Deck 12: Mis Management Processes: Process Management, systems Development, and Security

Full screen (f)
exit full mode
Question
Parallel installation is also called direct installation.
Use Space or
up arrow
down arrow
to flip the card.
Question
Business analysts work primarily with systems development,but they are also involved in business processes to a small extent.
Question
BPM is a cyclical process for systematically monitoring,modeling,creating,and implementing business processes.
Question
With regard to people,the design stage in SDLC involves developing job descriptions.
Question
Impractical information systems projects are eliminated after assessing its feasibility with an organization's objectives.
Question
A vulnerability is some measure that individuals or organizations take to block the threat from obtaining the asset.
Question
When a pilot implementation fails,the failure is contained within a boundary.
Question
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
Question
The term system conversion refers to the process of testing software.
Question
Tasks in the implementation activity of the SDLC process involve building and testing system components and converting users to the new system and possibly new business processes.
Question
Both Scrum and SDLC are processes that create and update existing information systems.
Question
Poorly written application programs and procedures are sources of security threats.
Question
A business process may use one or more information systems,but an information system may be used by only one business process.
Question
Agile development methodologies support just-in-time design.
Question
Systems analysts are IS professionals who understand both business and technology.
Question
Information systems security is the process of preventing unauthorized access to an IS or modification of its data.
Question
Using HTTP rather than HTTPS will provide an effective safeguard against security threats.
Question
The effectiveness objective of an organization determines how well a process uses its resources.
Question
The nature of the SDLC process accepts that systems requirements are always changing.
Question
In the BPM activity of creating process components,the team designs changes to the business process at a depth sufficient for implementation.
Question
Most secure communication over the Internet uses a protocol called HTTP.
Question
One technique to safeguard against cross site scripting is to design Web sites to accept only text-based replies.
Question
Secure Socket Layer uses a combination of public key/private key and symmetric encryption.
Question
Unlike ATM cards,a smart card has a magnetic strip.
Question
A public key is used for decoding messages in public key/private key asymmetric encryption used over the Internet.
Question
Account management concerns the modification of existing account permissions and the removal of unneeded accounts.
Question
Natural disasters present the largest risk for infrastructure loss.
Question
Hackers use Big Data software to acquire data to find out passwords and other sensitive data.
Question
Firewalls can block traffic from particular sites known for malicious content to any user behind it.
Question
Symmetric encryption is simpler and much more faster than asymmetric encryption.
Question
When organizations store databases in the cloud,all safeguard measures should be exclusive of the cloud service contract.
Question
Balancing the risks and costs of a security system is the responsibility of system developers.
Question
Cookies are small files that browsers store on a computer when a user visits a Web site.
Question
An important function of the senior management is to eliminate risks,as risks cannot be managed.
Question
Individuals holding multiple accounts should have different passwords for each account to safeguard against security threats.
Question
Systems use user names to authenticate users.
Question
IP spoofing is a situation in which a computer registers on a network without using an IP address.
Question
A key is a physical device that is used to lock and unlock a message.
Question
Drive-by sniffers often target protected wireless networks to monitor and intercept the wireless traffic at will.
Question
Organizations should avoid using security considerations as a criterion while hiring employees.
Question
Once the goals and scope of a new information system is defined,the next immediate task is to ________.

A) plan the project
B) create procedures
C) form a project team
D) assess its feasibility
Question
Dorex Manufacturing builds an ERP system to streamline its business activities.After being tested,the company implements the system only in the procurement department.This is an example of ________ installation.

A) parallel
B) phased
C) pilot
D) plunge
Question
Which of the following is the most important activity in the systems development process?

A) defining the system
B) maintaining the system
C) designing the system's components
D) determining the system's requirements
Question
A(n)________ is a formal description of a system's response to use and misuse scenarios.

A) test plan
B) as-is model
C) digital certificate
D) code injection
Question
With ________ installation,an organization shuts off the old system/business process and starts the new one.

A) parallel
B) pilot
C) plunge
D) phased
Question
Which of the following is the first activity in the SDLC process?

A) designing system components
B) determining requirements
C) defining the system
D) developing technical safeguards
Question
During the modeling activity of BPM,teams build an as-is model which ________.

A) simulates the ideal situation
B) designs new business processes
C) documents the current situation
D) models the ideal behavior of team members
Question
The term system conversion refers to the phase in which an organization ________.

A) designs the software for a new system
B) installs a new system
C) tests a new system
D) designs the hardware of a new system
Question
Passwords are the primary means of authentication for information systems.
Question
Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States.The company implements SCM to reduce its operational costs.Even after the implementation of the SCM system,the company does not shut down the old system and runs both the systems simultaneously.This is an example of ________ installation.

A) plunge
B) pilot
C) phased
D) parallel
Question
Why is it essential to assess the feasibility of a new information system?

A) to restrict projects that are not too challenging
B) to determine the most suitable vendor for a project
C) to begin the systems development process
D) to avoid paying more for a project that is worth less
Question
During the ________ activity of BPM,managers evaluate process measures against their objectives and respond to changes in the business climate.

A) component creation
B) monitoring
C) modeling
D) process implementation
Question
With ________ installation,a new system/business process is installed in stages across an organization.

A) parallel
B) pilot
C) plunge
D) phased
Question
Which of the following is the last activity in the SDLC process?

A) implementing the system
B) testing the system
C) creating system components
D) maintaining the system
Question
With ________ installation,a new system/business process is installed and operated alongside the old system until the new system is tested and fully operational.

A) parallel
B) pilot
C) plunge
D) phased
Question
With ________ installation,organizations implement an entire system/business process on a limited portion of the business.

A) parallel
B) phased
C) pilot
D) plunge
Question
In a typical project team,________ integrate the work of the programmers,testers,and users.

A) business analysts
B) communication specialists
C) systems analysts
D) database designers
Question
Maintaining the same password for a long duration will increase system security.
Question
An organization purchases SAP's ERP system.After customizing the system and training employees,the organization shuts down the old system and implements the new one across all business processes.This is an example of ________ installation.

A) parallel
B) plunge
C) pilot
D) phased
Question
An incident response plan includes how employees are to respond to security problems,whom they should contact,and the steps they can take to reduce further loss.
Question
A malicious hacker flooded an online retailer's server with millions of bogus transactions.Due to this,the Web site's server was overloaded and the site was unable to process legitimate customer orders.Which of the following is being illustrated in this scenario?

A) spoofing
B) sniffing
C) phishing
D) denial-of-service
Question
Browsing through an online blog,Ronnie clicks on one of the blogger's links and is logged out of his system.He loses access to his system due to a malicious code that was downloaded from the link.This is a clear case of ________.

A) cross site scripting
B) phishing
C) spamming
D) denial of service
Question
Which of the following is a valid difference between a password and user name?

A) A password is used to encode information, whereas a user name is used to decode information.
B) Unlike a password, a user name is more complex.
C) A user name identifies the user, whereas a password authenticates the user.
D) A user name is common among users, whereas a password is unique.
Question
________ occurs when a person breaks into computers,servers,or networks to steal data.

A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
Question
Which of the following statements is true about biometric authentication?

A) It uses personal physical characteristics for authentication.
B) It is less invasive than other methods of authentication.
C) It uses a microchip loaded with identifying data to authenticate users.
D) It provides weak authentication compared to other methods.
Question
How do agile techniques overcome the problems of the SDLC?

A) Agile techniques anticipate requirement changes.
B) Agile techniques deliver products at the very end of the process.
C) Agile techniques generate value at the very end.
D) Agile techniques design the overall system in the start of the process.
Question
You receive an email from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details.Later,you identify that the email was not sent by the company.This scenario exemplifies ________.

A) sniffing
B) keylogging
C) phishing
D) denial of service
Question
Which of the following is a technique for intercepting computer communications?

A) phishing
B) sniffing
C) keystroke logging
D) pretexting
Question
________ is a social engineering technique in which a person pretends to be a legitimate company and sends emails requesting confidential data.

A) Phishing
B) Keylogging
C) Sniffing
D) Denial of service
Question
How can individuals safeguard their data from being misused?

A) by storing passwords in personal mails
B) by using the same password for all email accounts
C) by removing temporary Internet files
D) by enabling Web sites to store cookies
Question
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

A) Code injection
B) Pretexting
C) Encryption
D) Authentication
Question
Which of the following is a senior management's function to safeguard against security threats to an organization?

A) removing cookies
B) backing up data
C) creating passwords
D) managing risks
Question
________ refers to a social engineering attack in which someone deceives by pretending to be someone else.

A) Pretexting
B) Keylogging
C) Sniffing
D) Denial of service
Question
In the context of the sources of threats,computer crime involves ________.

A) poorly designed procedures
B) intentional destruction of data
C) natural events and disasters
D) poorly written applications
Question
How is scrum distinguished from SDLC ?

A) Scrum resists changes, whereas SDLC accepts changes.
B) Scrum is a dynamic process, whereas SDLC is structured.
C) Scrum creates value at the end, whereas SDLC creates it early.
D) Scrum is a waterfall model, whereas SDLC supports iterations.
Question
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf.This attack is an example of ________.

A) sniffing
B) keylogging
C) spoofing
D) denial of service
Question
A number used to encrypt data is called a(n)________.

A) signature
B) key
C) cookie
D) escrow
Question
In the case of ________,the same key is used to encode and to decode a message.

A) asymmetric encryption
B) digital signatures
C) symmetric encryption
D) digital certificates
Question
Which of the following is characteristic of a strong password?

A) It should not contain any word in any language.
B) It should not have special characters.
C) It should not be long or complex to remember.
D) It should not be different across varied accounts.
Question
Which of the following is a principle of agile development methodologies?

A) It designs the overall system at the very beginning.
B) It generates value at the very end of the development process.
C) It assumes that project requirements do not change.
D) It frequently delivers a working version of the product.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/112
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Mis Management Processes: Process Management, systems Development, and Security
1
Parallel installation is also called direct installation.
False
2
Business analysts work primarily with systems development,but they are also involved in business processes to a small extent.
False
3
BPM is a cyclical process for systematically monitoring,modeling,creating,and implementing business processes.
True
4
With regard to people,the design stage in SDLC involves developing job descriptions.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
5
Impractical information systems projects are eliminated after assessing its feasibility with an organization's objectives.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
6
A vulnerability is some measure that individuals or organizations take to block the threat from obtaining the asset.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
7
When a pilot implementation fails,the failure is contained within a boundary.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
8
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
9
The term system conversion refers to the process of testing software.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
10
Tasks in the implementation activity of the SDLC process involve building and testing system components and converting users to the new system and possibly new business processes.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
11
Both Scrum and SDLC are processes that create and update existing information systems.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
12
Poorly written application programs and procedures are sources of security threats.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
13
A business process may use one or more information systems,but an information system may be used by only one business process.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
14
Agile development methodologies support just-in-time design.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
15
Systems analysts are IS professionals who understand both business and technology.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
16
Information systems security is the process of preventing unauthorized access to an IS or modification of its data.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
17
Using HTTP rather than HTTPS will provide an effective safeguard against security threats.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
18
The effectiveness objective of an organization determines how well a process uses its resources.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
19
The nature of the SDLC process accepts that systems requirements are always changing.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
20
In the BPM activity of creating process components,the team designs changes to the business process at a depth sufficient for implementation.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
21
Most secure communication over the Internet uses a protocol called HTTP.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
22
One technique to safeguard against cross site scripting is to design Web sites to accept only text-based replies.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
23
Secure Socket Layer uses a combination of public key/private key and symmetric encryption.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
24
Unlike ATM cards,a smart card has a magnetic strip.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
25
A public key is used for decoding messages in public key/private key asymmetric encryption used over the Internet.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
26
Account management concerns the modification of existing account permissions and the removal of unneeded accounts.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
27
Natural disasters present the largest risk for infrastructure loss.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
28
Hackers use Big Data software to acquire data to find out passwords and other sensitive data.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
29
Firewalls can block traffic from particular sites known for malicious content to any user behind it.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
30
Symmetric encryption is simpler and much more faster than asymmetric encryption.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
31
When organizations store databases in the cloud,all safeguard measures should be exclusive of the cloud service contract.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
32
Balancing the risks and costs of a security system is the responsibility of system developers.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
33
Cookies are small files that browsers store on a computer when a user visits a Web site.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
34
An important function of the senior management is to eliminate risks,as risks cannot be managed.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
35
Individuals holding multiple accounts should have different passwords for each account to safeguard against security threats.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
36
Systems use user names to authenticate users.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
37
IP spoofing is a situation in which a computer registers on a network without using an IP address.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
38
A key is a physical device that is used to lock and unlock a message.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
39
Drive-by sniffers often target protected wireless networks to monitor and intercept the wireless traffic at will.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
40
Organizations should avoid using security considerations as a criterion while hiring employees.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
41
Once the goals and scope of a new information system is defined,the next immediate task is to ________.

A) plan the project
B) create procedures
C) form a project team
D) assess its feasibility
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
42
Dorex Manufacturing builds an ERP system to streamline its business activities.After being tested,the company implements the system only in the procurement department.This is an example of ________ installation.

A) parallel
B) phased
C) pilot
D) plunge
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is the most important activity in the systems development process?

A) defining the system
B) maintaining the system
C) designing the system's components
D) determining the system's requirements
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
44
A(n)________ is a formal description of a system's response to use and misuse scenarios.

A) test plan
B) as-is model
C) digital certificate
D) code injection
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
45
With ________ installation,an organization shuts off the old system/business process and starts the new one.

A) parallel
B) pilot
C) plunge
D) phased
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is the first activity in the SDLC process?

A) designing system components
B) determining requirements
C) defining the system
D) developing technical safeguards
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
47
During the modeling activity of BPM,teams build an as-is model which ________.

A) simulates the ideal situation
B) designs new business processes
C) documents the current situation
D) models the ideal behavior of team members
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
48
The term system conversion refers to the phase in which an organization ________.

A) designs the software for a new system
B) installs a new system
C) tests a new system
D) designs the hardware of a new system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
49
Passwords are the primary means of authentication for information systems.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
50
Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States.The company implements SCM to reduce its operational costs.Even after the implementation of the SCM system,the company does not shut down the old system and runs both the systems simultaneously.This is an example of ________ installation.

A) plunge
B) pilot
C) phased
D) parallel
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
51
Why is it essential to assess the feasibility of a new information system?

A) to restrict projects that are not too challenging
B) to determine the most suitable vendor for a project
C) to begin the systems development process
D) to avoid paying more for a project that is worth less
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
52
During the ________ activity of BPM,managers evaluate process measures against their objectives and respond to changes in the business climate.

A) component creation
B) monitoring
C) modeling
D) process implementation
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
53
With ________ installation,a new system/business process is installed in stages across an organization.

A) parallel
B) pilot
C) plunge
D) phased
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is the last activity in the SDLC process?

A) implementing the system
B) testing the system
C) creating system components
D) maintaining the system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
55
With ________ installation,a new system/business process is installed and operated alongside the old system until the new system is tested and fully operational.

A) parallel
B) pilot
C) plunge
D) phased
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
56
With ________ installation,organizations implement an entire system/business process on a limited portion of the business.

A) parallel
B) phased
C) pilot
D) plunge
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
57
In a typical project team,________ integrate the work of the programmers,testers,and users.

A) business analysts
B) communication specialists
C) systems analysts
D) database designers
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
58
Maintaining the same password for a long duration will increase system security.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
59
An organization purchases SAP's ERP system.After customizing the system and training employees,the organization shuts down the old system and implements the new one across all business processes.This is an example of ________ installation.

A) parallel
B) plunge
C) pilot
D) phased
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
60
An incident response plan includes how employees are to respond to security problems,whom they should contact,and the steps they can take to reduce further loss.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
61
A malicious hacker flooded an online retailer's server with millions of bogus transactions.Due to this,the Web site's server was overloaded and the site was unable to process legitimate customer orders.Which of the following is being illustrated in this scenario?

A) spoofing
B) sniffing
C) phishing
D) denial-of-service
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
62
Browsing through an online blog,Ronnie clicks on one of the blogger's links and is logged out of his system.He loses access to his system due to a malicious code that was downloaded from the link.This is a clear case of ________.

A) cross site scripting
B) phishing
C) spamming
D) denial of service
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is a valid difference between a password and user name?

A) A password is used to encode information, whereas a user name is used to decode information.
B) Unlike a password, a user name is more complex.
C) A user name identifies the user, whereas a password authenticates the user.
D) A user name is common among users, whereas a password is unique.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
64
________ occurs when a person breaks into computers,servers,or networks to steal data.

A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following statements is true about biometric authentication?

A) It uses personal physical characteristics for authentication.
B) It is less invasive than other methods of authentication.
C) It uses a microchip loaded with identifying data to authenticate users.
D) It provides weak authentication compared to other methods.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
66
How do agile techniques overcome the problems of the SDLC?

A) Agile techniques anticipate requirement changes.
B) Agile techniques deliver products at the very end of the process.
C) Agile techniques generate value at the very end.
D) Agile techniques design the overall system in the start of the process.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
67
You receive an email from a reputed company claiming that it will pay you a large sum of money if you provide your bank account details.Later,you identify that the email was not sent by the company.This scenario exemplifies ________.

A) sniffing
B) keylogging
C) phishing
D) denial of service
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is a technique for intercepting computer communications?

A) phishing
B) sniffing
C) keystroke logging
D) pretexting
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
69
________ is a social engineering technique in which a person pretends to be a legitimate company and sends emails requesting confidential data.

A) Phishing
B) Keylogging
C) Sniffing
D) Denial of service
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
70
How can individuals safeguard their data from being misused?

A) by storing passwords in personal mails
B) by using the same password for all email accounts
C) by removing temporary Internet files
D) by enabling Web sites to store cookies
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
71
________ is the process of transforming clear text into coded,unintelligible text for secure storage or communication.

A) Code injection
B) Pretexting
C) Encryption
D) Authentication
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is a senior management's function to safeguard against security threats to an organization?

A) removing cookies
B) backing up data
C) creating passwords
D) managing risks
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
73
________ refers to a social engineering attack in which someone deceives by pretending to be someone else.

A) Pretexting
B) Keylogging
C) Sniffing
D) Denial of service
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
74
In the context of the sources of threats,computer crime involves ________.

A) poorly designed procedures
B) intentional destruction of data
C) natural events and disasters
D) poorly written applications
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
75
How is scrum distinguished from SDLC ?

A) Scrum resists changes, whereas SDLC accepts changes.
B) Scrum is a dynamic process, whereas SDLC is structured.
C) Scrum creates value at the end, whereas SDLC creates it early.
D) Scrum is a waterfall model, whereas SDLC supports iterations.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
76
A group of intruders accessed RK Bank's IP address and accepted payments on the bank's behalf.This attack is an example of ________.

A) sniffing
B) keylogging
C) spoofing
D) denial of service
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
77
A number used to encrypt data is called a(n)________.

A) signature
B) key
C) cookie
D) escrow
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
78
In the case of ________,the same key is used to encode and to decode a message.

A) asymmetric encryption
B) digital signatures
C) symmetric encryption
D) digital certificates
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is characteristic of a strong password?

A) It should not contain any word in any language.
B) It should not have special characters.
C) It should not be long or complex to remember.
D) It should not be different across varied accounts.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following is a principle of agile development methodologies?

A) It designs the overall system at the very beginning.
B) It generates value at the very end of the development process.
C) It assumes that project requirements do not change.
D) It frequently delivers a working version of the product.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 112 flashcards in this deck.