Deck 7: Enterprise Architecture and Security

ملء الشاشة (f)
exit full mode
سؤال
Fault tolerance is an exact copy of a system's information.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Portability determines future environmental infrastructure requirements to ensure high-quality system performance.
سؤال
Cloud computing often uses grid computing,though grid computing does not necessarily use a cloud.
سؤال
Maintainability means the system can quickly transform to support environmental changes.
سؤال
Who is a person who is grounded in technology,fluent in business,and able to provide the important bridge between IT and the business?

A)IT infrastructure manager
B)IT specialist
C)Enterprise architect
D)Enterprise manager
سؤال
A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
سؤال
Sustainable IT disposal refers to the safe disposal of IT assets at the end of their life cycle,ensuring e-waste does not end up in landfill causing environmental issues.
سؤال
e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.
سؤال
The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.
سؤال
Dynamic scaling means the enterprise architecture can be automatically scaled up or down based on needed requirements.
سؤال
Usability means the system functions correctly and provides accurate information.
سؤال
Enterprise architecture is a communications system created by linking two or more devices and establishing a standard methodology for communication.
سؤال
Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.
سؤال
Gordon Moore,co-founder of Intel,observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years.
سؤال
Performance measures how quickly a system performs a process or transaction.
سؤال
A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
سؤال
Sustainable or 'green' IT describes the production,management,use and disposal of technology in a way that maximises damage to the environment.
سؤال
The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.
سؤال
Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.
سؤال
High availability occurs when a system is continuously operational at all times.
سؤال
What has the ability to recover information or systems in the event of catastrophic disasters?

A)Recovery
B)Disaster recovery
C)Backup
D)Failback
سؤال
Which of the following agile enterprise architecture infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

A)Maintainability
B)Scalability
C)Capacity planning
D)Portability
سؤال
What does a business continuity plan (BCP) typically include?

A)How frequently the system backup is performed
B)Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
C)How quickly the system recovery needs to be performed
D)Where a hot site is located
سؤال
Sean works at the local electrical company in Brisbane,which provides electricity to the entire city.This area is prone to floods.As the lead enterprise architect on the night shift,he has been asked to suggest ways the company can protect its IT infrastructure.Sean notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of service to Brisbane residents.What should he recommend his company implement?

A)Accessibility
B)Moore's law
C)Antivirus software
D)Fault tolerance
سؤال
When building a scalable system that can support new company developments,what are the key factors to consider?

A)Anticipating expected and unexpected growth
B)Organising and deploying additional resources
C)Understanding competitor products and services
D)Analysing the accessibility and availability of competitor systems
سؤال
Each year businesses lose time and money because of system crashes and failures.Which of the following offers the best way to protect a system from crashes and failures?

A)Backup and recovery plans
B)Fault tolerance
C)Failover
D)All the answers are correct
سؤال
What are the seven characteristics of an agile infrastructure architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability and usability
B)Accessibility, affordability, mobility, portability, reliability, scalability and usability
C)Accessibility, availability, mobility, penetrability, responsibility, sensibility and usability
D)Accessibility, affordability, functionality, changeability, constancy, sources and understanding
سؤال
What is usability?

A)The system is easy to learn and efficient and satisfying to use
B)The system functions correctly and provides accurate information
C)The system allows varying levels of access
D)The system quickly transforms to support environmental changes
سؤال
What determines future environmental infrastructure requirements that ensure high-quality system performance?

A)Capacity system
B)Capacity planning
C)Capacity function
D)Performance indicators
سؤال
Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.

A)agile
B)sustainable
C)information
D)virtualised
سؤال
Enterprise architecture is __________ and ___________.

A)dynamic, static
B)dynamic, continually changing
C)a client, a server
D)hardware, software
سؤال
Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?

A)Flexibility
B)Scalability
C)Reliability
D)Affordability
سؤال
Which of the following describes the difference between a backup plan and a recovery plan?

A)Recovery is an exact copy of a system's information, where backup is the ability to get a system up and running in the event of a system crash or failure
B)Backup is mandatory, where recovery is optional
C)Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure
D)Recovery is mandatory, where backup is optional
سؤال
Which characteristics support a sustainable enterprise architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup and recovery plan, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing and virtualisation
D)All the answers are correct
سؤال
Which of the following is a benefit of a solid enterprise architecture?

A)Reduces costs
B)Improves productivity
C)Optimises business operations
D)All the answers are correct
سؤال
What occurs when the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime?

A)Failover
B)Disaster recovery cost curve
C)Reliability
D)Maintainability
سؤال
What does reliability ensure?

A)The system has the ability to operate in many different operating systems
B)The system is easy to learn and efficient and satisfying to use
C)The system is functioning correctly and providing accurate information
D)The time frames when the system is operational
سؤال
Which characteristics of well-designed information architecture support business operations?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup,recovery, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing, and virtualisation
D)All the answers are correct
سؤال
What is the primary reason a company has a failover system?

A)To use different systems continuously at the same time
B)To allow employees to work virtually
C)To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations
D)All the answers are correct
سؤال
What are the three business functions that enterprise architecture supports?

A)Supports operations, change and sustainability (the environment)
B)Supports operations, customers and e-waste
C)Supports operations, clients and servers
D)Supports information, change and business continuity planning
سؤال
What are the ramifications of improper electronic recycling,when analysing the example of a single desktop computer?

A)One computer contains more than 700 chemicals that can be toxic to the environment
B)Computers in landfills can leak these toxic chemicals into our land, water and air
C)Computers contain high levels of mercury, lead and cadmium, all harmful toxins
D)All the answers are correct
سؤال
Cloud computing allows users to connect via a web browser and stores all of their software documents 'in the cloud',which means there is no more need for users to have ___________.

A)hard drives
B)physical servers
C)software or processing power
D)All the answers are correct
سؤال
Grid computing takes advantage of the available 75 per cent of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks.

A)personal computer
B)employee client
C)company server
D)virtual supercomputer
سؤال
Organisations address security risks through two lines of defence,namely:

A)technology and controls.
B)people and controls.
C)controls and detection technology.
D)people and technology.
سؤال
What is changed by cloud computing services?

A)The way people access information
B)The way people deliver information
C)The way people use information
D)All the answers are correct
سؤال
Which of the following sustainable enterprise architecture components is a collection of computers,often geographically dispersed,that are coordinated to solve a common problem?

A)Cloud computing
B)Grid computing
C)Virtualised computing
D)Database computing
سؤال
What do information security policies identify?

A)Imminent threats to the organisation
B)The best information security options
C)Rules required to maintain information security
D)All the answers are correct
سؤال
As soon as an organisation has protected its intellectual capital by arming its people with a detailed information security plan,it can begin to focus on deploying ________ to help combat attack.
سؤال
With grid computing,a problem is broken into pieces and distributed to many machines,allowing _________ processing than could occur with a single system.

A)moderate
B)slower
C)faster
D)cleaner
سؤال
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A)Grid computing
B)Smart phones
C)Utility computing
D)Computing services
سؤال
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called what?

A)Clones
B)Insiders
C)Sleepers
D)Hacktivists
سؤال
What service delivers hardware networking capabilities,including the use of servers,networking and storage over the cloud using a pay-per-use revenue model?

A)Infrastructure as a Service (IaaS)
B)Dynamic scaling
C)Software as a Service (SaaS)
D)Platform as a Service (PaaS)
سؤال
Which of the following is an example of sustainable enterprise architecture?

A)Cloud computing cluster
B)Cluster computing
C)Grid computing
D)All of the above are examples of sustainable enterprise architecture
سؤال
What type of software searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm?

A)Firewall software
B)Intrusion-detection software
C)Protection software
D)Pattern-recognition software
سؤال
What does the second step for creating an information security plan entail?

A)Identifying critical information assets and risks
B)Testing and re-evaluating risks
C)Obtaining stakeholder support
D)Communicating the information security policies
سؤال
Which of the below is not contributing to e-waste?

A)VCR
B)Automobile
C)Microwave
D)Computer
سؤال
Through ________,hackers use their social skills to trick people into revealing access credentials or other valuable information.
سؤال
What might change the way businesses operate,as well as the way people interact with technology?

A)Agile computing
B)Grid computing
C)Cloud computing
D)Smart grid computing
سؤال
The increased demand in technology devices has caused an increase in discarded devices,a phenomenon known as _______.

A)e-Waste
B)Grid computing
C)Ergonomic code
D)Electronic sustainability
سؤال
What is the safe disposal of IT assets at the end of their life cycle called?

A)Sustainable IT disposal
B)Sustainable device disposal
C)Sustainable software disposal
D)Sustainable enterprise disposal
سؤال
________programs collect specific data about the user,ranging from general demographics such as name,address and browsing habits to credit card numbers,user names and passwords.
سؤال
A ________ hides inside other software,usually as an attachment or a downloadable file.It often masquerades as a benign or legitimate application but in fact does something completely different.
سؤال
Adequate security involves ________,________ and________,as well as technology.
سؤال
________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
سؤال
________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.
سؤال
Identify the three primary areas associated with an information architecture.
سؤال
Describe the characteristics of an agile enterprise architecture.
سؤال
________ is a method of confirming users' identities.
سؤال
Explain enterprise architecture and its three primary types.
سؤال
Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.
سؤال
Explain the three components of a sustainable enterprise architecture,along with their business benefits.
سؤال
How do authentication and authorisation differ?
سؤال
__________ are one of the most ineffective ways of determining authentication.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/73
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Enterprise Architecture and Security
1
Fault tolerance is an exact copy of a system's information.
False
2
Portability determines future environmental infrastructure requirements to ensure high-quality system performance.
False
3
Cloud computing often uses grid computing,though grid computing does not necessarily use a cloud.
True
4
Maintainability means the system can quickly transform to support environmental changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
5
Who is a person who is grounded in technology,fluent in business,and able to provide the important bridge between IT and the business?

A)IT infrastructure manager
B)IT specialist
C)Enterprise architect
D)Enterprise manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
6
A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
7
Sustainable IT disposal refers to the safe disposal of IT assets at the end of their life cycle,ensuring e-waste does not end up in landfill causing environmental issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
8
e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
9
The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
10
Dynamic scaling means the enterprise architecture can be automatically scaled up or down based on needed requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
11
Usability means the system functions correctly and provides accurate information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
12
Enterprise architecture is a communications system created by linking two or more devices and establishing a standard methodology for communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
13
Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
14
Gordon Moore,co-founder of Intel,observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
15
Performance measures how quickly a system performs a process or transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
16
A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
17
Sustainable or 'green' IT describes the production,management,use and disposal of technology in a way that maximises damage to the environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
19
Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
20
High availability occurs when a system is continuously operational at all times.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
21
What has the ability to recover information or systems in the event of catastrophic disasters?

A)Recovery
B)Disaster recovery
C)Backup
D)Failback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following agile enterprise architecture infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

A)Maintainability
B)Scalability
C)Capacity planning
D)Portability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
23
What does a business continuity plan (BCP) typically include?

A)How frequently the system backup is performed
B)Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
C)How quickly the system recovery needs to be performed
D)Where a hot site is located
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
24
Sean works at the local electrical company in Brisbane,which provides electricity to the entire city.This area is prone to floods.As the lead enterprise architect on the night shift,he has been asked to suggest ways the company can protect its IT infrastructure.Sean notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of service to Brisbane residents.What should he recommend his company implement?

A)Accessibility
B)Moore's law
C)Antivirus software
D)Fault tolerance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
25
When building a scalable system that can support new company developments,what are the key factors to consider?

A)Anticipating expected and unexpected growth
B)Organising and deploying additional resources
C)Understanding competitor products and services
D)Analysing the accessibility and availability of competitor systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
26
Each year businesses lose time and money because of system crashes and failures.Which of the following offers the best way to protect a system from crashes and failures?

A)Backup and recovery plans
B)Fault tolerance
C)Failover
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the seven characteristics of an agile infrastructure architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability and usability
B)Accessibility, affordability, mobility, portability, reliability, scalability and usability
C)Accessibility, availability, mobility, penetrability, responsibility, sensibility and usability
D)Accessibility, affordability, functionality, changeability, constancy, sources and understanding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is usability?

A)The system is easy to learn and efficient and satisfying to use
B)The system functions correctly and provides accurate information
C)The system allows varying levels of access
D)The system quickly transforms to support environmental changes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
29
What determines future environmental infrastructure requirements that ensure high-quality system performance?

A)Capacity system
B)Capacity planning
C)Capacity function
D)Performance indicators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
30
Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.

A)agile
B)sustainable
C)information
D)virtualised
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
31
Enterprise architecture is __________ and ___________.

A)dynamic, static
B)dynamic, continually changing
C)a client, a server
D)hardware, software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?

A)Flexibility
B)Scalability
C)Reliability
D)Affordability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following describes the difference between a backup plan and a recovery plan?

A)Recovery is an exact copy of a system's information, where backup is the ability to get a system up and running in the event of a system crash or failure
B)Backup is mandatory, where recovery is optional
C)Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure
D)Recovery is mandatory, where backup is optional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which characteristics support a sustainable enterprise architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup and recovery plan, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing and virtualisation
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is a benefit of a solid enterprise architecture?

A)Reduces costs
B)Improves productivity
C)Optimises business operations
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
36
What occurs when the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime?

A)Failover
B)Disaster recovery cost curve
C)Reliability
D)Maintainability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
37
What does reliability ensure?

A)The system has the ability to operate in many different operating systems
B)The system is easy to learn and efficient and satisfying to use
C)The system is functioning correctly and providing accurate information
D)The time frames when the system is operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which characteristics of well-designed information architecture support business operations?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup,recovery, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing, and virtualisation
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the primary reason a company has a failover system?

A)To use different systems continuously at the same time
B)To allow employees to work virtually
C)To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the three business functions that enterprise architecture supports?

A)Supports operations, change and sustainability (the environment)
B)Supports operations, customers and e-waste
C)Supports operations, clients and servers
D)Supports information, change and business continuity planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the ramifications of improper electronic recycling,when analysing the example of a single desktop computer?

A)One computer contains more than 700 chemicals that can be toxic to the environment
B)Computers in landfills can leak these toxic chemicals into our land, water and air
C)Computers contain high levels of mercury, lead and cadmium, all harmful toxins
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
42
Cloud computing allows users to connect via a web browser and stores all of their software documents 'in the cloud',which means there is no more need for users to have ___________.

A)hard drives
B)physical servers
C)software or processing power
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
43
Grid computing takes advantage of the available 75 per cent of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks.

A)personal computer
B)employee client
C)company server
D)virtual supercomputer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
44
Organisations address security risks through two lines of defence,namely:

A)technology and controls.
B)people and controls.
C)controls and detection technology.
D)people and technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is changed by cloud computing services?

A)The way people access information
B)The way people deliver information
C)The way people use information
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following sustainable enterprise architecture components is a collection of computers,often geographically dispersed,that are coordinated to solve a common problem?

A)Cloud computing
B)Grid computing
C)Virtualised computing
D)Database computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
47
What do information security policies identify?

A)Imminent threats to the organisation
B)The best information security options
C)Rules required to maintain information security
D)All the answers are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
48
As soon as an organisation has protected its intellectual capital by arming its people with a detailed information security plan,it can begin to focus on deploying ________ to help combat attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
49
With grid computing,a problem is broken into pieces and distributed to many machines,allowing _________ processing than could occur with a single system.

A)moderate
B)slower
C)faster
D)cleaner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
50
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A)Grid computing
B)Smart phones
C)Utility computing
D)Computing services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
51
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called what?

A)Clones
B)Insiders
C)Sleepers
D)Hacktivists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
52
What service delivers hardware networking capabilities,including the use of servers,networking and storage over the cloud using a pay-per-use revenue model?

A)Infrastructure as a Service (IaaS)
B)Dynamic scaling
C)Software as a Service (SaaS)
D)Platform as a Service (PaaS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is an example of sustainable enterprise architecture?

A)Cloud computing cluster
B)Cluster computing
C)Grid computing
D)All of the above are examples of sustainable enterprise architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
54
What type of software searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm?

A)Firewall software
B)Intrusion-detection software
C)Protection software
D)Pattern-recognition software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
55
What does the second step for creating an information security plan entail?

A)Identifying critical information assets and risks
B)Testing and re-evaluating risks
C)Obtaining stakeholder support
D)Communicating the information security policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the below is not contributing to e-waste?

A)VCR
B)Automobile
C)Microwave
D)Computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
57
Through ________,hackers use their social skills to trick people into revealing access credentials or other valuable information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
58
What might change the way businesses operate,as well as the way people interact with technology?

A)Agile computing
B)Grid computing
C)Cloud computing
D)Smart grid computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
59
The increased demand in technology devices has caused an increase in discarded devices,a phenomenon known as _______.

A)e-Waste
B)Grid computing
C)Ergonomic code
D)Electronic sustainability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
60
What is the safe disposal of IT assets at the end of their life cycle called?

A)Sustainable IT disposal
B)Sustainable device disposal
C)Sustainable software disposal
D)Sustainable enterprise disposal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
61
________programs collect specific data about the user,ranging from general demographics such as name,address and browsing habits to credit card numbers,user names and passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
62
A ________ hides inside other software,usually as an attachment or a downloadable file.It often masquerades as a benign or legitimate application but in fact does something completely different.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
63
Adequate security involves ________,________ and________,as well as technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
64
________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
65
________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
66
Identify the three primary areas associated with an information architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
67
Describe the characteristics of an agile enterprise architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
68
________ is a method of confirming users' identities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
69
Explain enterprise architecture and its three primary types.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
70
Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
71
Explain the three components of a sustainable enterprise architecture,along with their business benefits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
72
How do authentication and authorisation differ?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
73
__________ are one of the most ineffective ways of determining authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 73 في هذه المجموعة.