relationship because they specify supplier performance requirements.
سؤال
Transitional outsourcing involves long-term contracts to develop and maintain strategic systems.
سؤال
System response time is considered an external operational measure.
سؤال
Offshoring has allowed companies to rapidly expand their IT support staff by transferring routine work to the outsourcing partner.
سؤال
The trend towards client-based distributed computing has made IT operations management more difficult.
سؤال
Lower labor costs is one of the primary reasons why companies offshore IT services.
سؤال
Outsourcing is strictly an IT concern and does not involve business drivers.
سؤال
Project-based outsourcing is also referred to as:

A) transitional outsourcing.
B) best-of-breed outsourcing.
C) collaborative outsourcing.
D) None of the above
سؤال
The foundations of governing an outsourcing relationship are laid out in the:

A) contract.
B) relationship.
C) project specifications.
D) All of the above
سؤال
The most expensive cybercrime in the past five years was:

A) telecom fraud.
B) denial of service attacks.
C) unauthorized attacks.
D) None of the above
سؤال
To protect against message sniffing, messages should be:

A) backed up.
B) nonrepudiated.
C) encrypted.
D) All of the above
سؤال
Which of the following is an approach that hackers use to gain unauthorized access?

A) network sniffing
B) using Trojan horses
C) using viruses
D) All of the above
سؤال
Which of the following is not an external operational measure?

A) network uptime
B) average CPU capacity
C) system response time
D) All of the above are external operational measures.
سؤال
A fraudulent Web site masquerading as a legitimate Web site is called:

A) sniffing.
B) spoofing.
C) cracking.
D) charading.
سؤال
Which of the following is an internal operational measure?

A) age of applications
B) system downtime
C) program failure rate
D) All of the above
سؤال
An important attribute of a good SLA is:

A) cost.
B) completeness.
C) metrics.
D) All of the above
سؤال
Preventing other parties from denying actions they have taken is referred to as:

A) authentication.
B) nonrepudiation.
C) integrity stabilization.
D) None of the above
سؤال
E-business outsourcing and IT outsourcing are combining into a new form of managed services outsourcing that is being referred to as:

A) utility computing.
B) on-demand computing.
C) virtual data centers.
D) grid computing.
E) All of the above
سؤال
Which of the following is a system operational problem?

A) slow network response time
B) Data is wrong.
C) A database is not available.
D) All of the above
سؤال
When one company becomes the prime contractor for IS operations but utilizes other ESPs for some work this is referred to as:

A) transitional outsourcing.
B) best-of-breed outsourcing.
C) collaborative outsourcing.
D) None of the above
سؤال
Outsourcing all or most of a reengineered process is referred to as:

A) reengineering process outsourcing.
B) business process outsourcing.
C) best-of-breed outsourcing.
D) None of the above
سؤال
The drivers behind outsourcing leading organizations to restructure and emphasize their core business are:

A) value and focus
B) competitive advantage and value.
C) market conditions and focus.
D) competitive advantage and focus.
E) All of the above
سؤال
Which of the following is a reason why companies off-shore IT support?

A) to tap into cheaper labor markets
B) to take advantage of a larger labor supply
C) to take advantage of high-quality labor
D) All of the above
سؤال
Which of the following is a viable way to solve operational problems?

A) Continuously address the problem at hand and readjust priorities as a result.
B) Buy more equipment.
C) Document and measure solutions to existing problems.
D) All of the above
سؤال
Which of the following is not a trend in operations management?

A) Operations are being centralized.
B) Operations are being offshored.
C) Operations are now integrated into the application delivery process.
D) All of the above
سؤال
In the early days of outsourcing, the organizational goal of outsourcing contracts was:

A) strategic.
B) financial.
C) operational.
D) All of the above
سؤال
Which of the following is a reason that companies outsource IS functions?

A) to focus on core competencies
B) to utilize lower labor costs
C) to increase value to the organization
D) All of the above
سؤال
Describe encryption.
سؤال
What is a firewall?
سؤال
List and describe four changes in the vendor-customer relationship that often occur as an organization shifts IT management from the more traditional professional services category to outsourcing.
سؤال
Briefly discuss the impact that the Internet and Y2K have had on computer operations.
سؤال
List and describe two ways that management can effectively manage IT operations.
سؤال
Describe business process outsourcing.
سؤال
Identify five ways that hackers use to gain unauthorized access to systems.
سؤال
How can the portfolio approach to IT management improve IT operations?
سؤال
Describe the five pillars that make up today's security techniques.
سؤال
Identify three ways that organizations use internal resources for disaster recovery.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Managing Partnership-Based It Operations
1
When a business unit within an organization acts to optimize its own business objective, it could reduce the effectiveness/efficiency of another unit.
True
2
The most expensive computer crime in the past five years has been financial fraud.
False
3
IT Systems operations problems are never obvious to the entire organization.
False
4
Outsourcing all or most of a reengineered process is referred to as shared services outsourcing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
IT operations budgets contain hardware expenses only, software is budgeted with new development projects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Security authentication prevents parties from denying actions they have taken.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Problems reported by the external operational measures can be generally explained by deviations in the internal operational measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
In order to effectively manage IT operations, only internal measures such as network downtime are needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to Congleton, it is easier to recruit IT operations managers than IT project managers because of the large budgets that they manage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Managing outsourcing simplifies IT operations consisting solely of tracking project status.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Managing IT operations requires facilitation, mediation, trade-offs, and consensus within and beyond the IT department.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Disaster recovery planning is typically part of the IS operations budget.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The sole job of IT management is to participate in the organization's quest for technology-enabling business opportunities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Service level agreements are an important part of any outsourcing relationship because they specify supplier performance requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Transitional outsourcing involves long-term contracts to develop and maintain strategic systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
System response time is considered an external operational measure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Offshoring has allowed companies to rapidly expand their IT support staff by transferring routine work to the outsourcing partner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The trend towards client-based distributed computing has made IT operations management more difficult.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Lower labor costs is one of the primary reasons why companies offshore IT services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Outsourcing is strictly an IT concern and does not involve business drivers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Project-based outsourcing is also referred to as:

A) transitional outsourcing.
B) best-of-breed outsourcing.
C) collaborative outsourcing.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
The foundations of governing an outsourcing relationship are laid out in the:

A) contract.
B) relationship.
C) project specifications.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The most expensive cybercrime in the past five years was:

A) telecom fraud.
B) denial of service attacks.
C) unauthorized attacks.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
To protect against message sniffing, messages should be:

A) backed up.
B) nonrepudiated.
C) encrypted.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is an approach that hackers use to gain unauthorized access?

A) network sniffing
B) using Trojan horses
C) using viruses
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is not an external operational measure?

A) network uptime
B) average CPU capacity
C) system response time
D) All of the above are external operational measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
A fraudulent Web site masquerading as a legitimate Web site is called:

A) sniffing.
B) spoofing.
C) cracking.
D) charading.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is an internal operational measure?

A) age of applications
B) system downtime
C) program failure rate
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
An important attribute of a good SLA is:

A) cost.
B) completeness.
C) metrics.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Preventing other parties from denying actions they have taken is referred to as:

A) authentication.
B) nonrepudiation.
C) integrity stabilization.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
E-business outsourcing and IT outsourcing are combining into a new form of managed services outsourcing that is being referred to as:

A) utility computing.
B) on-demand computing.
C) virtual data centers.
D) grid computing.
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is a system operational problem?

A) slow network response time
B) Data is wrong.
C) A database is not available.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
When one company becomes the prime contractor for IS operations but utilizes other ESPs for some work this is referred to as:

A) transitional outsourcing.
B) best-of-breed outsourcing.
C) collaborative outsourcing.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Outsourcing all or most of a reengineered process is referred to as:

A) reengineering process outsourcing.
B) business process outsourcing.
C) best-of-breed outsourcing.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The drivers behind outsourcing leading organizations to restructure and emphasize their core business are:

A) value and focus
B) competitive advantage and value.
C) market conditions and focus.
D) competitive advantage and focus.
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is a reason why companies off-shore IT support?

A) to tap into cheaper labor markets
B) to take advantage of a larger labor supply
C) to take advantage of high-quality labor
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is a viable way to solve operational problems?

A) Continuously address the problem at hand and readjust priorities as a result.
B) Buy more equipment.
C) Document and measure solutions to existing problems.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is not a trend in operations management?

A) Operations are being centralized.
B) Operations are being offshored.
C) Operations are now integrated into the application delivery process.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
In the early days of outsourcing, the organizational goal of outsourcing contracts was:

A) strategic.
B) financial.
C) operational.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is a reason that companies outsource IS functions?

A) to focus on core competencies
B) to utilize lower labor costs
C) to increase value to the organization
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a firewall?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List and describe four changes in the vendor-customer relationship that often occur as an organization shifts IT management from the more traditional professional services category to outsourcing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly discuss the impact that the Internet and Y2K have had on computer operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List and describe two ways that management can effectively manage IT operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe business process outsourcing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Identify five ways that hackers use to gain unauthorized access to systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
How can the portfolio approach to IT management improve IT operations?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe the five pillars that make up today's security techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Identify three ways that organizations use internal resources for disaster recovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.