Requirements collection takes place during the systems ________ phase of the sys
ID: 452112 • Letter: R
Question
Requirements collection takes place during the systems ________ phase of the systems development life cycle (SDLC).
design
implementation
analysis
maintenance
operation
2 points
Question 20
Processing logic is often expressed in ________, which is independent of the actual programming language being used.
semantics encoding
prefix code
source code
semiotics
pseudocode
2 points
Question 21
Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems.
True
False
2 points
Question 22
Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ________.
fads
faith
facts
fear
fiction
2 points
Question 23
Public domain software severely restricts access to the source code and does not give users any rights to copy or modify the software.
True
False
2 points
Question 24
________ is the process of decommissioning the current way of doing things and installing the new system in the organization.
Reverse engineering
System programming
Adaptive maintenance
Patch management
System conversion
2 points
Question 25
A company needs a new information system to manage increasing customer orders and changing demands. The company's five-member information system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company's decision?
The company's preferred vendor is willing to provide a basic information system at a reduced rate.
The company's IS team is short-staffed, and is finding it difficult to cope with increased work.
The costs of outsourcing systems development are greater than those of adapting an off-the-shelf system.
The company's IS department has the qualifications to develop the new system.
The company's requirements for the new system are very specialized.
2 points
Question 26
Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference?
The company forms a special team of top executives to monitor and correct the information policies.
The company insures any possible data loss for a large sum.
It installs a corporate firewall to protect unauthorized access to information.
It enforces a strict employee data policy and prohibits employees from unauthorized access.
The company decides to absorb any damages that might occur.
2 points
Question 27
Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company's network causing the server to crash. This type of virus is most likely to be ________.
adware
phishing mail
spam
a worm
a Trojan horse
2 points
Question 28
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?
Sarbanes-Oxley Act
Trade Expansion Act of 1962
Electronic Communications Privacy Act of 1986
Central Intelligence Agency Act
U.S.A. Patriot Act
2 points
Question 29
A ________ is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else.
cold backup site
buying center
botnet
firewall
collocation facility
2 points
Question 30
The science of encryption is called ________.
cryptanalysis
cryptology
cryptography
cryptowall
cryptarithm
2 points
Question 31
Identify a true statement about a vulnerability scanner.
It analyzes network traffic and captures unencrypted passwords.
It presents a view of long-term technology integration.
It tests targeted systems for weaknesses.
It presents a view of short-term technology integration.
It ensures high-quality leads when a search is conducted online.
2 points
Question 32
The act of cybercriminals to gain information on a victim by monitoring online activities, accessing databases, and making false accusations are forms of ________.
bot herding
cyberstalking
spam filtering
viral marketing
spear phishing
2 points
Question 33
Computers that are located in homes, schools, and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.
digital marketing
malware
adware
denial-of-service
product-as-service
2 points
Question 34
A(n) ________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
American Standard Code for Information Interchange (ASCII)
Comprehensive TeX Archive Network (CTAN)
Entity-Relationship Diagram (ERD)
Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
Organization for the Advancement of Structured Information Standards (OASIS)
2 points
Question 35
The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information.
True
False
2 points
Question 36
Spam filters are used to reduce the amount of spam processed by central e-mail servers.
True
False
2 points
Question 37
Control objectives for information and related technology (COBIT) is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and establish appropriate controls.
True
False
2 points
Question 38
A virtual private network is also called a secure tunnel.
True
False
2 points
Question 39
Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison. Such violations are charged as ________.
misdemeanors
felonies
embezzlements
indictments
larcenies
2 points
Question 40
Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?
the Foreign Intelligence Surveillance Act
the Computer Fraud and Abuse Act
the Patriot Act
the Glass-Steagall Act
the Electronic Communications Privacy Act
2 points
Question 41
Which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?
firewall
honeypot
bot herder
botnet
zombie computer
2 points
Question 42
Glassico Publishing is a leading media company in France. The company handles sensitive information and often finds it susceptible to information threats. As a countermeasure, the company installs strong firewalls and protective software. These steps are a part of ________.
risk acceptance
risk mitigation
risk reduction
risk transference
risk rescheduling
2 points
Question 43
The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.
hackers
bots
online predators
worms
power users
2 points
Question 44
________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors.
Data mining
Information dissemination
Location monitoring
Information sharing
Cybersquatting
2 points
Question 45
A(n) ________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes.
artificial network
ambient network
cognitive network
collaborative service network
virtual private network
2 points
Question 46
When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________.
spyware
a worm
adware
a Trojan horse
encryption
2 points
Question 47
The term dumpster diving refers to the task of modifying the operating system to remove manufacturer or carrier restrictions in order to run applications other than those from the official store.
True
False
2 points
Question 48
Information systems ________ is done to obtain an understanding of the threats to the confidentiality, integrity, and availability of data and systems.
risk assessment
quality testing
requirements analysis
security modeling
data processing
2 points
Question 49
________ refers to an organized attempt by a country's military to disrupt or destroy the information and communication systems of another country.
Cyberwar
Internet hoaxing
Cybersquatting
Web vandalism
Logic bombing
2 points
Question 50
Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow investigators to easily access voice-related communications?
the Non-Detention Act
the Espionage Act
the Patriot Act
the Video Privacy Protection Act
the Clery Act
design
implementation
analysis
maintenance
operation
Explanation / Answer
19) Analysis
SDLC has typically 5 phases-
20) Pseudocode
Pseudo code describes the processing logic of the algorithm so that implementation becomes an easier task. It allows the designer to focus on the logic of the problem to design the solution.
21) True
Benchmarking is done with the best of the industry and various parameters are tested based on that. With the help of benchmarking, we can find out whether the system is working as per set industry standards or not.
22) Facts
Since data, quantitative analysis and indisputable factors are based on logic and there is no ambiguity in the process, it is called fact based arguments.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.