Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

9. When setting priorities, many IT managers believe that evaluating all project

ID: 452007 • Letter: 9

Question

9. When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.

a. maintenance and new development require similar IT department resources

b. in IT departments organized into separate maintenance and development groups, it makes no sense to evaluate requests separately

c. maintenance is more likely to receive a proportional share of IT department resources

d. all of the above

10. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.

a. 1.0 c. 2.0 b. 1.1 d. 2.1

11.The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

a. functional baseline

c. allocated baseline

b. operational baseline

d. product baseline

12.The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

a. functional baseline

c. allocated baseline

b. operational baseline

d. product baseline

13. The ____ describes the system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

a. functional baseline

c. allocated baseline

b. operational baseline

d. product baseline

14. To measure system performance, companies use ____ testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.

a. metric

c. threat

b. benchmark

d. allocation

15.____ include the volume of online data, the number of records accessed, and the number of transactions processed in a given time period.

a. Metrics

c. Allocations

b. Risk assessments

d. Baselines ____ describes the amount of data that a system can transfer in a fixed time period.

a. Throughput

c. Dimensionality

b. Resolution

d. Bandwidth

17. ____ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.

a. Bandwidth

c. Throughput

b. Turnaround time

d. Response time

18.____ protects information from unauthorized disclosure and safeguards privacy.

a. Availability

c. Confidentiality

b. Integrity

d. Risk management

19.____ prevents unauthorized users from creating, modifying, or deleting information.

a. Availability

c. Confidentiality

b. Integrity

d. Risk management

20. ____ ensures that authorized users have timely and reliable access to necessary information.

a. Availability

c. Confidentiality

b. Integrity

d. Risk management

21. Risk ____ analyzes the organization's assets, threats, and vulnerabilities.

a. assessment

c. identification

b. management

d. control

22. Risk ____ measures risk likelihood and impact.

a. assessment

c. identification

b. management

d. control

23. ____ means that in risk control, nothing is done.

a. Acceptance

c. Mitigation

b. Avoidance

d. Transference

24. ____ shifts the risk to another asset or party, such as an insurance company, in risk control.

a. Acceptance

c. Mitigation

b. Avoidance

d. Transference

25.Preset ____ determine whether a firewall will allow network traffic to pass.

a. adaptations

c. port scans

b. rules

d. super-users

Explanation / Answer

Answers:

9.    a. maintenance and new development require similar IT department resources

10.   b. 1.1

11.   a. functional baseline

12. c. allocated baseline

13. b. operational baseline

14. b. benchmark

15   a. Metrics

16. d. Bandwidth

17. d. Response time

18. c. Confidentiality

19. b. Integrity

20. a. Availability

21. c. identification

22. a. assessment

23. a. Acceptance

24. d. Transference

25. b. rules