Filters
Question type

Study Flashcards

Perfective maintenance _____.


A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A _____ is a security weakness or soft spot.


A) proxy
B) vulnerability
C) firewall
D) malware

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Preventative maintenance adds new capability and enhancements.

A) True
B) False

Correct Answer

verifed

verified

When network traffic is encrypted,it is invisible and its content and purpose are masked.

A) True
B) False

Correct Answer

verifed

verified

_____ describes the amount of data that a system can transfer in a fixed time period.


A) Latency
B) Resolution
C) Dimensionality
D) Bandwidth

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

_____ include changing programs,procedures,or documentation to ensure correct system performance;adapting the system to changing requirements;and making the system operate more efficiently.


A) Team building activities
B) Elicitation activities
C) Maintenance activities
D) Testing activities

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Explain the importance of technical credentials and certification.

Correct Answer

verifed

verified

In recent years,technical credentials an...

View Answer

A(n) _____ is an attack that takes advantage of a vulnerability.


A) proxy
B) exploit
C) firewall
D) archive

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

In a secluded engineering attack,an intruder uses social interaction to gain access to a computer system.

A) True
B) False

Correct Answer

verifed

verified

In maintenance management,_____ involves studying the parts of a system to understand the overall system.


A) synthesis
B) adoption
C) fusion
D) elucidation

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An incremental backup only includes recent files that have never been backed up by any method.

A) True
B) False

Correct Answer

verifed

verified

Software leases are not considered an operational cost.

A) True
B) False

Correct Answer

verifed

verified

When a maintenance release methodology is used,all changes,critical and noncritical,are implemented consecutively as they arrive.

A) True
B) False

Correct Answer

verifed

verified

_____ is a process for controlling changes in system requirements during software development.


A) Data management
B) Disk management
C) Configuration management
D) Email management

E) All of the above
F) None of the above

Correct Answer

verifed

verified

_____ develops safeguards that reduce risks and their impact.


A) Risk assessment
B) Risk verification
C) Risk identification
D) Risk control

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Backup media can include tape,hard drives,optical storage,and online storage.

A) True
B) False

Correct Answer

verifed

verified

One highly publicized form of social engineering is called post texting,which is a method of obtaining personal information under false pretenses.

A) True
B) False

Correct Answer

verifed

verified

In maintenance management,_____ means examining the whole in order to learn about the individual elements.


A) synthesis
B) adoption
C) analysis
D) elucidation

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

As enterprise-wide information systems grow more complex,configuration management becomes trivial.

A) True
B) False

Correct Answer

verifed

verified

One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid.In which of the following categories should George place this incident?


A) Vandalism
B) Trespass and espionage
C) Extortion
D) Software attack

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 60 of 80

Related Exams

Show Answer