9. When setting priorities, many IT managers believe that evaluating all project
ID: 452007 • Letter: 9
Question
9. When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.
a. maintenance and new development require similar IT department resources
b. in IT departments organized into separate maintenance and development groups, it makes no sense to evaluate requests separately
c. maintenance is more likely to receive a proportional share of IT department resources
d. all of the above
10. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.
a. 1.0 c. 2.0 b. 1.1 d. 2.1
11.The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
a. functional baseline
c. allocated baseline
b. operational baseline
d. product baseline
12.The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
a. functional baseline
c. allocated baseline
b. operational baseline
d. product baseline
13. The ____ describes the system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
a. functional baseline
c. allocated baseline
b. operational baseline
d. product baseline
14. To measure system performance, companies use ____ testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.
a. metric
c. threat
b. benchmark
d. allocation
15.____ include the volume of online data, the number of records accessed, and the number of transactions processed in a given time period.
a. Metrics
c. Allocations
b. Risk assessments
d. Baselines ____ describes the amount of data that a system can transfer in a fixed time period.
a. Throughput
c. Dimensionality
b. Resolution
d. Bandwidth
17. ____ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.
a. Bandwidth
c. Throughput
b. Turnaround time
d. Response time
18.____ protects information from unauthorized disclosure and safeguards privacy.
a. Availability
c. Confidentiality
b. Integrity
d. Risk management
19.____ prevents unauthorized users from creating, modifying, or deleting information.
a. Availability
c. Confidentiality
b. Integrity
d. Risk management
20. ____ ensures that authorized users have timely and reliable access to necessary information.
a. Availability
c. Confidentiality
b. Integrity
d. Risk management
21. Risk ____ analyzes the organization's assets, threats, and vulnerabilities.
a. assessment
c. identification
b. management
d. control
22. Risk ____ measures risk likelihood and impact.
a. assessment
c. identification
b. management
d. control
23. ____ means that in risk control, nothing is done.
a. Acceptance
c. Mitigation
b. Avoidance
d. Transference
24. ____ shifts the risk to another asset or party, such as an insurance company, in risk control.
a. Acceptance
c. Mitigation
b. Avoidance
d. Transference
25.Preset ____ determine whether a firewall will allow network traffic to pass.
a. adaptations
c. port scans
b. rules
d. super-users
Explanation / Answer
Answers:
9. a. maintenance and new development require similar IT department resources
10. b. 1.1
11. a. functional baseline
12. c. allocated baseline
13. b. operational baseline
14. b. benchmark
15 a. Metrics
16. d. Bandwidth
17. d. Response time
18. c. Confidentiality
19. b. Integrity
20. a. Availability
21. c. identification
22. a. assessment
23. a. Acceptance
24. d. Transference
25. b. rules
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.