Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
What determines how applications integrate and relate to each other?
|
Application architecture
|
|
Which of the following is not one of the three components of an enterprise architecture?
|
Services architecture
|
|
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?
|
Enterprise architecture
|
|
What is interoperability?
|
The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
|
|
Business continuity planning is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption
|
True
|
|
What refers to how well a system can adapt to increased demands?
|
Scalability
|
|
What is recovery?
|
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
|
|
Which of the following is not a component of an application architecture?
|
Capacity planning
|
|
Which of the following is not a component of an application architecture?
|
Capacity planning
|
|
hich of the following is not a component of an information architecture?
|
Web services
|
|
What is failover?
|
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
|
|
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals?
|
Infrastructure Architecture
|
|
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
|
HOURLY
|
|
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
|
Disaster recovery plan
|
|
What is a backup?
|
An exact copy of a system's information
|
|
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
|
Hot site
|
|
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
|
Cold site
|
|
What is an open system?
|
A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
|
|
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
|
Capacity planning
|
|
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
|
True
|
|
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
|
spoofing
|
|
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
|
white-hat hackers
|
|
Which of the following is not one of the three primary information security areas?
|
detection and resistance
|
|
What identifies the rules required to maintain information security?
|
nformation security policies
|
|
What is the recommended way to implement information security lines of defense?
|
People first, technology second
|
|
What is a method for confirming users' identities?
|
Authentication
|
|
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
|
none of the above
|
|
Which of the following can be completed by encryption?
|
All of the above
|
|
Tokens are small electronic devices that change user passwords automatically
|
True
|
|
Which is a virus that opens a way into the network for future attacks?
|
Backdoor programs
|
|
Which act allows any person to examine government records unless it would cause an invasion of privacy?
|
Freedom of Information Act
|
|
What is one of the guidelines an organization can follow when creating an information privacy policy?
|
Notice and disclosure
|
|
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
|
True
|
|
What is the ideal type of decisions for people in an organization to make?
|
Legal and ethical
|
|
What is the policy that contains general principles to guide computer user behavior?
|
None of the above
|
|
What is the ideal type of decisions for people in an organization to make?
|
Legal and ethical
|
|
Which act restricts what information the federal government can collect?
|
Privacy Act
|
|
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
|
nonrepudiation
|
|
What is software that is manufactured to look like the real thing and sold as such?
|
Counterfeit software
|
|
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
|
ePolicies
|
|
What was the primary problem Saab encountered with one of its marketing companies?
|
Contacted customers regardless of their opt-out or opt-in decision
|
|
Which of the following is part of the acceptable use policy stipulations?
|
Not attempting to mail bomb a site
|
|
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
|
Privacy
|
|
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
|
Acceptable use policy
|
|
Which of the following represents the classic example of unintentional information reuse?
|
Social Security number
|
|
What are the rules that help ensure the quality of information?
|
Integrity constraints
|
|
Why do relational databases use primary keys and foreign keys?
|
To create logical relationships
|
|
What in the relational database model is a person, place, thing, transaction, or event about which information is stored?
|
Entity
|
|
What states that you may use copyrighted material in certain situations – for example, in the creation of new work or, within certain limits, for teaching purposes?
|
None of the above
|
|
Which act allows any person to examine government records unless it would cause an invasion of privacy?
|
Freedom of Information Act
|
|
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
|
Sarbanes-Oxley
|
|
Which policy contains general principles regarding information privacy?
|
Information privacy policy
|
|
Which of the following is correct in reference to a database?
|
A database can support many logical views
|
|
What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?
|
Data-driven website
|
|
What are the rules that enforce basic and fundamental information-based constraints?
|
Relational integrity constraint
|
|
What are the rules that help ensure the quality of information?
|
Integrity constraints
|
|
Which of the following database structures stores information in a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships?
|
Hierarchical database
|
|
In the relational database model, what are characteristics or properties of an entity?
|
Attribute
|
|
Which of the following database structures offers a flexible way of representing objects and their relationships?
|
network database
|
|
Which of the following uses a DBMS to interact with a database
|
all of the above
|
|
what type of website is best to build for a website with continually changing information including press releases, new product information, and updated pricing?
|
Data-driven website
|
|
Which of the following is incorrect in reference to a database?
|
Information is accessed by physical structure
|
|
What is the physical view of information?
|
Deals with the physical storage of information on a storage device such as a hard disk
|