Transition and Support Practice Test Flashcards

1
Q

True or False: Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: The main objective of training is to show users how the system can help them perform their jobs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Maintenance expense stay consistently the same during the system’s operational life.

A

False. Maintenance expenses vary significantly during the system’s operational life and include spending to support maintenance activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:Software leases are not considered an operational cost.

A

False. Operational costs include items such as supplies, equipment rental, and software leases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: Acceptance means that nothing is done; companies usually accept a risk only when the protection clearly is not worth the expense.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Hard skills include communications, interpersonal, and perceptive abilities.

A

False. Soft skills include communications, interpersonal, and perceptive abilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: A system in its final stages requires corrective maintenance only to keep the system operational.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: A continuous backup only backs up files that are new or changed since the last full backup.

A

False. A differential backup only backs up files that are new or changed since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: An incremental backup only includes recent files that have never been backed up by any method.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Backup media can include tape, hard drives, optical storage, and online storage.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: When a user submits a maintenance request, the system administrator makes an initial determination.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

implementation
verification
security
testing

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.

user training package
user presence software
maintenance module
utility index

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.

help desk
white spot
maintenance software module
utility point

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ costs include expenses for items such as supplies and equipment rental.

operational
Corrective
Maintenance
Adaptive

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____ expenses vary significantly during a system’s operational life and include spending to support maintenance activities.

Secure
Maintenance
Principal
Capital

A

B

18
Q

Corrective maintenance _____.

adds enhancements to an operational system and makes the system easier to use

diagnoses and corrects errors in an operational system

involves changing an operational system to make it more efficient, reliable, or maintainable

competes for resources in an operational system

A

B

19
Q

Adaptive maintenance _____.

adds enhancements to an operational system and makes the system easier to use

diagnoses and corrects errors in an operational system

involves changing an operational system to make it more efficient, reliable, or maintainable

competes for resources in an operational system

A

A

20
Q

Perfective maintenance _____.

adds enhancements to an operational system and makes the system easier to use

diagnoses and corrects errors in an operational system

involves changing an operational system to make it more efficient, reliable, or maintainable

competes for resources in an operational system

A

C

21
Q

To avoid problems, preventive maintenance _____.

adds enhancements to an operational system and makes the system easier to use

diagnoses and corrects errors in an operational system

involves changing an operational system to make it more efficient, reliable, or maintainable

requires analysis of areas where trouble is likely to occur

A

D

22
Q

Many IT departments use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.

tester/programmer
strategist/analyst
programmer/analyst
designer/debugger

A

C

23
Q

A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
tester
programmer
system validator
system administrator

A

D

24
Q

_____ is the process of tracking system releases.
Configuration control
Version control
Source control
Quality control

A

B

25
Q

A _____ is a formal reference point that measures system characteristics at a specific time.
feature line
baseline
product point
viewport

A

B

26
Q

To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.

metric analysis
benchmark testing
threat analysis
allocation testing

A

B

27
Q

_____ is the overall time between a request for system activity and the delivery of the response.

Response time
Throughput time
Refresh rate
Base rate

A

A

28
Q

_____ measures the time between submitting a request for information and the fulfillment of the request.

Bandwidth
Turnaround time
Throughput
Frequency

A

B

29
Q

_____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.

Restructuring
Capacity planning
Resource sizing
Reorganizing

A

B

30
Q

_____ protects information from unauthorized disclosure and safeguards privacy.

Availability
Integrity
Confidentiality
Accessibility

A

C

31
Q

_____ prevents unauthorized users from creating, modifying, or deleting information.

Availability
Integrity
Confidentiality
Evacuation

A

B

32
Q

_____ ensures that authorized users have timely and reliable access to necessary information.

Availability
Integrity
Confidentiality
Concealability

A

A

33
Q

_____ analyzes an organization’s assets, threats, and vulnerabilities.

Risk uncertainty
Risk diversification
Risk identification
Risk control

A

C

34
Q

_____ measures risk likelihood and impact.

Risk assessment
Risk marking
Risk identification
Risk control

A

A

35
Q

A _____ is an internal or external entity that could endanger an asset.

proxy
facade
firewall
threat

A

D

36
Q

A _____ is a security weakness or soft spot.

proxy
vulnerability
firewall
malware

A

B

37
Q

A(n) _____ is an attack that takes advantage of a vulnerability.

proxy
exploit
firewall
archive

A

B

38
Q

_____, a risk control strategy, eliminates risks by adding protective safeguards.

Avoidance
Acceptance
Conveyance
Transference

A

A

39
Q

George’s firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George’s responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.

One of his firm’s clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident?

Vandalism
Trespass and espionage
Extortion
Software attack

A

C

40
Q

George’s firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George’s responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.

Another of George’s clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat?

Human error
Technical obsolescence
Service failure
Espionage

A

B