Indicate the answer choice that best completes the statement or answers the ques
ID: 3848657 • Letter: I
Question
Indicate the answer choice that best completes the statement or answers the question.
1. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
a.
functional baseline
b.
operational baseline
c.
allocated baseline
d.
product baseline
2. _____ analyzes an organization's assets, threats, and vulnerabilities.
a.
Risk uncertainty
b.
Risk diversification
c.
Risk identification
d.
Risk control
3. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.
a.
2.1
b.
1.1
c.
0.1
d.
2.1
4. Corrective maintenance _____.
a.
adds enhancements to an operational system and makes the system easier to use
b.
diagnoses and corrects errors in an operational system
c.
involves changing an operational system to make it more efficient, reliable, or maintainable
d.
competes for resources in an operational system
5. When comparing search engines, it is important to know the company’s policy toward allowing commercial sites to boost their ranking in a _____ arrangement.
a.
fee for service
b.
pay for none
c.
free for all
d.
pay for performance
6. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
a.
functional baseline
b.
operational baseline
c.
allocated baseline
d.
product baseline
7. To avoid problems, preventive maintenance _____.
a.
adds enhancements to an operational system and makes the system easier to use
b.
diagnoses and corrects errors in an operational system
c.
involves changing an operational system to make it more efficient, reliable, or maintainable
d.
requires analysis of areas where trouble is likely to occur
8. _____ measures the time between submitting a request for information and the fulfillment of the request.
a.
Bandwidth
b.
Turnaround time
c.
Throughput
d.
Frequency
9. A collection of related webpages is called a _____.
a.
web browser
b.
web layer
c.
website
d.
weblink
10. A _____ is the main line of defense between a local network, or intranet, and the Internet.
a.
malware
b.
firewall
c.
spyware
d.
threat
11. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.
a.
metrics
b.
wireframes
c.
viewports
d.
baselines
Critical Thinking Questions
As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.
12. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?
a.
Social engineering
b.
Mail bombing
c.
Spoofing
d.
Privilege escalation
13. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.
a.
tester/programmer
b.
strategist/analyst
c.
programmer/analyst
d.
designer/debugger
14. When the _____ logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword.
a.
OR
b.
AND
c.
IF
d.
NOT
15. A _____ is a formal reference point that measures system characteristics at a specific time.
a.
feature line
b.
baseline
c.
product point
d.
viewport
16. _____ ensures that authorized users have timely and reliable access to necessary information.
a.
Availability
b.
Integrity
c.
Confidentiality
d.
Concealability
17. As shown in the accompanying figure, near the end of a system’s useful life, _____ when it becomes clear that a company plans to replace the system.
a.
adaptive, corrective, and perfective maintenance expenses all increase rapidly
b.
perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease
c.
adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
d.
adaptive, corrective, and perfective maintenance expenses all decrease rapidly
18. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.
a.
corrective maintenance
b.
adaptive maintenance
c.
perfective maintenance
d.
obsolete maintenance
19. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
a.
privilege escalation attack
b.
denial-of-service attack
c.
malware penetration attack
d.
identity management invasion
20. Search engines use a specialized computer program called a _____ that travels from site to site indexing, or cataloging, the contents of the pages based on keywords.
a.
wireframe
b.
topology
c.
thread
d.
spider
Identify the letters of the choices that best match the phrases or definitions.
a.
Private key encryption
b.
Public key encryption
c.
Network interface
d.
Asset
e.
Mitigation
f.
Transference
g.
Attack
h.
Security
i.
Keystroke logger
j.
Software reengineering
21. An asymmetric kind of encryption
22. A risk control strategy that shifts risks to another asset or party
23. Hostile act that targets systems or a company itself
24. Protects the system and keeps it safe, free from danger, and reliable
25. Combination of hardware and software that allows computers to interact with a network
26. A risk control strategy that reduces the impact of a risk by careful planning and preparation
27. Uses a single key to encrypt and decrypt information
28. Uses analytical techniques to identify potential quality and performance improvements in an information system
29. Might include company hardware, software, data, networks, people, or procedures
30. Records everything that is typed into the keyboard, including passwords, while the system continues to function normally
Indicate the answer choice that best completes the statement or answers the question.
Explanation / Answer
1. Answer is d) " product baseline"
The "product baseline" describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
2. Answer is c) Risk identification
"Risk identification" analyzes an organization's assets, threats, and vulnerabilities.
3).Answer is b)1.1
In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version "1.1"
4) Answer is b) diagnoses and corrects errors in an operational system.
Corrective maintenance "diagnoses and corrects errors in an operational system".
5) d) pay for performance
5. When comparing search engines, it is important to know the company’s policy toward allowing commercial sites to boost their ranking in a " pay for performance" arrangement.
6) answer is c) "allocated baseline"
The allocated baseline documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
7) Answer is d) "requires analysis of areas where trouble is likely to occur"
To avoid problems, preventive maintenance "requires analysis of areas where trouble is likely to occur".
8) c) Throughput
"Throughput" measures the time between submitting a request for information and the fulfillment of the request.
9) c)website
A collection of related webpages is called a "website"
10) b) firewall
A "firewall" is the main line of defense between a local network, or intranet, and the Internet.
11) a)metrics
In addition to benchmark testing, performance measurements, called "metrics", can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.
12) b)social engineering
Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident - "social engineering"
13. c)programmer/analyst
Many IT departments also use a job title of "programmer/analyst" to designate positions that require a combination of systems analysis and programming skills.
14.a)OR
When the "OR" logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword.
15)b) baseline
A "baseline" is a formal reference point that measures system characteristics at a specific time.