Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Requirements collection takes place during the systems ________ phase of the sys

ID: 452112 • Letter: R

Question

Requirements collection takes place during the systems ________ phase of the systems development life cycle (SDLC).

design

implementation

analysis

maintenance

operation

2 points   

Question 20

Processing logic is often expressed in ________, which is independent of the actual programming language being used.

semantics encoding

prefix code

source code

semiotics

pseudocode

2 points   

Question 21

Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems.

True

False

2 points   

Question 22

Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ________.

fads

faith

facts

fear

fiction

2 points   

Question 23

Public domain software severely restricts access to the source code and does not give users any rights to copy or modify the software.

True

False

2 points   

Question 24

________ is the process of decommissioning the current way of doing things and installing the new system in the organization.

Reverse engineering

System programming

Adaptive maintenance

Patch management

System conversion

2 points   

Question 25

A company needs a new information system to manage increasing customer orders and changing demands. The company's five-member information system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company's decision?

The company's preferred vendor is willing to provide a basic information system at a reduced rate.

The company's IS team is short-staffed, and is finding it difficult to cope with increased work.

The costs of outsourcing systems development are greater than those of adapting an off-the-shelf system.

The company's IS department has the qualifications to develop the new system.

The company's requirements for the new system are very specialized.

2 points   

Question 26

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference?

The company forms a special team of top executives to monitor and correct the information policies.

The company insures any possible data loss for a large sum.

It installs a corporate firewall to protect unauthorized access to information.

It enforces a strict employee data policy and prohibits employees from unauthorized access.

The company decides to absorb any damages that might occur.

2 points   

Question 27

Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company's network causing the server to crash. This type of virus is most likely to be ________.

adware

phishing mail

spam

a worm

a Trojan horse

2 points   

Question 28

Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?

Sarbanes-Oxley Act

Trade Expansion Act of 1962

Electronic Communications Privacy Act of 1986

Central Intelligence Agency Act

U.S.A. Patriot Act

2 points   

Question 29

A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.

cold backup site

buying center

botnet

firewall

collocation facility

2 points   

Question 30

The science of encryption is called ________.

cryptanalysis

cryptology

cryptography

cryptowall

cryptarithm

2 points   

Question 31

Identify a true statement about a vulnerability scanner.

It analyzes network traffic and captures unencrypted passwords.

It presents a view of long-term technology integration.

It tests targeted systems for weaknesses.

It presents a view of short-term technology integration.

It ensures high-quality leads when a search is conducted online.

2 points   

Question 32

The act of cybercriminals to gain information on a victim by monitoring online activities, accessing databases, and making false accusations are forms of ________.

bot herding

cyberstalking

spam filtering

viral marketing

spear phishing

2 points   

Question 33

Computers that are located in homes, schools, and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.

digital marketing

malware

adware

denial-of-service

product-as-service

2 points   

Question 34

A(n) ________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.

American Standard Code for Information Interchange (ASCII)

Comprehensive TeX Archive Network (CTAN)

Entity-Relationship Diagram (ERD)

Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)

Organization for the Advancement of Structured Information Standards (OASIS)

2 points   

Question 35

The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information.

True

False

2 points   

Question 36

Spam filters are used to reduce the amount of spam processed by central e-mail servers.

True

False

2 points   

Question 37

Control objectives for information and related technology (COBIT) is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and establish appropriate controls.

True

False

2 points   

Question 38

A virtual private network is also called a secure tunnel.

True

False

2 points   

Question 39

Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.

misdemeanors

felonies

embezzlements

indictments

larcenies

2 points   

Question 40

Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?

the Foreign Intelligence Surveillance Act

the Computer Fraud and Abuse Act

the Patriot Act

the Glass-Steagall Act

the Electronic Communications Privacy Act

2 points   

Question 41

Which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?

firewall

honeypot

bot herder

botnet

zombie computer

2 points   

Question 42

Glassico Publishing is a leading media company in France. The company handles sensitive information and often finds it susceptible to information threats. As a countermeasure, the company installs strong firewalls and protective software. These steps are a part of ________.

risk acceptance

risk mitigation

risk reduction

risk transference

risk rescheduling

2 points   

Question 43

The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.

hackers

bots

online predators

worms

power users

2 points   

Question 44

________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors.

Data mining

Information dissemination

Location monitoring

Information sharing

Cybersquatting

2 points   

Question 45

A(n) ________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.

artificial network

ambient network

cognitive network

collaborative service network

virtual private network

2 points   

Question 46

When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________.

spyware

a worm

adware

a Trojan horse

encryption

2 points   

Question 47

The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.

True

False

2 points   

Question 48

Information systems ________ is done to obtain an understanding of the threats to the confidentiality, integrity, and availability of data and systems.

risk assessment

quality testing

requirements analysis

security modeling

data processing

2 points   

Question 49

________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.

Cyberwar

Internet hoaxing

Cybersquatting

Web vandalism

Logic bombing

2 points   

Question 50

Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?

the Non-Detention Act

the Espionage Act

the Patriot Act

the Video Privacy Protection Act

the Clery Act

design

implementation

analysis

maintenance

operation

Explanation / Answer

19) Analysis

SDLC has typically 5 phases-

20) Pseudocode

Pseudo code describes the processing logic of the algorithm so that implementation becomes an easier task. It allows the designer to focus on the logic of the problem to design the solution.

21) True

Benchmarking is done with the best of the industry and various parameters are tested based on that. With the help of benchmarking, we can find out whether the system is working as per set industry standards or not.

22) Facts

Since data, quantitative analysis and indisputable factors are based on logic and there is no ambiguity in the process, it is called fact based arguments.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote