42 terms

Quiz 12

STUDY
PLAY

Terms in this set (...)

According to your Chapter 12 Video, your professor considers one of the top concepts that you have learned throughout this class is to ____.
critically think
According to your Chapter 12 Video, your professor states that ____.
everyone should, at one time in their technology career, work at a help desk
Risk ____ develops safeguards that reduce risks and their impact.
control
____ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.
Turnaround time
The ____ describes the system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
product baseline
____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
Maintenance
____ involves studying the parts to understand the overall system.
Synthesis
If significant changes take place in an existing system or if a new version is released, the IT department might develop a ____.
user training package
Which of the following is not an advantage of the release methodology?
new features or upgrades are available more often
In most organizations, ____ IT department effort goes into supporting existing systems and making them more valuable to users.
more than half of all
____ means that in risk control, nothing is done.
Acceptance
Risk ____ measures risk likelihood and impact.
assessment
In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.
1.1
Perfective maintenance usually is cost effective ____ the system's operational life.
during the middle of
____ include the volume of online data, the number of records accessed, and the number of transactions processed in a given time period.
Metrics
____ ensures that authorized users have timely and reliable access to necessary information.
Availability
As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance.
adaptive
The ____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
system administrator
To measure system performance, companies use ____ testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.
benchmark
____ describes the amount of data that a system can transfer in a fixed time period.
Bandwidth
Risk ____ analyzes the organization's assets, threats, and vulnerabilities.
identification
Bandwidth will not be measured in which of the following units?
Dbps (decibits per second)
Once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance.
adaptive
Adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases ____.
when it becomes clear that the company plans to replace the system
____ costs include expenses for items such as supplies, equipment rental, and software leases.
Operational
____ involves changing an operational system to make it more efficient, reliable, or maintainable
Perfective maintenance
____ shifts the risk to another asset or party, such as an insurance company, in risk control.
Transference
____ means examining the whole in order to learn about the individual elements.
Analysis
____ adds enhancements to an operational system and makes the system easier to use
Adaptive maintenance
When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.
maintenance and new development require similar IT department resources
A ____ is a formal reference point that measures system characteristics at a specific time.
baseline
A ____ is an internal or external entity that could endanger an asset.
threat
The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
functional baseline
Preset ____ determine whether a firewall will allow network traffic to pass.
rules
A(n) ____ is an unauthorized attempt to increase permission levels.
privilege escalation attack
When planning capacity, detailed information is needed about ____.
the number of threats and critical risks posed to a system
Indications that a system has reached the end of its economically useful life include ____.
operational costs and execution times are decreasing rapidly
____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.
Maintenance
____ protects information from unauthorized disclosure and safeguards privacy.
Confidentiality
____ is a process for controlling changes in system requirements during software development.
CM
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
allocated baseline
____ prevents unauthorized users from creating, modifying, or deleting information.
Integrity