You are on page 1of 29

Chapter 10

Multiple Choice
1. IT applications can be developed in which of the following ways?
a) build the system inhouse
b) buy an application and install it
c) lease software from an application service provider
d) outsource it
e) all of the above
!ns" e
#esponse" $ee page %0&
&. The information systems planning process proceeds in which order?
a) organi'ation mission ( organi'ation strategic plan ( I$ strategic plan ( new IT architecture
b) organi'ation mission ( I$ strategic plan ( organi'ation strategic plan ( I$ operational plan
c) organi'ation strategic plan ( organi'ation mission ( I$ strategic plan ( new IT architecture
d) IT architecture ( I$ strategic plan ( organi'ation strategic plan ( organi'ation mission
e) I$ development pro)ects ( I$ operational plan ( new IT architecture ( organi'ation mission
!ns" a
#esponse" $ee page %0*%0+
%. ! typical I$ operational plan contains which of the following elements?
a) mission of the I$ function
b) summary of the information needs of the functional areas and of the entire organi'ation
c) I$ function,s estimate of its goals
d) application portfolio
e) all of the above
!ns" e
#esponse" $ee page %0*%0+
-. .hich of the following is not a part of the typical I$ operational plan?
a) mission of the I$ function
b) organi'ational mission
c) IT architecture
d) application portfolio
e) I$ function,s estimate of its goals
!ns" b
#esponse" $ee page %0+
/. 0valuating the benefits of IT pro)ects is more comple1 than evaluating their costs for which of the
following reasons?
a) benefits are harder to 2uantify
b) benefits are often intangible
c) IT can be used for several different purposes
d) probability of obtaining a return from an IT investment is based on the probability of implementation
success
e) all of the above
!ns" e
#esponse" $ee page %03
*. 0valuating the benefits of IT pro)ects is more comple1 than evaluating their costs for all of the following
reasons e1cept"
a) benefits are harder to 2uantify
b) benefits are often tangible
c) IT can be used for several different purposes
d) probability of obtaining a return from an IT investment is based on the probability of implementation
success
!ns" b
#esponse" $ee page %03
+. The 44444 method converts future values of benefits to today,s value by 5discounting6 them at the
organi'ation,s cost of funds.
a) net present value
b) costbenefit analysis
c) return on investment
d) internal rate of return
e) business case approach
!ns" a
#esponse" $ee page %03
3. The 44444 method measures the effectiveness of management in generating profits with its available
assets.
a) net present value
b) costbenefit analysis
c) return on investment
d) internal rate of return
e) business case approach
!ns" c
#esponse" $ee page %03
7. .hich of the following are advantages of the buy option for ac2uiring I$ applications?
a) many different types of offtheshelf software are available
b) software can be tried out
c) saves time
d) company will 8now what it is getting
e) all of the above
!ns" e
#esponse" $ee page %07
10. .hich of the following is not an advantage of the buy option for ac2uiring I$ applications?
a) few types of offtheshelf software are available9 thus limiting confusion
b) software can be tried out
c) saves time
d) company will 8now what it is getting
e) all of the above
!ns" a
#esponse" $ee page %07
11. .hich of the following are disadvantages of the buy option for ac2uiring I$ applications?
a) software may not e1actly meet the company,s needs
b) software may be impossible to modify
c) company will not have control over software improvements
d) software may not integrate with e1isting systems
e) all of the above
!ns" e
#esponse" $ee page %10
1&. .hich of the following systems ac2uisition methods results in software that can be tried out9 has been
used for similar problems in other organi'ations9 and can save time?
a) systems development life cycle
b) prototyping
c) enduser development
d) buy option
e) ob)ectoriented development
!ns" d
#esponse" $ee page %10
1%. .hich of the following systems ac2uisition methods results in software that is controlled by another
company9 may be difficult to enhance or modify9 and may not support desired business processes?
a) systems development life cycle
b) prototyping
c) enduser development
d) buy option
e) componentbased development
!ns" d
#esponse" $ee page %10
1-. .hich of the following systems ac2uisition methods forces staff to systematically go through every step
in the development process and has a lower probability of missing important user re2uirements?
a) systems development life cycle
b) prototyping
c) enduser development
d) e1ternal ac2uisition
e) ob)ectoriented development
!ns" a
#esponse" $ee page %11
1/. .hich of the following systems ac2uisition methods is timeconsuming9 costly9 and may produce
e1cessive documentation?
a) systems development life cycle
b) prototyping
c) enduser development
d) e1ternal ac2uisition
e) ob)ectoriented development
!ns" a
#esponse" $ee page %11
1*. :lace the stages of the systems development life cycle in order"
a) investigation ( analysis ( design ( programming ( testing ( implementation ( operation ( maintenance
b) investigation ( design ( analysis ( programming ( testing ( implementation ( maintenance ( operation
c) analysis ( design ( investigation ( operation ( maintenance ( programming ( testing ( implementation
d) investigation ( analysis ( design ( programming ( testing ( maintenance ( operation ( implementation
!ns" a
#esponse" $ee page %1&
1+. The feasibility study addresses which of the following issues?
a) economic feasibility
b) technical feasibility
c) behavioral feasibility
d) all of the above
!ns" d
#esponse" $ee page %1%
13. The 44444 that changes are made in the systems development life cycle9 the 44444 e1pensive these
changes become.
a) sooner9 less
b) later9 less
c) more fre2uently9 more
d) more e1tensively9 more
e) sooner9 more
!ns" a
#esponse" $ee page %1%
17. 4444 feasibility determines if the hardware9 software9 and communications components can be
developed and;or ac2uired to solve the business problem.
a) technical
b) economic
c) organi'ational
d) behavioral
!ns" a
#esponse" $ee page %1%
&0. 44444 feasibility determines if the pro)ect is an acceptable financial ris8 and if the organi'ation can
afford the e1pense and time needed to complete the pro)ect.
a) technical
b) economic
c) organi'ational
d) behavioral
!ns" b
#esponse" $ee page %1%
&1. 44444 feasibility addresses the human issues of an information systems pro)ect.
a) technical
b) economic
c) organi'ational
d) behavioral
!ns" d
#esponse" $ee page %1%
&&. 44444 feasibility concerns a firm,s policies and politics9 power structures9 and business relationships.
a) technical
b) economic
c) organi'ational
d) behavioral
!ns" c
#esponse" $ee page %1-
&%. .hich of the following is not a part of systems analysis?
a) definition of the business problem
b) identification of the causes of9 and solution to9 the business problem
c) identification of the information re2uirements that the solution must satisfy
d) identification of the technical specifications of the solution
!ns" d
#esponse" $ee page %1-
&-. $ystems analysts use which of the following techni2ues to obtain the information re2uirements for the
new system?
a) direct observation
b) structured interviews
c) unstructured interviews
d) document analysis
e) all of the above
!ns" e
#esponse" $ee page %1-
&/. .hich of the following is not a techni2ue used to obtain the information re2uirements for the new
system?
a) direct observation
b) structured interviews
c) unstructured interviews
d) use the system themselves
e) document analysis
!ns" d
#esponse" $ee page %1-
&*. .hich of the following are problems associated with eliciting information re2uirements?
a) business problem may be poorly defined
b) users may not 8now e1actly what the business problem is
c) users may disagree with each other
d) the problem may not be related to information systems
e) all of the above
!ns" e
#esponse" $ee page %1-
&+. 44444 is the systems development stage that determines how the information system will do what is
needed to solve the business problem.
a) systems design
b) systems analysis
c) systems implementation
d) systems development
e) operation and maintenance
!ns" a
#esponse" $ee page %1-
&3. <ogical systems design refers to 444449 while physical systems design refers to 44444.
a) the collection of user re2uirements9 the development of software
b) what the system will do9 how the tas8s are accomplished
c) how the tas8s are accomplished9 what the system will do
d) the order of tas8 accomplishment9 how the tas8s are accomplished
e) operation of the system9 debugging the system
!ns" b
#esponse" $ee page %1/
&7. $ystems design answers the 2uestion9 44444"
a) =ow will the information system do what it must to obtain a solution to the business problem?
b) .hy must the information system do what it must to obtain a solution to the business problem?
c) .hat is the problem the information system must address?
d) .ho will benefit from use of the information system being developed?
e) .hat is the effective operational life of the system?
!ns" a
#esponse" $ee page %1/
%0. .hen users as8 for added functionality during a systems development pro)ect9 this is called"
a) userdefined software
b) scope creep
c) bloatware
d) outofcontrol pro)ect
e) runaway pro)ect
!ns" b
#esponse" $ee page %1/
%1. $tructured design advocates the use of software modules. .hich of the following items are advantages
of this approach?
a) modules can be reused
b) modules cost less to develop
c) modules are easier to modify
d) all of the above
!ns" d
#esponse" $ee page %1*
%&. $tructured programming includes which of the following restrictions?
a) each module has one9 and only one9 function
b) each module has one entrance and one e1it
c) no >?T? statements allowed
d) has only three techni2ues" se2uence9 decision9 loop
e) all of the above
!ns" d
#esponse" $ee page %1*
%%. .hich of the following is not a restriction of structured programming?
a) each module has multiple functions
b) each module has one entrance and one e1it
c) no >?T? statements allowed
d) has only three techni2ues" se2uence9 decision9 loop
e) none of the above
!ns" a
#esponse" $ee page %1*
%-. In structured programming,s 44444 structure9 the logic flow branches depending on certain conditions
being met.
a) decision
b) se2uence
c) decision
d) return
e) parallel
!ns" a
#esponse" $ee page %1*
%/. In structured programming,s 44444 structure9 the software e1ecutes the same program9 or parts of it9
until certain conditions are met.
a) decision
b) se2uence
c) decision
d) return
e) parallel
!ns" c
#esponse" $ee page %1*
%*. 44444conversion is the process where the old system and the new system operate simultaneously for a
period of time.
a) parallel
b) direct
c) pilot
d) phased
!ns" a
#esponse" $ee page %1+
%+. 44444 conversion is the process where the old system is cut off and the new system is turned on at a
certain point in time.
a) parallel
b) direct
c) pilot
d) phased
!ns" b
#esponse" $ee page %1+
%3. 44444 conversion is the process where the new system is introduced in one part of the organi'ation.
a) parallel
b) direct
c) pilot
d) phased
!ns" c
#esponse" $ee page %13
%7. 44444 conversion is the process where components of the new system are introduced in stages.
a) parallel
b) direct
c) pilot
d) phased
!ns" d
#esponse" $ee page %13
-0. The ris8iest type of conversion process is"
a) parallel
b) direct
c) pilot
d) phased
!ns" b
#esponse" $ee page %1+
-1. If a firm shuts down its old C?@?< legacy system and starts up the new :eople$oft 0#: system
immediately9 this is called 44444"
a) phased conversion
b) direct conversion
c) parallel conversion
d) pilot conversion
!ns" b
#esponse" $ee page %1+
-&. !s systems age9 maintenance costs 44444"
a) decrease
b) increase
c) stay the same
d) remain negligible
e) are not considered
!ns" b
#esponse" $ee page %13
-%. Maintenance includes which of the following types of activities?
a) debugging
b) updating the system to accommodate changes in business conditions9 but not adding functionality
c) adding new functionality to the system
d) all of the above
!ns" d
#esponse" $ee page %13
--. .hich of the following systems ac2uisition methods helps clarify user re2uirements9 promotes genuine
user participation9 and may produce part of the final system?
a) systems development life cycle
b) prototyping
c) enduser development
d) e1ternal ac2uisition
e) componentbased development
!ns" b
#esponse" $ee page %13
-/. .hich of the following systems ac2uisition methods may encourage inade2uate problem analysis9 is not
practical with large numbers of users9 and may result in a system with lower 2uality.
a) systems development life cycle
b) prototyping
c) enduser development
d) e1ternal ac2uisition
e) componentbased development
!ns" b
#esponse" $ee page %13
-*. The 44444 approach to systems development defines an initial list of user re2uirements9 then develops
the system in an iterative fashion.
a) integrated computerassisted software engineering
b) )oint application design
c) rapid application development
d) prototyping
e) systems development life cycle
!ns" d
#esponse" $ee page %13
-+. The 44444 approach to systems development is a groupbased tool for collecting user re2uirements.
a) integrated computerassisted software engineering
b) )oint application design
c) rapid application development
d) prototyping
e) systems development life cycle
!ns" b
#esponse" $ee page %17
-3. The 44444 approach to systems development uses speciali'ed tools to automate many of the tas8s in the
systems development life cycle.
a) integrated computerassisted software engineering
b) )oint application design
c) rapid application development
d) prototyping
!ns" a
#esponse" $ee page %17
-7. .hich of the following is not an advantage of the Aoint !pplication Besign approach to systems
development?
a) involves fewer users in the development process
b) saves time
c) greater user acceptance of the new system
d) can produce a system of higher 2uality
!ns" a
#esponse" $ee page %17
/0. Computeraided software engineering tools provide which of the following advantages?
a) can produce systems with longer effective operational lives
b) can produce systems that more closely meet user re2uirements
c) can speed up the development process
d) can produce systems that are more adaptable to changing business conditions
e) all of the above
!ns" e
#esponse" $ee page %17
/1. .hich of the following is not an advantage of computeraided software engineering tools?
a) can produce systems with longer effective operational lives
b) can produce systems that more closely meet user re2uirements
c) can re2uire fewer developers
d) can speed up the development process
!ns" c
#esponse" $ee page %17
/&. Computeraided software engineering tools provide which of the following disadvantages?
a) produce initial systems that are more e1pensive to build and maintain
b) re2uire more e1tensive and accurate definition of user re2uirements
c) difficult to customi'e
d) difficult to use with e1isting systems
e) all of the above
!ns" e
#esponse" $ee page %17
/%. .hich of the following is not a disadvantage of computeraided software engineering tools?
a) produce initial systems that are more e1pensive to build and maintain
b) re2uire more e1tensive and accurate definition of user re2uirements
c) re2uire more developers
d) difficult to customi'e
!ns" c
#esponse" $ee page %17
/-. !dvantages of #apid !pplication Bevelopment include which of the following?
a) active involvement of users in the development process
b) faster development process
c) system better meets user needs
d) reduction in training costs
e) all of the above
!ns" e
#esponse" $ee page %&0
//. .hich of the following systems ac2uisition methods bypasses the IT department9 avoids delays9 and
results in increased user acceptance of the new system?
a) systems development life cycle
b) prototyping
c) enduser development
d) e1ternal ac2uisition
e) componentbased development
!ns" c
#esponse" $ee page %&0
/*. .hich of the following systems ac2uisition methods may eventually re2uire maintenance assistance
from the IT department9 produce inade2uate documentation9 and result in a system with inade2uate
interfaces to e1isting systems?
a) systems development life cycle
b) prototyping
c) enduser development
d) e1ternal ac2uisition
e) componentbased development
!ns" c
#esponse" $ee page %&0
/+. .hich of the following is the most difficult and crucial tas8 in evaluating a vendor and a software
pac8age?
a) identifying potential vendors
b) determining the evaluation criteria
c) evaluating vendors and pac8ages
d) choosing the vendor and pac8age
e) negotiating a contract
!ns" b
#esponse" $ee page %&/%&*
Chapter %
1. Carious organi'ations that promote fair and responsible use of information systems
often develop 44444"
a) a code of ethics
b) a strategic plan
c) a mission statement
d) responsibility charters
e) a goals outline
!ns" a
#esponse" $ee page *&
&. !44444 is intellectual wor8 that is 8nown only to a company and is not based on
public information.
a) copyright
b) patent
c) trade secret
d) 8nowledge base
e) private property
!ns" c
#esponse" $ee page *&
%. !44444 is a document that grants the holder e1clusive rights on an invention for 1+
years.
a) copyright
b) patent
c) trade secret
d) 8nowledge base
e) private property notice
!ns" b
#esponse" $ee page *&7
-. 44444 is a statutory grant that provides the creators of intellectual property with
ownership of it for &3 years.
a) copyright
b) patent
c) trade secret
d) 8nowledge base
e) private property
!ns" a
#esponse" $ee page *&
/. .hich of the following is not an ethical issue?
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
!ns" c
#esponse" $ee page *&
*. 44444 issues involve collecting9 storing and disseminating information about
individuals.
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
!ns" a
#esponse" $ee page *&
+. 44444 issues involve the authenticity and fidelity of information that is collected and
processed.
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
!ns" b
#esponse" $ee page *&
3. 44444 issues involve the ownership and value of information.
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
!ns" d
#esponse" $ee page *&
7. 44444 issues involve who may obtain information and how much they should pay for
this information.
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
!ns" e
#esponse" $ee page *&
10. .hich of the following factors are increasing the threats to information security?
a) smaller computing devices
b) cheaper computing devices
c) the Internet
d) increased computer literacy
e) all of the above
!ns" e
#esponse" $ee page *3
11. .hich of the following factors are not increasing the threats to information security?
a) smaller computing devices
b) cheaper computing devices
c) the Internet
d) decreased computer literacy
e) intranets
!ns" d
#esponse" $ee page *3
1&. ! 44444 is any danger to which an information resource may be e1posed.
a) vulnerability
b) ris8
c) control
d) threat
e) compromise
!ns" d
#esponse" $ee page *3
1%. !Dn) 44444 is the harm9 loss9 or damage that can result if an information resource is
compromised.
a) vulnerability
b) ris8
c) control
d) threat
e) e1posure
!ns" e
#esponse" $ee page *3
1-. !n information system,s 44444 is the possibility that the system will suffer harm by
a threat.
a) vulnerability
b) ris8
c) control
d) danger
e) compromise
!ns" a
#esponse" $ee page *3
1/. 0arth2ua8es9 floods9 power failures9 and fires are e1amples of which type of threat?
a) intentional
b) environmental
c) social engineering
d) disasters
e) none of the above
!ns" b
#esponse" $ee page +0
1*. Enintentional threats to information systems include all of the following e1cept"
a) malicious software
b) fire and flood
c) computer system failures
d) lac8 of user e1perience
d) all of the above
!ns" a
#esponse" $ee pages *7+0
1+. .hich of the following is not an unintentional threat to information systems?
a) human errors
b) viruses
c) environmental ha'ards
d) computer system failures
e) none of the above
!ns" b
#esponse" $ee page *7+0
13. .hich of the following is not an intentional threat to information systems?
a) environmental ha'ards
b) theft of data
c) deliberate manipulation in processing data
d) destruction from viruses and denial of service attac8s
e) none of the above
!ns" a
#esponse" $ee page *7+0
17. #an8 the following in terms of dollar value of the crime9 from highest to lowest.
a) robbery ( white collar crime ( cybercrime
b) white collar crime ( e1tortion ( robbery
c) cybercrime ( white collar crime ( robbery
d) cybercrime ( robbery ( white collar crime
e) white collar crime ( burglary ( robbery
!ns" c
#esponse" $ee page +0
&0. !n employee used his computer to steal 109000 credit card numbers from a credit
card company. =e is a44444"
a) hac8er
b) crac8er
c) )ac8er
d) trespasser
e) none of the above
!ns" b
#esponse" $ee page +0
&1. 44444 involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthori'ed access privileges.
a) crac8ing
b) hac8ing
c) spoofing
d) social engineering
e) spamming
!ns" d
#esponse" $ee page +0
&&. The fastest growing white collar crime is 44444 "
a) e1tortion
b) identity theft
c) insider trading
d) stoc8 fraud
e) software piracy
!ns" b
#esponse" $ee page +1
&%. 44444 are segments of computer code that attach to e1isting computer programs and
perform malicious acts.
a) viruses
b) worms
c) Tro)an horses
d) bac8 doors
e) alien software
!ns" a
#esponse" $ee page +&
&-. 44444 are destructive computer programs that replicate themselves without re2uiring
a host program.
a) viruses
b) worms
c) Tro)an horses
d) bac8 doors
e) alien software
!ns" b
#esponse" $ee page +%
&/. 44444 are software programs that hide in other computer programs and reveal their
designed behavior only when they are activated.
a) viruses
b) worms
c) Tro)an horses
d) bac8 doors
e) alien software
!ns" c
#esponse" $ee page +%
&*. 44444 are segments of computer code embedded within an organi'ation,s e1isting
computer programs9 that activate and perform a destructive action at a certain time or
date.
a) viruses
b) worms
c) Tro)an horses
d) bac8 doors
e) logic bomb
!ns" e
#esponse" $ee page +&
&+. 44444 is;are usually a password that allows an attac8er to bypass any security
procedures.
a) viruses
b) worms
c) Tro)an horses
d) bac8 doors
e) alien software
!ns" d
#esponse" $ee page +%
&3. In a44444 attac89 the attac8er sends so many information re2uests to a target that the
target cannot handle them all and may crash.
a) phishing
b) denialofservice
c) worm
d) bac8 door
e) Tro)an horse
!ns" b
#esponse" $ee page +%
&7. In a44444 attac89 a coordinated stream of re2uests is launched against a target system
from many compromised computers at the same time.
a) phishing
b) denialofservice
c) worm
d) bac8 door
e) distributed denialofservice
!ns" e
#esponse" $ee page +%
%0. 44444 is clandestine software that is installed on your :C through duplicitous
channels9 but is not very malicious.
a) pestware
b) virus
c) worm
d) bac8 door
e) logic bomb
!ns" a
#esponse" $ee page +-
%1. The vast ma)ority of pestware is 44444 "
a) spyware
b) spamware
c) adware
d) virus
e) worm
!ns" c
#esponse" $ee page +-
%&. !Dn) 44444 is an automated computer program that removes a particular software
pac8age entirely.
a) remover
b) uninstaller
c) cancellation program
d) eraser
e) worm
!ns" b
#esponse" $ee page +-
%%. 44444 is designed to help popup advertisements appear on your screen.
a) spyware
b) spamware
c) adware
d) virus
e) worm
!ns" c
#esponse" $ee page +-
%-. Feylogger programs are e1amples of 44444"
a) spyware
b) spamware
c) adware
d) virus
e) worm
!ns" a
#esponse" $ee page +-
%/. :assword capture programs are e1amples of 44444"
a) spyware
b) spamware
c) adware
d) virus
e) worm
!ns" a
#esponse" $ee page +-
%*. 44444 is designed to use your computer as a launch pad for sending unsolicited e
mail to other computers.
a) spyware
b) spamware
c) adware
d) virus
e) worm
!ns" b
#esponse" $ee page +-
%+. 44444 uses deception to fraudulently ac2uire sensitive personal information by
mas2uerading as an official email.
a) pharming
b) denialofservice
c) distributed denialofservice
d) phishing
e) brute force dictionary attac8
!ns" d
#esponse" $ee page +/
%3. In a 44444 attac89 the attac8er fraudulently ac2uires the Bomain Game for a
company,s .eb site9 so that when victims type in that company,s E#<9 they are directed
to the attac8er,s site.
a) pharming
b) denialofservice
c) distributed denialofservice
d) phishing
e) brute force dictionary attac8
!ns" a
#esponse" $ee page +/
%7. !Dn) 44444 is an intellectual wor8 that is a company secret and is not based on public
information.
a) patent
b) trade secret
c) copyright
d) insider information
e) none of the above
!ns" b
#esponse" $ee page +*
-0. !Dn) 44444 is a document that grants the holder e1clusive rights on an invention or
process for &0 years.
a) patent
b) trade secret
c) copyright
d) insider information
e) none of the above
!ns" a
#esponse" $ee page +*
-1. !Dn) 44444 is a statutory grant that provides the creators of intellectual property with
ownership of the property for the life of the creator plus +0 years.
a) patent
b) trade secret
c) copyright
d) insider information
e) none of the above
!ns" c
#esponse" $ee page +*
-&. 44444 is the process in which an organi'ation assesses the value of each asset being
protected9 estimates the probability that each asset might be compromised9 and compares
the probable costs of each being compromised with the costs of protecting it.
a) ris8 management
b) ris8 analysis
c) ris8 mitigation
d) ris8 acceptance
e) ris8 transference
!ns" b
#esponse" $ee page +3
-%. In 444449 the organi'ation ta8es concrete actions against ris8s.
a) ris8 management
b) ris8 analysis
c) ris8 mitigation
d) ris8 acceptance
e) ris8 transference
!ns" c
#esponse" $ee page +3
--. In 444449 the organi'ation continues operating without controls and plans to absorb
any damages that occur.
a) ris8 management
b) ris8 analysis
c) ris8 mitigation
d) ris8 acceptance
e) ris8 transference
!ns" d
#esponse" $ee page +3
-/. In 444449 the organi'ation implements controls that minimi'e the impact of a threat.
a) ris8 limitation
b) ris8 analysis
c) ris8 mitigation
d) ris8 acceptance
e) ris8 transference
!ns" a
#esponse" $ee page +3
-*. In 444449 the organi'ation purchases insurance as a means to compensate for any
loss.
a) ris8 management
b) ris8 analysis
c) ris8 mitigation
d) ris8 acceptance
e) ris8 transference
!ns" e
#esponse" $ee page +3
-+. 44444 prevent unauthori'ed individuals from gaining access to a company,s computer
facilities.
a) access controls
b) physical controls
c) data security controls
d) administrative controls
e) input controls
!ns" b
#esponse" $ee page +7
-3. 44444 restrict unauthori'ed individuals from using information resources and are
concerned with user identification.
a) access controls
b) physical controls
c) data security controls
d) administrative controls
e) input controls
!ns" a
#esponse" $ee page +7
-7. @iometrics are an e1ample of"
a) something the user is
b) something the user wants
c) something the user has
d) something the user 8nows
e) something the user does
!ns" a
#esponse" $ee page +7
/0. #etina scans and fingerprints are e1amples of"
a) something the user is
b) something the user wants
c) something the user has
d) something the user 8nows
e) something the user does
!ns" a
#esponse" $ee page +7
/1. IB cards9 smart cards9 and to8ens are e1amples of"
a) something the user is
b) something the user wants
c) something the user has
d) something the user 8nows
e) something the user does
!ns" c
#esponse" $ee page +7
/&. Coice and signature recognition are e1amples of"
a) something the user is
b) something the user wants
c) something the user has
d) something the user 8nows
e) something the user does
!ns" e
#esponse" $ee page +7
/%. :asswords and passphrases are e1amples of"
a) something the user is
b) something the user wants
c) something the user has
d) something the user 8nows
e) something the user does
!ns" d
#esponse" $ee page +7
/-. 44444 passwords will always overcome 44444 security.
a) strong9 strong
b) wea89 wea8
c) wea89 strong
d) strong9 wea8
e) none of the above
!ns" c
#esponse" $ee page +7
//. .hich of the following is not a characteristic of strong passwords?
a) should be difficult to guess
b) should contain special characters
c) should not be a recogni'able word
d) should not be a recogni'able string of numbers
e) should be shorter rather than longer
!ns" e
#esponse" $ee page 31
/*. @ob is using public 8ey encryption to send a message to Ted. @ob encrypts the
message with Ted,s 44444 8ey and Ted decrypts the message using his 44444 8ey.
a) public9 public
b) public9 private
c) private9 private9
d) private9 public
!ns" b
#esponse" $ee page 3%
/+. Information systems auditing consists of which of the following?
a) auditing around the computer
b) auditing through the computer
c) auditing with the computer
d) all of the above
!ns" d
#esponse" $ee page 3/
/3. .hich of the following is not a part of information systems auditing?
a) auditing around the computer
b) auditing through the computer
c) auditing with the computer
d) auditing without the computer
e) none of the above
!ns" d
#esponse" $ee page 3/
/7. 44444 means verifying processing by chec8ing for 8nown outputs using specific
inputs.
a) auditing around the computer
b) auditing through the computer
c) auditing with the computer
d) auditing without the computer
!ns" a
#esponse" $ee page %37
*0. 44444 means using a combination of client data9 auditor software9 and client and
auditor hardware.
a) auditing around the computer
b) auditing through the computer
c) auditing with the computer
d) auditing without the computer
!ns" c
#esponse" $ee page %37%71

You might also like