Deck 12: MIS Management Processes: Process Management, Systems Development, and Security

ملء الشاشة (f)
exit full mode
سؤال
With parallel installation, a new information system/business process is installed in phases across an organization.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
As a source of security vulnerabilities, malicious human activity includes physical accidents.
سؤال
Phishing is a social engineering technique for obtaining unauthorized data via e-mail pretexting.
سؤال
Designing system components is the first step in the SDLC process.
سؤال
With pilot installation, an organization implements a limited portion of a new business process on the entire organization.
سؤال
Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new information system.
سؤال
Pretexting is social engineering in which someone gains unauthorized access to a computer without the user's knowledge.
سؤال
Systems analysts are IS professionals who understand both business and technology.
سؤال
Managers evaluate process measures against their objectives and respond to changes in the business climate during the modeling activity of BPM.
سؤال
Tasks in the implementation activity of the SDLC process are to build and test system components and to convert users to the new system and possibly new business processes.
سؤال
With regard to people, design involves developing role job descriptions.
سؤال
Information systems security is the process of protecting information systems vulnerabilities from threats by creating appropriate safeguards.
سؤال
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
سؤال
New process modeling is not necessary if a process change involves only alterations in human resources.
سؤال
Organizational feasibility refers to whether a new information system is economically feasible for an organization.
سؤال
A test plan is an informal description of how an information system's components should be tested.
سؤال
Business analysts work primarily with systems development, but they are also involved in business processes.
سؤال
BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes.
سؤال
The term system conversion refers to the process of testing software.
سؤال
Parallel installation is also called direct installation.
سؤال
Worms are viruses that masquerade as useful programs or files.
سؤال
A firewall is a computing device that prevents unauthorized network access.
سؤال
IP spoofing is a situation in which a computer registers on a network without using an IP address.
سؤال
Sniffing is a technique for intercepting computer communications.
سؤال
A public key is used for decoding messages in asymmetric encryption.
سؤال
Worms are specifically programmed to spread, and they spread faster than other virus types.
سؤال
Hacking occurs when a person gains unauthorized access to a computer system.
سؤال
Balancing the risks and costs of a security system is the responsibility of system developers.
سؤال
A smart card has a magnetic strip.
سؤال
Adware is a program that is installed on a system after seeking the user's permission.
سؤال
Natural disasters present the largest risk for infrastructure loss.
سؤال
Establishing security policies is a security function of senior management.
سؤال
Systems use user names to authenticate users.
سؤال
Biometric authentication uses personal physical characteristics to authenticate users.
سؤال
With HTTPS, data are encrypted using a protocol called the Transmission Control Protocol.
سؤال
Two different keys are used for coding and decoding in symmetric encryption.
سؤال
Safeguards are protections against security vulnerabilities.
سؤال
Most secure communication over the Internet uses a protocol called HTTP.
سؤال
A key is a number used to encrypt data.
سؤال
Denial-of-service attacks involve the sending of anonymous e-mails to users.
سؤال
Passwords are the primary means of authentication for information systems.
سؤال
The practice of keeping a copy of an encryption key with a trusted party is referred to as key escrow.
سؤال
A firm considers a proposal for the implementation of a supply chain management system. After evaluating the proposal, the directors of the firm conclude that the system is not in line with the firm's culture and customs. This system lacks ________ feasibility.

A) economic
B) technical
C) schedule
D) organizational
سؤال
________ feasibility concerns whether the new system fits within the customs, culture, charter, or legal requirements of a firm.

A) Economical
B) Technical
C) Schedule
D) Organizational
سؤال
Account management concerns the modification of existing account permissions and the removal of unneeded accounts.
سؤال
Which of the following is the last activity in the SDLC process?

A) implement the system
B) test the system
C) create system components
D) maintain the system
سؤال
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with possible risks and losses.
سؤال
A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator.
سؤال
Hot sites are cheaper to lease than cold sites.
سؤال
Which of the following is true of systems analysts?

A) They integrate the work of programmers, testers, and users.
B) They work primarily with business processes.
C) They are active mainly during the system conversion phase of the systems development process.
D) They focus on information systems development and lack knowledge on process design.
سؤال
Switching between two passwords periodically will increase system security.
سؤال
Which of the following is a valid observation of determining the requirements of an information system?

A) Determining system requirements is the final step in the SDLC process.
B) Systems analysts interview users and record the results to determine system requirements.
C) System requirements are determined after making a basic design of the system.
D) Existing systems are typically not used as a source for determining system requirements.
سؤال
Which of the following is the first activity in the SDLC process?

A) design system components
B) determine requirements
C) define the system
D) develop technical safeguards
سؤال
During the integrated testing and conversion phase of the SDLC process, the project team will be heavy with ________.

A) business analysts
B) programmers
C) business users
D) process specialists
سؤال
A cold site is a utility company that can take over another company's processing with no forewarning.
سؤال
During the modeling activity of BPM, teams build an as-is model which ________.

A) simulates the ideal situation
B) designs new business processes
C) documents the current situation
D) models the ideal behavior of team members
سؤال
An incident response plan includes how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.
سؤال
During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate.

A) component creation
B) monitoring
C) modeling
D) process implementation
سؤال
Organizations should not use security considerations as a criterion for hiring employees.
سؤال
Which of the following is the most important activity in the systems development process?

A) defining the system
B) maintaining the system
C) designing the system's components
D) determining the system's requirements
سؤال
A malicious hacker flooded an online retailer's server with millions of bogus service requests. Due to this, the Web site's server was overloaded and the site was unable to service legitimate customer requests. This attack is an example of which of the following security threats?

A) spoofing
B) sniffing
C) phishing
D) denial-of-service
سؤال
Account administration and systems procedures are examples of ________ safeguards.

A) data
B) hardware
C) human
D) software
سؤال
Dorex Manufacturing builds an ERP system to streamline its business activities. After being tested, the company implements the system only in the procurement department. This is an example of ________ installation.

A) parallel
B) phased
C) pilot
D) plunge
سؤال
As a source of security vulnerabilities, malicious human activity includes ________.

A) poorly designed procedures
B) intentional destruction of data
C) physical accidents
D) poorly written applications
سؤال
With ________ installation, a new system/business process is installed in stages across an organization.

A) parallel
B) pilot
C) plunge
D) phased
سؤال
With ________ installation, an organization shuts off the old system/business process and starts the new one.

A) parallel
B) pilot
C) plunge
D) phased
سؤال
________ occurs when a person gains unauthorized access to a computer system.

A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
سؤال
________ refers to social engineering in which someone deceives by pretending to be someone else.

A) Pretexting
B) Spyware
C) Sniffing
D) Denial-of-service
سؤال
Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States. The company implements Oracle SCM to reduce its operational costs. Even after the implementation of the SCM system, the company does not shut down the old system and runs both the systems simultaneously. This is an example of ________ installation.

A) plunge
B) pilot
C) phased
D) parallel
سؤال
With ________ installation, a new system/business process is installed and operated alongside the old system until the new system is tested and fully operational.

A) parallel
B) pilot
C) plunge
D) phased
سؤال
The term system conversion refers to the phase in which an organization ________.

A) designs the software for a new system
B) installs a new system
C) tests a new system
D) designs the hardware of a new system
سؤال
An organization purchases SAP's ERP system. After customizing the system and training employees, the organization shuts down the old system and implements the new one across all business processes. This is an example of ________ installation.

A) parallel
B) plunge
C) pilot
D) phased
سؤال
You receive an e-mail from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details. Later, you identify that the e-mail was not sent by the company. This e-mail is an example of ________.

A) sniffing
B) spyware
C) phishing
D) denial-of-service
سؤال
An organization protects important information by using passwords. This is an example of a ________ safeguard.

A) procedural
B) data
C) software
D) hardware
سؤال
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf. This attack is an example of ________.

A) sniffing
B) spyware
C) spoofing
D) denial-of-service
سؤال
________ is a social engineering technique in which a person pretends to be a legitimate company and sends e-mails requesting confidential data.

A) Phishing
B) Spyware
C) Sniffing
D) Denial-of-service
سؤال
Which of the following is a technique for intercepting computer communications?

A) phishing
B) sniffing
C) keystroke logging
D) pretexting
سؤال
Which of the following is a disadvantage of building information systems before business processes?

A) Some aspects of business processes are unlikely to be considered when the system is constructed first.
B) System requirements cannot be collected if systems are developed before business processes.
C) Organizations will lose focus on building hardware and software if information systems are built first.
D) Organizations will lose focus on data procedures and training if information systems are developed first.
سؤال
With ________ installation, organizations implement an entire system/business process on a limited portion of the business.

A) parallel
B) phased
C) pilot
D) plunge
سؤال
A(n)________ is a formal description of a system's response to use and misuse scenarios.

A) test plan
B) as-is model
C) digital certificate
D) code injection
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/119
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: MIS Management Processes: Process Management, Systems Development, and Security
1
With parallel installation, a new information system/business process is installed in phases across an organization.
False
2
As a source of security vulnerabilities, malicious human activity includes physical accidents.
False
3
Phishing is a social engineering technique for obtaining unauthorized data via e-mail pretexting.
True
4
Designing system components is the first step in the SDLC process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
5
With pilot installation, an organization implements a limited portion of a new business process on the entire organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
6
Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
7
Pretexting is social engineering in which someone gains unauthorized access to a computer without the user's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
8
Systems analysts are IS professionals who understand both business and technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
9
Managers evaluate process measures against their objectives and respond to changes in the business climate during the modeling activity of BPM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
10
Tasks in the implementation activity of the SDLC process are to build and test system components and to convert users to the new system and possibly new business processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
11
With regard to people, design involves developing role job descriptions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
12
Information systems security is the process of protecting information systems vulnerabilities from threats by creating appropriate safeguards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
13
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
14
New process modeling is not necessary if a process change involves only alterations in human resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
15
Organizational feasibility refers to whether a new information system is economically feasible for an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
16
A test plan is an informal description of how an information system's components should be tested.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
17
Business analysts work primarily with systems development, but they are also involved in business processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
18
BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
19
The term system conversion refers to the process of testing software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
20
Parallel installation is also called direct installation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
21
Worms are viruses that masquerade as useful programs or files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
22
A firewall is a computing device that prevents unauthorized network access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
23
IP spoofing is a situation in which a computer registers on a network without using an IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
24
Sniffing is a technique for intercepting computer communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
25
A public key is used for decoding messages in asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
26
Worms are specifically programmed to spread, and they spread faster than other virus types.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
27
Hacking occurs when a person gains unauthorized access to a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
28
Balancing the risks and costs of a security system is the responsibility of system developers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
29
A smart card has a magnetic strip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
30
Adware is a program that is installed on a system after seeking the user's permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
31
Natural disasters present the largest risk for infrastructure loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
32
Establishing security policies is a security function of senior management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
33
Systems use user names to authenticate users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
34
Biometric authentication uses personal physical characteristics to authenticate users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
35
With HTTPS, data are encrypted using a protocol called the Transmission Control Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
36
Two different keys are used for coding and decoding in symmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
37
Safeguards are protections against security vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
38
Most secure communication over the Internet uses a protocol called HTTP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
39
A key is a number used to encrypt data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
40
Denial-of-service attacks involve the sending of anonymous e-mails to users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
41
Passwords are the primary means of authentication for information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
42
The practice of keeping a copy of an encryption key with a trusted party is referred to as key escrow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
43
A firm considers a proposal for the implementation of a supply chain management system. After evaluating the proposal, the directors of the firm conclude that the system is not in line with the firm's culture and customs. This system lacks ________ feasibility.

A) economic
B) technical
C) schedule
D) organizational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ feasibility concerns whether the new system fits within the customs, culture, charter, or legal requirements of a firm.

A) Economical
B) Technical
C) Schedule
D) Organizational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
45
Account management concerns the modification of existing account permissions and the removal of unneeded accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is the last activity in the SDLC process?

A) implement the system
B) test the system
C) create system components
D) maintain the system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
47
Documenting position sensitivity enables security personnel to prioritize their activities in accordance with possible risks and losses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
48
A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
49
Hot sites are cheaper to lease than cold sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is true of systems analysts?

A) They integrate the work of programmers, testers, and users.
B) They work primarily with business processes.
C) They are active mainly during the system conversion phase of the systems development process.
D) They focus on information systems development and lack knowledge on process design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
51
Switching between two passwords periodically will increase system security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following is a valid observation of determining the requirements of an information system?

A) Determining system requirements is the final step in the SDLC process.
B) Systems analysts interview users and record the results to determine system requirements.
C) System requirements are determined after making a basic design of the system.
D) Existing systems are typically not used as a source for determining system requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is the first activity in the SDLC process?

A) design system components
B) determine requirements
C) define the system
D) develop technical safeguards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
54
During the integrated testing and conversion phase of the SDLC process, the project team will be heavy with ________.

A) business analysts
B) programmers
C) business users
D) process specialists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
55
A cold site is a utility company that can take over another company's processing with no forewarning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
56
During the modeling activity of BPM, teams build an as-is model which ________.

A) simulates the ideal situation
B) designs new business processes
C) documents the current situation
D) models the ideal behavior of team members
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
57
An incident response plan includes how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
58
During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate.

A) component creation
B) monitoring
C) modeling
D) process implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
59
Organizations should not use security considerations as a criterion for hiring employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is the most important activity in the systems development process?

A) defining the system
B) maintaining the system
C) designing the system's components
D) determining the system's requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
61
A malicious hacker flooded an online retailer's server with millions of bogus service requests. Due to this, the Web site's server was overloaded and the site was unable to service legitimate customer requests. This attack is an example of which of the following security threats?

A) spoofing
B) sniffing
C) phishing
D) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
62
Account administration and systems procedures are examples of ________ safeguards.

A) data
B) hardware
C) human
D) software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
63
Dorex Manufacturing builds an ERP system to streamline its business activities. After being tested, the company implements the system only in the procurement department. This is an example of ________ installation.

A) parallel
B) phased
C) pilot
D) plunge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
64
As a source of security vulnerabilities, malicious human activity includes ________.

A) poorly designed procedures
B) intentional destruction of data
C) physical accidents
D) poorly written applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
65
With ________ installation, a new system/business process is installed in stages across an organization.

A) parallel
B) pilot
C) plunge
D) phased
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
66
With ________ installation, an organization shuts off the old system/business process and starts the new one.

A) parallel
B) pilot
C) plunge
D) phased
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
67
________ occurs when a person gains unauthorized access to a computer system.

A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
68
________ refers to social engineering in which someone deceives by pretending to be someone else.

A) Pretexting
B) Spyware
C) Sniffing
D) Denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
69
Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States. The company implements Oracle SCM to reduce its operational costs. Even after the implementation of the SCM system, the company does not shut down the old system and runs both the systems simultaneously. This is an example of ________ installation.

A) plunge
B) pilot
C) phased
D) parallel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
70
With ________ installation, a new system/business process is installed and operated alongside the old system until the new system is tested and fully operational.

A) parallel
B) pilot
C) plunge
D) phased
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
71
The term system conversion refers to the phase in which an organization ________.

A) designs the software for a new system
B) installs a new system
C) tests a new system
D) designs the hardware of a new system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
72
An organization purchases SAP's ERP system. After customizing the system and training employees, the organization shuts down the old system and implements the new one across all business processes. This is an example of ________ installation.

A) parallel
B) plunge
C) pilot
D) phased
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
73
You receive an e-mail from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details. Later, you identify that the e-mail was not sent by the company. This e-mail is an example of ________.

A) sniffing
B) spyware
C) phishing
D) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
74
An organization protects important information by using passwords. This is an example of a ________ safeguard.

A) procedural
B) data
C) software
D) hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
75
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf. This attack is an example of ________.

A) sniffing
B) spyware
C) spoofing
D) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
76
________ is a social engineering technique in which a person pretends to be a legitimate company and sends e-mails requesting confidential data.

A) Phishing
B) Spyware
C) Sniffing
D) Denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is a technique for intercepting computer communications?

A) phishing
B) sniffing
C) keystroke logging
D) pretexting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is a disadvantage of building information systems before business processes?

A) Some aspects of business processes are unlikely to be considered when the system is constructed first.
B) System requirements cannot be collected if systems are developed before business processes.
C) Organizations will lose focus on building hardware and software if information systems are built first.
D) Organizations will lose focus on data procedures and training if information systems are developed first.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
79
With ________ installation, organizations implement an entire system/business process on a limited portion of the business.

A) parallel
B) phased
C) pilot
D) plunge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
80
A(n)________ is a formal description of a system's response to use and misuse scenarios.

A) test plan
B) as-is model
C) digital certificate
D) code injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.