1/109
Does this count as helping you study :)
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
The set of activities involved in building information systems, large and small, to meet users needs is called ___.
System Development
Your new software project manager is comfortable working on projects without fully specifying the requirements up front. He recommends a team-based approach to development. He is very likely to be a proponent of the ___ approach to software development.
Agile
Rosie's software development team, which has always relied on a Waterfall approach, is considering trying Agile for a few projects. One potential problem Rosie should anticipate if they make this change is that ___.
Stakeholders might be annoyed when it places greater demands on their time.
Buying off-the-shelf software ___.
Is less risky than building software.
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing ___ testing.
Volume
___ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.
System Testing
What does "agility" mean in the context of the Agile development process?
Highly responsive to emerging requirements.
With the Waterfall approach, a mismatch between system capabilities, users' expectations, and organizational needs can occur. Why is this more likely with the Waterfall approach?
Users do not interact with the solution until the integration and testing phase.
Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for ___.
Alpha Testing.
A major advantage to building customized software is that it ___.
Can help a business to achieve a competitive advantage.
Emily, as a part of a Scrum team, must keep her fellow team members focused on their goals through each iteration of the software product they are developing. She coordinates their activities and helps them overcome obstacles that might prevent them from achieving these goals. What role is Emily fulfilling for this project?
Scrum Master.
___ creates a complete set of technical specifications that can be used to construct an information system.
System Design
Mavis is working with her colleagues on a software selection project. They must already know the desired scope of the system as well as critical business and user requirements to make a selection because ___.
They must judge how well the vendor's solution matches the needs of the users and business.
Which statement about Agile software development is true?
It is an intense process that increases the risk for burnout among team members.
An organization that builds software via a sequential multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary is using what system development process?
Waterfall.
___ involves running a complete new system for one group of users rather than all users.
Pilot start-up.
When comparing potential software solutions for her company, Mavis observes that two of the three packages meet their needs closely and are similar in price, whereas the third is significantly cheaper but would require custom modifications to meet their needs. Which of the following is true?
Mavis should investigate the costs for modifying the less expensive option.
You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?
Parallel start-up.
The major advantage of the Waterfall approach to software development is the ___.
High degree of management control.
Which of the following statements is true of user acceptance testing (UAT)?
UAT must be completed successfully before newly developed software can be rolled out to the market.
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___.
Schedule feasibility
Suppose the customer data analysis software used by ABC Bank is significantly changed, and its documentation is therefore revised, but no new features are added. This type of maintenance is called a ___.
Release
Tara and Zach are leading a systems developing project and they want the investigation phase to go smoothly and quickly. They decide to use ___ because it will also help with the analysis and design phases.
Joint Application Development.
The U.S. Department of Veterans Affairs (VA) has undertaken three separate electronic health record system upgrade projects, none of which produced systems that fully met the organization's needs, were well integrated, or met budget or schedule goals. The Waterfall software development approach would likely have benefitted the VA because it offers ___.
Maximum Management Control
As Mavis researches her company's options for new software, she learns that a vendor who produces several of their existing applications offers a product of the types they are looking for and advertises that all of their systems "talk to each other." Mavis recognizes that one reason to select this product is that ___.
It may reduce the effort required to integrate the new software with existing software.
A data breach at your business resulted in the loss of some customer data. Several angry customers have filed charges. What is a recommended course of action to prepare for future events?
Activate the forensics analysis team and prepare documentation.
The purpose of an advanced persistent threat usually is to ___.
Steal Data.
Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occur first?
The network router sends traffic to the firewall as well as to the IDS.
What is the role of an MSSP?
Monitoring, Managing, and Maintaining Computer and Network Security.
Managed security service providers primarily help organizations keep pace with ___.
Cybercriminals and new laws and regulations.
The final step in the security risk assessment process is to ___.
Decide whether or not to implement particular countermeasures.
Which of the following shortcomings may be revealed during an IT security audit?
Whether only the appropriate personnel have access to critical data.
You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ___.
Your non-work-related use of the laptop could increase vulnerability.
Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of ___.
A distributed denial of service attack.
A hacktivist is someone who ___.
Hacks computers or Web sites in an attempt to promote a political ideology.
Kenneth is assisting with step 7 of his organization's security risk assessment. He and his team compare the risks of potential security breaches against the estimated costs of preventing them from happening. Why is this an important step?
No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs.
The percentage of adults in an area who are interested in opening an account with an investment company drops significantly after the media reports on a successful cyberattack on this organization. This is most likely the result of ___.
Reputation damage related to the cyberattack.
Which of the following is the correct description of a firewall?
A software and hardware combination that limits incoming and outgoing Internet traffic.
Jennifer is a programmer who develops malware and deploys it in the computer systems of her organization's competitors so that she can secretly steal data about new product plans and designs, thus gaining a competitive advantage for her organization. What type of cyberattack is Jennifer involved in?
Cyberespionage.
You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
Leaving laptop computers unattended in public spaces.
Legal consequences following a successful cyberattack on a well-known organization often include ___.
Lawsuits initiated by consumers who incurred damages.
In a denial-of-service (DDoS) attack, the perpetrator ___.
Instructs the zombie computers to send simple access requests to target computers.
You discover that one of your organization's computers has stopped working properly due to malware. Who is most likely responsible for the presence of malware on this machine.
A careless coworker.
In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) ___.
Exploit.
These days, the biggest threats to IT security are from ___.
Organized groups that have ample resources including money and sophisticated tools, to support their efforts.
A hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, but disguises it as something else to make it difficult to detect. Which attack has this attacker chosen to use?
Virus.
Viruses and worms are both attack vectors, but they differ in that ___.
Worms can propagate without human intervention.
Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for ___.
Computer forensics.
Once a ___ is installed, the attacker can gain full access to the computer.
Rootkit.
Someone who attempts to destroy the infrastructure components of governments is known as a ___.
Cyberterrorist.
You work for a company that is growing. Originally, all the users in all departments had access to the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?
Assign roles and privileges to users so that only job-relevant data is accessible to the user.
One drawback with relying on IoT applications to maintain the safety of critical systems is that ___.
A poor or absent network connection can result in missing data.
Which statement about the pros and cons of various cloud computing approaches is accurate?
Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks.
Reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware because they use public cloud computing. Reagan recognizes that this demonstrates which key benefit of public cloud computing?
Reduced costs.
New industry-transforming services that will be made possible by 5G technology include ___.
Performing remote surgery.
In which common approach to cloud computing does a service provider organization own and manage the infrastructure for client organizations that access slices of shared resources?
Public cloud.
One of the first things developers of IoT applications should focus on is ___.
Building security from the start.
What is the Internet of Things?
A network of physical objects embedded with sensors, processors, software, and network connectivity capability.
Why are advances in 5G technology expected to influence the IoT?
5G enables many devices to transmit data quickly to the cloud.
How can IoT devices minimize downtime in a manufacturing plant?
By predicting equipment failures and scheduling preventative maintenance.
Which type of IoT application assists with the creation of new business models, products, and services through the combination of sensor data and external data to provide new insights?
Transform and explore.
Owen's firm runs their critical applications in a public cloud. Recently, their launch of a new product resulted in a surge of customer orders, but they were unable to ramp up their computing capacity fast enough, and some customer's experienced problems. This demonstrates which common issue with public cloud computing?
Wide various in performance over time.
After Rosie's company enters into a contract with a public cloud service provider and transitions to the cloud, they discover that they need greater computing capacity than they expected. To address this, they must ___.
Request that the service provider increase their capacity, incurring a higher monthly fee.
Many IT industry observers believe that many organizations will adopt a hybrid cloud approach because ___.
It offers both agility and security.
What must a networked device possess to truly belong to the IoT?
An IP address.
The way consumers and large enterprises use the IoT is evolving because of advances in ___.
Mobile communications.
Sensors inside IoT wearable devices typically collect information such as ___.
Location and heart rate.
Suppose a business wishes to have access to servers and storage, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?
Cloud computing: infrastructure as a service.
Which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?
Hybrid.
A common reason an organization chooses a private rather than a public cloud environment is ___.
Concerns about data security.
Thomas owns a small Web services company and currently owns and maintains all of his own computing hardware. He plans to develop and test a new service offering that will require his computing capacity to double or triple quickly if it proves successful. How might transitioning to the public cloud help Thomas with this situation?
Flexible computing capacity that can be adjusted continually.
Smart cars ___.
Have sensors that monitor objects in the car's blind spots and at the front and rear of the car.
A single-tenant cloud computing environment is also known as a(n) ___.
Private cloud.
Mavis's company migrated its infrastructure and data to a public cloud last year, and have endured several periods of decreased or interrupted performance since then. Marvis is frustrated because the company's leadership is unwilling to change cloud providers. Mavis's company has most likely fallen prey to ___.
Vendor lock-in.
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
Unexpected cloud service costs.
Which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data?
Predict and adapt.
Which of the following is a widely-used client-side programming language?
JavaScript
In a ___, all network devices are connected to a common backbone that serves as a shared communications medium.
Bus Network
Which network topology uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area?
Mesh
What very short-range wireless connectivity technology enables exchange of data over a few inches of space between two devices, such as a smartphone and a point-of-sale terminal?
Near Field Communication (NFC)
The World Wide Web uses the ___ Protocol for transmitting content.
Hypertext Transport
A network built using Web technologies that links selected resources of a company's internal corporate network with its suppliers, customers, or other business partners is called a(n) _____.
Extranet.
The World Wide Web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as ___.
Client-Server Architecture
Which type of network device directs data packets to other networks until each packet reaches its destination, and thus forms the Internet backbone?
Router
Liesel is an entrepreneur, and she'd like to publish a website for her small business. Liesel ___.
Can use hosting services
Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as ___.
Web Browsers
Joan's organization has just set up a corporate intranet. In order to use the intranet effectively, most likely Joan ___.
Can rely on her familiarity with Internet technology.
Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in ___.
Latency
Jocelyn uses a company-owned smartphone for her job, and has noticed that applications, data, and patches are installed on her smartphone for her by a central control group. She cannot change the system or security settings on the smartphone because the central control group handles those as well. Jocelyn's company can do this using ___.
Mobile device management software.
___ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.
Search engine optimization
A ___ network is one in which all network devices are connected to one another through a single central device called the hub node.
Star
George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see if they have what he needs without contacting a salesperson by using ___.
an extranet.
A ___ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.
Metropolitan Area Network (MAN)
Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?
More cell towers will need to be installed.
Which piece of network hardware keeps a record of the MAC address of all devices connected to it and uses this information to direct data packets to the appropriate port?
Switch.
When you successfully connect your computer to a printer using ___, the two devices will be 10 to 30 feet apart and the computer will transmit to the printer at a rate of about 2 Mbps.
Bluetooth
An internal corporate network built using Internet and World Wide Web standards and products is known as a(n) ___.
Intranet
Why is managing a typical large network in today's current network environment a labor-intensive and error-prone effort?
Network devices must each be configured individually.
The area covered by one or more interconnected wireless access points is commonly called a(n) ___.
Hot Spot
What emerging approach allows administrators to manage a network via a controller that does not require physical access to all the network devices?
Software-Defined Networking