• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back
What determines how applications integrate and relate to each other?
Application architecture
Which of the following is not one of the three components of an enterprise architecture?
Services architecture
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?
Enterprise architecture
What is interoperability?
The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
Business continuity planning is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption
True
What refers to how well a system can adapt to increased demands?
Scalability
What is recovery?
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
Which of the following is not a component of an application architecture?
Capacity planning
Which of the following is not a component of an application architecture?
Capacity planning
hich of the following is not a component of an information architecture?
Web services
What is failover?
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals?
Infrastructure Architecture
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
HOURLY
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Disaster recovery plan
What is a backup?
An exact copy of a system's information
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
Hot site
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
Cold site
What is an open system?
A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
Capacity planning
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
True
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
spoofing
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
white-hat hackers
Which of the following is not one of the three primary information security areas?
detection and resistance
What identifies the rules required to maintain information security?
nformation security policies
What is the recommended way to implement information security lines of defense?
People first, technology second
What is a method for confirming users' identities?
Authentication
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
none of the above
Which of the following can be completed by encryption?
All of the above
Tokens are small electronic devices that change user passwords automatically
True
Which is a virus that opens a way into the network for future attacks?
Backdoor programs
Which act allows any person to examine government records unless it would cause an invasion of privacy?
Freedom of Information Act
What is one of the guidelines an organization can follow when creating an information privacy policy?
Notice and disclosure
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
True
What is the ideal type of decisions for people in an organization to make?
Legal and ethical
What is the policy that contains general principles to guide computer user behavior?
None of the above
What is the ideal type of decisions for people in an organization to make?
Legal and ethical
Which act restricts what information the federal government can collect?
Privacy Act
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
nonrepudiation
What is software that is manufactured to look like the real thing and sold as such?
Counterfeit software
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
ePolicies
What was the primary problem Saab encountered with one of its marketing companies?
Contacted customers regardless of their opt-out or opt-in decision
Which of the following is part of the acceptable use policy stipulations?
Not attempting to mail bomb a site
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
Privacy
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
Acceptable use policy
Which of the following represents the classic example of unintentional information reuse?
Social Security number
What are the rules that help ensure the quality of information?
Integrity constraints
Why do relational databases use primary keys and foreign keys?
To create logical relationships
What in the relational database model is a person, place, thing, transaction, or event about which information is stored?
Entity
What states that you may use copyrighted material in certain situations – for example, in the creation of new work or, within certain limits, for teaching purposes?
None of the above
Which act allows any person to examine government records unless it would cause an invasion of privacy?
Freedom of Information Act
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
Sarbanes-Oxley
Which policy contains general principles regarding information privacy?
Information privacy policy
Which of the following is correct in reference to a database?
A database can support many logical views
What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?
Data-driven website
What are the rules that enforce basic and fundamental information-based constraints?
Relational integrity constraint
What are the rules that help ensure the quality of information?
Integrity constraints
Which of the following database structures stores information in a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships?
Hierarchical database
In the relational database model, what are characteristics or properties of an entity?
Attribute
Which of the following database structures offers a flexible way of representing objects and their relationships?
network database
Which of the following uses a DBMS to interact with a database
all of the above
what type of website is best to build for a website with continually changing information including press releases, new product information, and updated pricing?
Data-driven website
Which of the following is incorrect in reference to a database?
Information is accessed by physical structure
What is the physical view of information?
Deals with the physical storage of information on a storage device such as a hard disk