CISM Exam 3 Questions and Answers Graded A+
CISM Exam 3 Questions and Answers Graded A+ a business does not need network connectivity in order to maintain a strategic advantage. false a local area network connects two or more communicating devices in a limited geographic area. true twisted-pair wire is the least used form of communications wiring. false which of the following is not a component of a local network? bridge a(n) ______ connects two or more devices in a limited geographical area. local area network a ____ sends messages through several connected LANs or to a wide-area network. Router a _____ allows a device to physically connect to a local area network's communications medium. network interface card the function of ____ is to convert digital signals to analog signals and vice-versa. modems entering data and programs from user departments to the mainframe was called remote data entry. false server virtualization uses software-based partitions to create multiple virtual servers on a single physical server. true utility computing is also called on-demand computing. true The "cloud" in cloud computing is composed of computers, the software on those computers, and the network connections among those computers. true the four types of cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds. false server virtualization uses software to build multiple virtual servers on the same machine grid computing divides the processing of an application among servers utility computing is called on-demand computing the fairness approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties false improvements in information tech are leading to a decreasing number of ethical problems false the fundamental tenets of ethics include responsibility, accountability and liability true various organizations that promote fair and responsible use of information systems often develop a ____ code of ethics what is ____ is not necessarily ____ unethical, illegal ____ issues involve collecting, storing, and disseminating information about individuals privacy ___issues involved the authenticity and fidelity of information that is collected and processed accuracy ____ means accepting the consequences of your decisions and actions responsibility How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other freedom of speech, privacy You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security. false zero-day attacks use deceptive emails to acquire sensitive personal information false supervisory control and data acquisition systems require human data input. false You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a Post It note and put it on your laptop screen. This is an example of ________________. poor security the most overlooked people in information security are janitors and guards unintentional threats to info systems include all of the following except malicious software dumpster diving is ____ typically committed for the purpose of identity theft costs are harder to quantify than benefits false The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets true the buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs true open-source applications are basically the same as a proprietary application except for licensing, payment, and support. true with agile development, a company develops only what it needs right now to be successful true the information systems planning process processed in which order Organization mission - organization strategic plan - IS strategic plan - new IT architecture which of the following statements about determining the costs and benefits of IT are false benefits are hard to quantify because they are tangible Travis just started to work in the IS department for a mid-size firm. One of the first things he was asked to do was read the IS operational plan. Which of the following is Travis not likely to see in this IS operational plan? the organizational mission which of the following are disadvantages to the buy option for acquiring IS applications? all of above which of the following statements is false companies that purchase open source software cannot modify it Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She researched available accounting packages for a business like hers and has decided on Boutique Accounting. Boutique Accounting is offered from a SaaS vendor. Which of the following is true? Jennifer needs network access to the vendors location Only IS projects are constrained by the same factors known as the triple constraints of project management false The traditional approach to project management divides every project into four distinct phases. false PMBOK recognizes five basic process groups and nine knowledge areas that are typical of almost all projects. true The traditional approach to project management divides every project into phases. Which of the following is not one of the phases? redevelopment in this phase of project management every project objective and every activity associated with that objective must be identified and sequenced. planning Considering the knowledge areas of PMBOK, this area of knowledge includes concepts such as staffing decisions; team management; and organizational culture, style, and structure. project human resource management Considering the knowledge areas of PMBOK, this one defines the processes that limit and control the work included in a project. project scope management
Escuela, estudio y materia
- Institución
- CISM - Certified Information Security Manager
- Grado
- CISM - Certified Information Security Manager
Información del documento
- Subido en
- 7 de octubre de 2023
- Número de páginas
- 8
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
cism exam 3 questions and answers graded a
Documento también disponible en un lote