Part Four Flashcards
________ concerns whether the new system fits within the organization’s customs, culture, charter, or legal requirements.
Question content area bottom
Part 1
A.
Cost feasibility
B.
Organizational feasibility
C.
Schedule feasibility
D.
Technical feasibility
E.
Business feasibility
B
Most jobs in the ICT industry require a mix of ________ and technical skills.
A.
legal
B.
programming
C.
interpersonal
D.
financial
E.
selling
C
_____________________ resides in the background and without the user’s knowledge, observes the user’s actions and keystrokes, monitors computer activity and reports that activity to sponsoring organizations.
A.
Adware
B.
Spyware
C.
Spam
D.
SpyKey
E.
DOS
B
________ include not only the normal actions that users will take, but also incorrect actions.
Question content area bottom
Part 1
A.
Test plans
B.
Contingency plans
C.
Implementation plans
D.
Test scripts
E.
Use cases
A
Senior management in organizations must address two critical security functions: ________ and ________.
Question content area bottom
Part 1
A.
security management, risk policy
B.
security management, risk aversion
C.
security policy, risk policy
D.
security controls, risk management
E.
security policy, risk management
E
The primary functions of an organization’s IS department include all of the following except:
Question content area bottom
Part 1
A.
develop, operate, and maintain applications
B.
eliminate all uses of outsourcing
C.
plan the use of IS to accomplish goals and strategies
D.
protect information assets
E.
develop, operate, and maintain the computing infrastructure
B
All the following statements regarding integrating software into the information system are true, except:
A.
An organization will always face the cost of integrating the software with its current hardware, data, and procedures.
B.
If it is open source software, there are no integrating costs.
C.
Organizations that understand the costs of integrating before they acquire software applications are more likely to be successful with the integrating process.
D.
The cost of integrating can exceed the cost of the software itself.
E.
The software should be integrated with all components of the information system.
B
Unfortunately, it is sometimes necessary to sever relations with an employee. When this is necessary, there are security concerns due to the possibility the employee may become angry and wish to do malicious harm via organizational information systems. The safeguards that need to be put into place for this situation are referred to as ________ policies and procedures.
Question content area bottom
Part 1
A.
position definitions
B.
hiring and screening
C.
termination
D.
dissemination and enforcement
E.
account management
C
The phase of the SDLC in which errors are fixed and changes are made to adapt the system to the changing business needs is ________.
Question content area bottom
Part 1
A.
maintain system
B.
requirements definition
C.
functional definition
D.
design components
E.
system definition
A
All the following statements regarding information systems ethics are true, except:
A.
If the choice is not illegal, we can use technological innovation to guide our choice.
This is the correct answer.B.
We face choices in situations, and these choices should be guided by principles.
C.
We should understand the way we think and act in situations in which our choices affect others while using the IS.
D.
If we could put ethics into rule-based behavior, computers could control ethics.
E.
Information system ethics is about understanding our own behaviour towards people who might be affected by our actions.
A
Typically, IS personnel prioritize system problems according to their severity. They fix ________ items as soon as possible, and they fix ________ items as time and resources become available.
Question content area bottom
Part 1
A.
financial; personnel
B.
high-priority; low-priority
C.
management’s; employee
D.
customers’; internal
E.
low priority; high priority
C
Question content area
Part 1
A comprehensive list of potential risks inherent in IT projects (__________ in total) is provided in an article by Wallace and Keil.
A.
52
B.
17
C.
5
D.
10
E.
60
A
Question content area
Part 1
Under Bill 198, both management and the ________ face criminal liability if internal controls are defective.
A.
president
B.
designer
C.
planner
D.
employees
E.
external auditor
E
A team creating procedures to be followed in the event of a major service disruption is producing __________ procedures.
Question content area bottom
Part 1
A.
failure recovery
B.
backup
C.
normal
D.
quality
E.
people
A
Which is the single most important safeguard that an individual computer user can implement?
Question content area bottom
Part 1
A.
Updating anti-virus software
B.
Removing high-value data assets from the computer
C.
Clearing cookies and browser history
D.
Using strong passwords
E.
Using HTTP at trusted vendor sites
D