Organizations use processes, procedures, and differentiation strategies to introduce new
systems into the workplace in a manner that lowers stress, encourages teamwork, and increases
the probability of a successful implementation.
A. True
B. False - AnswersFalse
Which of the following is NOT one of the four main components in Leavitt's Diamond?
A. People
B. Systems
C. Processes
D. Technology Infrastructure - AnswersSystems
Why would Claire, who has a Certified Information Systems Security Professional credential,
object to shadow IT efforts at her company?
A. Issues can arise over the responsibility to fix shadow IT solutions when they break
B. Shadow IT provides the opportunity to evaluate and test many more information system
initiatives.
C. Shadow IT systems and processes may lack necessary levels of security required to meet
compliance standards.
D. Shadow IT delays testing of quick solutions to business needs. - AnswersShadow IT systems
and processes may lack necessary levels of security required to meet compliance standards.
Clive completes specific coursework provided by a vendor to help him prepare to take an
examination so that he can obtain _____.
A. Retirement benefits
B. enterprise IS access
C. a shadow IT position
,D. a certification - Answersa certification
Even legitimate organizations sometimes use worms, unsolicited email messages sent to large
numbers of people, to promote their products.
A. True
B. False - AnswersFalse
What is an attack vector?
A. a person who attacks a computer system or network for financial gain
B. the technique used to gain unauthorized access to a device or a network
C. a large group of computers controlled from one or more remote locations by hackers
D. a vulnerable communications protocol or system - Answersthe technique used to gain
unauthorized access to a device or a network
Many organizations outsource their network security operations to a(n) _____.
A. VPN
B. HIPAA
C. MSSP
D. CSFA - AnswersMSSP
Samantha owns a small business that handles a lot of sensitive customer data and would be
devastated by a data breach. Her IS department, which consists of one part-time consultant
named Nikki, is overwhelmed by the number of alerts and false alarms constantly issued by her
security-monitoring systems, and expresses concerns about their data security. What should
Samantha do about this?
A. consider a managed security service provider
B. ask Nikki to disable the alerts and alarms
C. research different security software options
,D. change her passwords more often - Answersconsider a managed security service provider
Anonymous remailers both help protect freedom of speech by keeping communications
anonymous and prevent people from using email for illegal or unethical purposes.
A. True
B. False - AnswersFalse
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying
to decide what to do about it. He knows he could keep quiet about it, but that would violate his
moral values, plus the school's code of ethics requires students to report incidents of cheating.
On the other hand, if he reports the incident, both his friend and probably all of their other
friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
A. gathering information
B. developing a problem statement
C. identifying alternatives
D. choosing an alternative - Answerschoosing an alternative
The process of building software for safety-critical systems _____.
A. is less expensive than that for high-quality systems
B. is just as expensive as that for high-quality systems
C. takes much longer than that for high-quality systems
D. takes much less time than that for high-quality systems - Answerstakes much longer than that
for high-quality systems
One example of a common and significant ethical dilemma related to safety-critical systems is
deciding _____.
A. how much software testing is sufficient
B. how much skill users can be assumed to have
, C. how much documentation is necessary
D. how many software engineers are needed - Answershow much software testing is sufficient
Primary memory, which holds program instructions and data, is not associated with the central
processing unit (CPU).
A. True
B. False - AnswersFalse
Marley's computer has a math chip to perform mathematical calculations and a graphics chip to
manipulate graphics while the CPU is busy with other activities.What processing approach is she
using?
A. grid computing with a central server
B. Fa massively parallel processing system
C. parallel processing using coprocessors
D. multiprocessing using coprocessors - Answersmultiprocessing using coprocessors
Monte's employer provides SaaS applications for its staff to use for their daily job functions. This
means that ____.
A. Monte is responsible for downloading and installing software patches
B. Monte and his coworkers are all using free, open-source software
C. Monte does not have a user name or password to remember or secure
D. Monte can sign in to use these applications from any computer or device - AnswersMonte
can sign in to use these applications from any computer or device
Julian has chosen to use open-source software to help run his small business. He believes it is
often more reliable and secure than commercial software because _____.
A. commercial software is poorly supported after purchase
B. more indirect costs are associated with commercial software use