Deck 7: Enterprise Architecture and Security

Full screen (f)
exit full mode
Question
Fault tolerance is an exact copy of a system's information.
Use Space or
up arrow
down arrow
to flip the card.
Question
Portability determines future environmental infrastructure requirements to ensure high-quality system performance.
Question
Cloud computing often uses grid computing,though grid computing does not necessarily use a cloud.
Question
Maintainability means the system can quickly transform to support environmental changes.
Question
Who is a person who is grounded in technology,fluent in business,and able to provide the important bridge between IT and the business?

A)IT infrastructure manager
B)IT specialist
C)Enterprise architect
D)Enterprise manager
Question
A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Question
Sustainable IT disposal refers to the safe disposal of IT assets at the end of their life cycle,ensuring e-waste does not end up in landfill causing environmental issues.
Question
e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.
Question
The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.
Question
Dynamic scaling means the enterprise architecture can be automatically scaled up or down based on needed requirements.
Question
Usability means the system functions correctly and provides accurate information.
Question
Enterprise architecture is a communications system created by linking two or more devices and establishing a standard methodology for communication.
Question
Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.
Question
Gordon Moore,co-founder of Intel,observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years.
Question
Performance measures how quickly a system performs a process or transaction.
Question
A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
Question
Sustainable or 'green' IT describes the production,management,use and disposal of technology in a way that maximises damage to the environment.
Question
The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.
Question
Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.
Question
High availability occurs when a system is continuously operational at all times.
Question
What has the ability to recover information or systems in the event of catastrophic disasters?

A)Recovery
B)Disaster recovery
C)Backup
D)Failback
Question
Which of the following agile enterprise architecture infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

A)Maintainability
B)Scalability
C)Capacity planning
D)Portability
Question
What does a business continuity plan (BCP) typically include?

A)How frequently the system backup is performed
B)Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
C)How quickly the system recovery needs to be performed
D)Where a hot site is located
Question
Sean works at the local electrical company in Brisbane,which provides electricity to the entire city.This area is prone to floods.As the lead enterprise architect on the night shift,he has been asked to suggest ways the company can protect its IT infrastructure.Sean notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of service to Brisbane residents.What should he recommend his company implement?

A)Accessibility
B)Moore's law
C)Antivirus software
D)Fault tolerance
Question
When building a scalable system that can support new company developments,what are the key factors to consider?

A)Anticipating expected and unexpected growth
B)Organising and deploying additional resources
C)Understanding competitor products and services
D)Analysing the accessibility and availability of competitor systems
Question
Each year businesses lose time and money because of system crashes and failures.Which of the following offers the best way to protect a system from crashes and failures?

A)Backup and recovery plans
B)Fault tolerance
C)Failover
D)All the answers are correct
Question
What are the seven characteristics of an agile infrastructure architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability and usability
B)Accessibility, affordability, mobility, portability, reliability, scalability and usability
C)Accessibility, availability, mobility, penetrability, responsibility, sensibility and usability
D)Accessibility, affordability, functionality, changeability, constancy, sources and understanding
Question
What is usability?

A)The system is easy to learn and efficient and satisfying to use
B)The system functions correctly and provides accurate information
C)The system allows varying levels of access
D)The system quickly transforms to support environmental changes
Question
What determines future environmental infrastructure requirements that ensure high-quality system performance?

A)Capacity system
B)Capacity planning
C)Capacity function
D)Performance indicators
Question
Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.

A)agile
B)sustainable
C)information
D)virtualised
Question
Enterprise architecture is __________ and ___________.

A)dynamic, static
B)dynamic, continually changing
C)a client, a server
D)hardware, software
Question
Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?

A)Flexibility
B)Scalability
C)Reliability
D)Affordability
Question
Which of the following describes the difference between a backup plan and a recovery plan?

A)Recovery is an exact copy of a system's information, where backup is the ability to get a system up and running in the event of a system crash or failure
B)Backup is mandatory, where recovery is optional
C)Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure
D)Recovery is mandatory, where backup is optional
Question
Which characteristics support a sustainable enterprise architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup and recovery plan, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing and virtualisation
D)All the answers are correct
Question
Which of the following is a benefit of a solid enterprise architecture?

A)Reduces costs
B)Improves productivity
C)Optimises business operations
D)All the answers are correct
Question
What occurs when the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime?

A)Failover
B)Disaster recovery cost curve
C)Reliability
D)Maintainability
Question
What does reliability ensure?

A)The system has the ability to operate in many different operating systems
B)The system is easy to learn and efficient and satisfying to use
C)The system is functioning correctly and providing accurate information
D)The time frames when the system is operational
Question
Which characteristics of well-designed information architecture support business operations?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup,recovery, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing, and virtualisation
D)All the answers are correct
Question
What is the primary reason a company has a failover system?

A)To use different systems continuously at the same time
B)To allow employees to work virtually
C)To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations
D)All the answers are correct
Question
What are the three business functions that enterprise architecture supports?

A)Supports operations, change and sustainability (the environment)
B)Supports operations, customers and e-waste
C)Supports operations, clients and servers
D)Supports information, change and business continuity planning
Question
What are the ramifications of improper electronic recycling,when analysing the example of a single desktop computer?

A)One computer contains more than 700 chemicals that can be toxic to the environment
B)Computers in landfills can leak these toxic chemicals into our land, water and air
C)Computers contain high levels of mercury, lead and cadmium, all harmful toxins
D)All the answers are correct
Question
Cloud computing allows users to connect via a web browser and stores all of their software documents 'in the cloud',which means there is no more need for users to have ___________.

A)hard drives
B)physical servers
C)software or processing power
D)All the answers are correct
Question
Grid computing takes advantage of the available 75 per cent of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks.

A)personal computer
B)employee client
C)company server
D)virtual supercomputer
Question
Organisations address security risks through two lines of defence,namely:

A)technology and controls.
B)people and controls.
C)controls and detection technology.
D)people and technology.
Question
What is changed by cloud computing services?

A)The way people access information
B)The way people deliver information
C)The way people use information
D)All the answers are correct
Question
Which of the following sustainable enterprise architecture components is a collection of computers,often geographically dispersed,that are coordinated to solve a common problem?

A)Cloud computing
B)Grid computing
C)Virtualised computing
D)Database computing
Question
What do information security policies identify?

A)Imminent threats to the organisation
B)The best information security options
C)Rules required to maintain information security
D)All the answers are correct
Question
As soon as an organisation has protected its intellectual capital by arming its people with a detailed information security plan,it can begin to focus on deploying ________ to help combat attack.
Question
With grid computing,a problem is broken into pieces and distributed to many machines,allowing _________ processing than could occur with a single system.

A)moderate
B)slower
C)faster
D)cleaner
Question
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A)Grid computing
B)Smart phones
C)Utility computing
D)Computing services
Question
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called what?

A)Clones
B)Insiders
C)Sleepers
D)Hacktivists
Question
What service delivers hardware networking capabilities,including the use of servers,networking and storage over the cloud using a pay-per-use revenue model?

A)Infrastructure as a Service (IaaS)
B)Dynamic scaling
C)Software as a Service (SaaS)
D)Platform as a Service (PaaS)
Question
Which of the following is an example of sustainable enterprise architecture?

A)Cloud computing cluster
B)Cluster computing
C)Grid computing
D)All of the above are examples of sustainable enterprise architecture
Question
What type of software searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm?

A)Firewall software
B)Intrusion-detection software
C)Protection software
D)Pattern-recognition software
Question
What does the second step for creating an information security plan entail?

A)Identifying critical information assets and risks
B)Testing and re-evaluating risks
C)Obtaining stakeholder support
D)Communicating the information security policies
Question
Which of the below is not contributing to e-waste?

A)VCR
B)Automobile
C)Microwave
D)Computer
Question
Through ________,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Question
What might change the way businesses operate,as well as the way people interact with technology?

A)Agile computing
B)Grid computing
C)Cloud computing
D)Smart grid computing
Question
The increased demand in technology devices has caused an increase in discarded devices,a phenomenon known as _______.

A)e-Waste
B)Grid computing
C)Ergonomic code
D)Electronic sustainability
Question
What is the safe disposal of IT assets at the end of their life cycle called?

A)Sustainable IT disposal
B)Sustainable device disposal
C)Sustainable software disposal
D)Sustainable enterprise disposal
Question
________programs collect specific data about the user,ranging from general demographics such as name,address and browsing habits to credit card numbers,user names and passwords.
Question
A ________ hides inside other software,usually as an attachment or a downloadable file.It often masquerades as a benign or legitimate application but in fact does something completely different.
Question
Adequate security involves ________,________ and________,as well as technology.
Question
________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
Question
________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.
Question
Identify the three primary areas associated with an information architecture.
Question
Describe the characteristics of an agile enterprise architecture.
Question
________ is a method of confirming users' identities.
Question
Explain enterprise architecture and its three primary types.
Question
Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.
Question
Explain the three components of a sustainable enterprise architecture,along with their business benefits.
Question
How do authentication and authorisation differ?
Question
__________ are one of the most ineffective ways of determining authentication.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/73
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Enterprise Architecture and Security
1
Fault tolerance is an exact copy of a system's information.
False
2
Portability determines future environmental infrastructure requirements to ensure high-quality system performance.
False
3
Cloud computing often uses grid computing,though grid computing does not necessarily use a cloud.
True
4
Maintainability means the system can quickly transform to support environmental changes.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
5
Who is a person who is grounded in technology,fluent in business,and able to provide the important bridge between IT and the business?

A)IT infrastructure manager
B)IT specialist
C)Enterprise architect
D)Enterprise manager
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
6
A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
7
Sustainable IT disposal refers to the safe disposal of IT assets at the end of their life cycle,ensuring e-waste does not end up in landfill causing environmental issues.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
8
e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
9
The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
10
Dynamic scaling means the enterprise architecture can be automatically scaled up or down based on needed requirements.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
11
Usability means the system functions correctly and provides accurate information.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
12
Enterprise architecture is a communications system created by linking two or more devices and establishing a standard methodology for communication.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
13
Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
14
Gordon Moore,co-founder of Intel,observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
15
Performance measures how quickly a system performs a process or transaction.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
16
A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
17
Sustainable or 'green' IT describes the production,management,use and disposal of technology in a way that maximises damage to the environment.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
18
The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
19
Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
20
High availability occurs when a system is continuously operational at all times.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
21
What has the ability to recover information or systems in the event of catastrophic disasters?

A)Recovery
B)Disaster recovery
C)Backup
D)Failback
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following agile enterprise architecture infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

A)Maintainability
B)Scalability
C)Capacity planning
D)Portability
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
23
What does a business continuity plan (BCP) typically include?

A)How frequently the system backup is performed
B)Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
C)How quickly the system recovery needs to be performed
D)Where a hot site is located
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
24
Sean works at the local electrical company in Brisbane,which provides electricity to the entire city.This area is prone to floods.As the lead enterprise architect on the night shift,he has been asked to suggest ways the company can protect its IT infrastructure.Sean notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of service to Brisbane residents.What should he recommend his company implement?

A)Accessibility
B)Moore's law
C)Antivirus software
D)Fault tolerance
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
25
When building a scalable system that can support new company developments,what are the key factors to consider?

A)Anticipating expected and unexpected growth
B)Organising and deploying additional resources
C)Understanding competitor products and services
D)Analysing the accessibility and availability of competitor systems
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
26
Each year businesses lose time and money because of system crashes and failures.Which of the following offers the best way to protect a system from crashes and failures?

A)Backup and recovery plans
B)Fault tolerance
C)Failover
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
27
What are the seven characteristics of an agile infrastructure architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability and usability
B)Accessibility, affordability, mobility, portability, reliability, scalability and usability
C)Accessibility, availability, mobility, penetrability, responsibility, sensibility and usability
D)Accessibility, affordability, functionality, changeability, constancy, sources and understanding
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
28
What is usability?

A)The system is easy to learn and efficient and satisfying to use
B)The system functions correctly and provides accurate information
C)The system allows varying levels of access
D)The system quickly transforms to support environmental changes
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
29
What determines future environmental infrastructure requirements that ensure high-quality system performance?

A)Capacity system
B)Capacity planning
C)Capacity function
D)Performance indicators
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
30
Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.

A)agile
B)sustainable
C)information
D)virtualised
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
31
Enterprise architecture is __________ and ___________.

A)dynamic, static
B)dynamic, continually changing
C)a client, a server
D)hardware, software
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?

A)Flexibility
B)Scalability
C)Reliability
D)Affordability
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following describes the difference between a backup plan and a recovery plan?

A)Recovery is an exact copy of a system's information, where backup is the ability to get a system up and running in the event of a system crash or failure
B)Backup is mandatory, where recovery is optional
C)Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure
D)Recovery is mandatory, where backup is optional
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
34
Which characteristics support a sustainable enterprise architecture?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup and recovery plan, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing and virtualisation
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is a benefit of a solid enterprise architecture?

A)Reduces costs
B)Improves productivity
C)Optimises business operations
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
36
What occurs when the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime?

A)Failover
B)Disaster recovery cost curve
C)Reliability
D)Maintainability
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
37
What does reliability ensure?

A)The system has the ability to operate in many different operating systems
B)The system is easy to learn and efficient and satisfying to use
C)The system is functioning correctly and providing accurate information
D)The time frames when the system is operational
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
38
Which characteristics of well-designed information architecture support business operations?

A)Accessibility, availability, maintainability, portability, reliability, scalability, usability
B)Backup,recovery, disaster recovery plan, business continuity plan
C)Grid computing, cloud computing, and virtualisation
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
39
What is the primary reason a company has a failover system?

A)To use different systems continuously at the same time
B)To allow employees to work virtually
C)To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
40
What are the three business functions that enterprise architecture supports?

A)Supports operations, change and sustainability (the environment)
B)Supports operations, customers and e-waste
C)Supports operations, clients and servers
D)Supports information, change and business continuity planning
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
41
What are the ramifications of improper electronic recycling,when analysing the example of a single desktop computer?

A)One computer contains more than 700 chemicals that can be toxic to the environment
B)Computers in landfills can leak these toxic chemicals into our land, water and air
C)Computers contain high levels of mercury, lead and cadmium, all harmful toxins
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
42
Cloud computing allows users to connect via a web browser and stores all of their software documents 'in the cloud',which means there is no more need for users to have ___________.

A)hard drives
B)physical servers
C)software or processing power
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
43
Grid computing takes advantage of the available 75 per cent of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks.

A)personal computer
B)employee client
C)company server
D)virtual supercomputer
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
44
Organisations address security risks through two lines of defence,namely:

A)technology and controls.
B)people and controls.
C)controls and detection technology.
D)people and technology.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
45
What is changed by cloud computing services?

A)The way people access information
B)The way people deliver information
C)The way people use information
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following sustainable enterprise architecture components is a collection of computers,often geographically dispersed,that are coordinated to solve a common problem?

A)Cloud computing
B)Grid computing
C)Virtualised computing
D)Database computing
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
47
What do information security policies identify?

A)Imminent threats to the organisation
B)The best information security options
C)Rules required to maintain information security
D)All the answers are correct
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
48
As soon as an organisation has protected its intellectual capital by arming its people with a detailed information security plan,it can begin to focus on deploying ________ to help combat attack.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
49
With grid computing,a problem is broken into pieces and distributed to many machines,allowing _________ processing than could occur with a single system.

A)moderate
B)slower
C)faster
D)cleaner
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
50
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A)Grid computing
B)Smart phones
C)Utility computing
D)Computing services
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
51
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called what?

A)Clones
B)Insiders
C)Sleepers
D)Hacktivists
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
52
What service delivers hardware networking capabilities,including the use of servers,networking and storage over the cloud using a pay-per-use revenue model?

A)Infrastructure as a Service (IaaS)
B)Dynamic scaling
C)Software as a Service (SaaS)
D)Platform as a Service (PaaS)
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is an example of sustainable enterprise architecture?

A)Cloud computing cluster
B)Cluster computing
C)Grid computing
D)All of the above are examples of sustainable enterprise architecture
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
54
What type of software searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm?

A)Firewall software
B)Intrusion-detection software
C)Protection software
D)Pattern-recognition software
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
55
What does the second step for creating an information security plan entail?

A)Identifying critical information assets and risks
B)Testing and re-evaluating risks
C)Obtaining stakeholder support
D)Communicating the information security policies
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the below is not contributing to e-waste?

A)VCR
B)Automobile
C)Microwave
D)Computer
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
57
Through ________,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
58
What might change the way businesses operate,as well as the way people interact with technology?

A)Agile computing
B)Grid computing
C)Cloud computing
D)Smart grid computing
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
59
The increased demand in technology devices has caused an increase in discarded devices,a phenomenon known as _______.

A)e-Waste
B)Grid computing
C)Ergonomic code
D)Electronic sustainability
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
60
What is the safe disposal of IT assets at the end of their life cycle called?

A)Sustainable IT disposal
B)Sustainable device disposal
C)Sustainable software disposal
D)Sustainable enterprise disposal
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
61
________programs collect specific data about the user,ranging from general demographics such as name,address and browsing habits to credit card numbers,user names and passwords.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
62
A ________ hides inside other software,usually as an attachment or a downloadable file.It often masquerades as a benign or legitimate application but in fact does something completely different.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
63
Adequate security involves ________,________ and________,as well as technology.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
64
________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
65
________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
66
Identify the three primary areas associated with an information architecture.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
67
Describe the characteristics of an agile enterprise architecture.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
68
________ is a method of confirming users' identities.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
69
Explain enterprise architecture and its three primary types.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
70
Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
71
Explain the three components of a sustainable enterprise architecture,along with their business benefits.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
72
How do authentication and authorisation differ?
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
73
__________ are one of the most ineffective ways of determining authentication.
Unlock Deck
Unlock for access to all 73 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 73 flashcards in this deck.