Part Four Flashcards

1
Q

________ concerns whether the new system fits within the​ organization’s customs,​ culture, charter, or legal requirements.
Question content area bottom
Part 1
A.
Cost feasibility
B.
Organizational feasibility
C.
Schedule feasibility
D.
Technical feasibility
E.
Business feasibility

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most jobs in the ICT industry require a mix of​ ________ and technical skills.
A.
legal
B.
programming
C.
interpersonal
D.
financial
E.
selling

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

​_____________________ resides in the background and without the​ user’s knowledge, observes the​ user’s actions and​ keystrokes, monitors computer activity and reports that activity to sponsoring organizations.
A.
Adware
B.
Spyware
C.
Spam
D.
SpyKey
E.
DOS

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

​________ include not only the normal actions that users will​ take, but also incorrect actions.
Question content area bottom
Part 1
A.
Test plans
B.
Contingency plans
C.
Implementation plans
D.
Test scripts
E.
Use cases

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Senior management in organizations must address two critical security​ functions: ________ and​ ________.
Question content area bottom
Part 1
A.
security​ management, risk policy
B.
security​ management, risk aversion
C.
security​ policy, risk policy
D.
security​ controls, risk management
E.
security​ policy, risk management

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The primary functions of an​ organization’s IS department include all of the following​ except:
Question content area bottom
Part 1
A.
​develop, operate, and maintain applications
B.
eliminate all uses of outsourcing
C.
plan the use of IS to accomplish goals and strategies
D.
protect information assets
E.
​develop, operate, and maintain the computing infrastructure

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

All the following statements regarding integrating software into the information system are​ true, except:
A.
An organization will always face the cost of integrating the software with its current​ hardware, data, and procedures.
B.
If it is open source​ software, there are no integrating costs.
C.
Organizations that understand the costs of integrating before they acquire software applications are more likely to be successful with the integrating process.
D.
The cost of integrating can exceed the cost of the software itself.
E.
The software should be integrated with all components of the information system.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

​Unfortunately, it is sometimes necessary to sever relations with an employee. When this is​ necessary, there are security concerns due to the possibility the employee may become angry and wish to do malicious harm via organizational information systems. The safeguards that need to be put into place for this situation are referred to as​ ________ policies and procedures.
Question content area bottom
Part 1
A.
position definitions
B.
hiring and screening
C.
termination
D.
dissemination and enforcement
E.
account management

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The phase of the SDLC in which errors are fixed and changes are made to adapt the system to the changing business needs is​ ________.
Question content area bottom
Part 1
A.
maintain system
B.
requirements definition
C.
functional definition
D.
design components
E.
system definition

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All the following statements regarding information systems ethics are​ true, except:
A.
If the choice is not​ illegal, we can use technological innovation to guide our choice.
This is the correct answer.B.
We face choices in​ situations, and these choices should be guided by principles.
C.
We should understand the way we think and act in situations in which our choices affect others while using the IS.
D.
If we could put ethics into​ rule-based behavior, computers could control ethics.
E.
Information system ethics is about understanding our own behaviour towards people who might be affected by our actions.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

​Typically, IS personnel prioritize system problems according to their severity. They fix​ ________ items as soon as​ possible, and they fix​ ________ items as time and resources become available.
Question content area bottom
Part 1
A.
​financial; personnel
B.
​high-priority; low-priority
C.
​management’s; employee
D.
​customers’; internal
E.
low​ priority; high priority

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question content area
Part 1
A comprehensive list of potential risks inherent in IT projects​ (__________ in​ total) is provided in an article by Wallace and Keil.
A.
52
B.
17
C.
5
D.
10
E.
60

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question content area
Part 1
Under Bill​ 198, both management and the​ ________ face criminal liability if internal controls are defective.
A.
president
B.
designer
C.
planner
D.
employees
E.
external auditor

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A team creating procedures to be followed in the event of a major service disruption is producing​ __________ procedures.
Question content area bottom
Part 1
A.
failure recovery
B.
backup
C.
normal
D.
quality
E.
people

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is the single most important safeguard that an individual computer user can​ implement?
Question content area bottom
Part 1
A.
Updating​ anti-virus software
B.
Removing​ high-value data assets from the computer
C.
Clearing cookies and browser history
D.
Using strong passwords
E.
Using HTTP at trusted vendor sites

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question content area
Part 1
The Zachman framework divides systems into two​ dimensions: one is based on reasons for communication and the other is based on​ _____________.
A.
aligning systems
B.
stakeholder groups
C.
IT architecture
D.
business events
E.
enterprise architecture

A

B

17
Q

In​ Canada, ____________ has an agreement with ISACA that recognizes the Certified Information Systems Auditor​ (CISA) designation that leads to recognition as a​ CA-designated specialist in information systems​ audit, control, and security.
A.
CMA
B.
CASB
C.
CSA
D.
CICA
E.
CPA

A

D

18
Q

All of the following are data safeguards EXCEPT which​ one?
Question content area bottom
Part 1
A.
Help desk
B.
Backup and recovery procedures
C.
Physical security
D.
Data encryption
E.
Authentication with passwords

A

A

19
Q

When a criminal pretends to be someone they are​ not, the criminal is said to be​ what?
Question content area bottom
Part 1
A.
Texting
B.
Spoofing
C.
Phishing
D.
Sniffing
E.
Hacking

A

B

20
Q

The tasks of the systems definition phase include all of the following​ except:
Question content area bottom
Part 1
A.
define goals and scope
B.
plan project
C.
form project team
D.
assess feasibility
E.
select hardware

A

E