Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Indicate the answer choice that best completes the statement or answers the ques

ID: 3848657 • Letter: I

Question

Indicate the answer choice that best completes the statement or answers the question.

1. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

a.

functional baseline

b.

operational baseline

c.

allocated baseline

d.

product baseline

2. _____ analyzes an organization's assets, threats, and vulnerabilities.

a.

Risk uncertainty

b.

Risk diversification

c.

Risk identification

d.

Risk control

3. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.

a.

2.1

b.

1.1

c.

0.1

d.

2.1

4. Corrective maintenance _____.

a.

adds enhancements to an operational system and makes the system easier to use

b.

diagnoses and corrects errors in an operational system

c.

involves changing an operational system to make it more efficient, reliable, or maintainable

d.

competes for resources in an operational system

5. When comparing search engines, it is important to know the company’s policy toward allowing commercial sites to boost their ranking in a _____ arrangement.

a.

fee for service

b.

pay for none

c.

free for all

d.

pay for performance

6. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

a.

functional baseline

b.

operational baseline

c.

allocated baseline

d.

product baseline

7. To avoid problems, preventive maintenance _____.

a.

adds enhancements to an operational system and makes the system easier to use

b.

diagnoses and corrects errors in an operational system

c.

involves changing an operational system to make it more efficient, reliable, or maintainable

d.

requires analysis of areas where trouble is likely to occur

8. _____ measures the time between submitting a request for information and the fulfillment of the request.

a.

Bandwidth

b.

Turnaround time

c.

Throughput

d.

Frequency

9. A collection of related webpages is called a _____.

a.

web browser

b.

web layer

c.

website

d.

weblink

10. A _____ is the main line of defense between a local network, or intranet, and the Internet.

a.

malware

b.

firewall

c.

spyware

d.

threat

11. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.

a.

metrics

b.

wireframes

c.

viewports

d.

baselines

Critical Thinking Questions

As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced.

12. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?

a.

Social engineering

b.

Mail bombing

c.

Spoofing

d.

Privilege escalation

13. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.

a.

tester/programmer

b.

strategist/analyst

c.

programmer/analyst

d.

designer/debugger

14. When the _____ logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword.

a.

OR

b.

AND

c.

IF

d.

NOT

15. A _____ is a formal reference point that measures system characteristics at a specific time.

a.

feature line

b.

baseline

c.

product point

d.

viewport

16. _____ ensures that authorized users have timely and reliable access to necessary information.

a.

Availability

b.

Integrity

c.

Confidentiality

d.

Concealability

17. As shown in the accompanying figure, near the end of a system’s useful life, _____ when it becomes clear that a company plans to replace the system.

a.

adaptive, corrective, and perfective maintenance expenses all increase rapidly

b.

perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease

c.

adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases

d.

adaptive, corrective, and perfective maintenance expenses all decrease rapidly

18. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.

a.

corrective maintenance

b.

adaptive maintenance

c.

perfective maintenance

d.

obsolete maintenance

19. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.

a.

privilege escalation attack

b.

denial-of-service attack

c.

malware penetration attack

d.

identity management invasion

20. Search engines use a specialized computer program called a _____ that travels from site to site indexing, or cataloging, the contents of the pages based on keywords.

a.

wireframe

b.

topology

c.

thread

d.

spider

Identify the letters of the choices that best match the phrases or definitions.

a.

Private key encryption

b.

Public key encryption

c.

Network interface

d.

Asset

e.

Mitigation

f.

Transference

g.

Attack

h.

Security

i.

Keystroke logger

j.

Software reengineering

21. An asymmetric kind of encryption

22. A risk control strategy that shifts risks to another asset or party

23. Hostile act that targets systems or a company itself

24. Protects the system and keeps it safe, free from danger, and reliable

25. Combination of hardware and software that allows computers to interact with a network

26. A risk control strategy that reduces the impact of a risk by careful planning and preparation

27. Uses a single key to encrypt and decrypt information

28. Uses analytical techniques to identify potential quality and performance improvements in an information system

29. Might include company hardware, software, data, networks, people, or procedures

30. Records everything that is typed into the keyboard, including passwords, while the system continues to function normally

Indicate the answer choice that best completes the statement or answers the question.

Explanation / Answer

1. Answer is d) " product baseline"

The "product baseline" describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

2. Answer is c) Risk identification

"Risk identification" analyzes an organization's assets, threats, and vulnerabilities.

3).Answer is b)1.1

In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version "1.1"

4) Answer is b) diagnoses and corrects errors in an operational system.

Corrective maintenance   "diagnoses and corrects errors in an operational system".

5) d) pay for performance

5. When comparing search engines, it is important to know the company’s policy toward allowing commercial sites to boost their ranking in a " pay for performance" arrangement.

6) answer is c) "allocated baseline"

The allocated baseline documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

7) Answer is d) "requires analysis of areas where trouble is likely to occur"

To avoid problems, preventive maintenance "requires analysis of areas where trouble is likely to occur".

8) c) Throughput

"Throughput" measures the time between submitting a request for information and the fulfillment of the request.

9) c)website

A collection of related webpages is called a "website"

10) b) firewall

A "firewall" is the main line of defense between a local network, or intranet, and the Internet.

11) a)metrics

In addition to benchmark testing, performance measurements, called "metrics", can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.

12) b)social engineering

Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident - "social engineering"

13. c)programmer/analyst

Many IT departments also use a job title of "programmer/analyst" to designate positions that require a combination of systems analysis and programming skills.

14.a)OR

When the "OR" logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword.

15)b) baseline

A "baseline" is a formal reference point that measures system characteristics at a specific time.