100% Solved
All of the costs associated with the design, development, testing, implementation,
documentation, training and maintenance of a software system are collectively termed as:
A. total cost of ownership.
B. economies of scale.
C. capitalizable costs.
D. aggregate investment.
E. hurdle rate. Correct Ans-A. total cost of ownership.
Which of the following refers to a variant of utility computing where vendors provide the
operating system and supporting software like database management systems but where client
firms write their own code?
A. Software as a service
B. Open Source
C. Platform as a service
D. Cloudbursting
E. Infrastructure as a service Correct Ans-C. Platform as a service
Which of the following is/are characteristic(s) of using a software as a service?
A. Visibility and customization of code
B. Scalable
C. More expensive than hosting your own software
D. Lessened reliance on internet service providers
E. All of these are characteristics of using SaaS Correct Ans-B. Scalable
,_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and
simply deliver an image of what's executing to a PC or other connected device.
A. Hybrid clouds
B. Cloudbursting
C. Virtualization
D. Server farms
E. Utility computing Correct Ans-C. Virtualization
Based on the Chapter 15 lecture, videos and discussions, which of the following is/are true of
the Apache Log4j incident?
A. It largely targeted individual PC users instead of companies
B. It took several months for developers to create a patch to fix the vulnerability
C. It resulted from a flaw in the code of a logging utility for an open source web application
D. All of these are true
E. None of these are true Correct Ans-C. It resulted from a flaw in the code of a logging
utility for an open source web application
Based on the Cybersecurity lecture, which three principles should be at the heart of every
cybersecurity program?
A. Documentation, Testing, Approval
B. Confidentiality, Integrity, Availability
C. Security, Change Management and Operations
D. Hardware, Software, People
E. Mission Statement, Strategy, Protocol Correct Ans-B. Confidentiality, Integrity, Availability
Based on the Cybersecurity lecture, which of the following attacks can be successful without
using sophisticated technology?
A. DNS spoofing
B. Ransomware
,C. Social Engineering
D. Man in the Middle
E. Denial of Service Correct Ans-C. Social Engineering
Based on the Cybersecurity lecture, which defense technique involves dividing a network into
several smaller and independently secured sub-networks?
A. Defense in depth
B. Hardening
C. Whitelisting
D. Segmentation
E. Layering Correct Ans-D. Segmentation
Based on the Cybersecurity lecture, which of the following was NOT mentioned as a common
cyber defense/countermeasure?
A. Anomalous activity scanning
B. Cloud backup/storage of data and systems
C. Pen Testing
D. Patching
E. All of these were mentioned as common cybersecurity defenses Correct Ans-E. All of
these were mentioned as common cybersecurity defenses
Based on the Cybersecurity lecture, which of the following is NOT a potential cyber threat
actor?
A. National governments
B. Hacktivists
C. Disgruntled employees
D. Drug cartels
E. All of these are potential cyber threat actors Correct Ans-E. All of these are potential cyber
threat actors
, In two decades, the nation of ________ tech sector has grown from "almost nothing" to a $200
billion industry, expanding even during the recent global recession
A. Brazil
B. South Korea
C. Nigeria
D. India
E. None of these Correct Ans-D. India
Based on the Chapter 1 video and class discussion on Artificial Intelligence, what concern(s)
was/were mentioned with respect to using AI to create jobs and recruit candidates?
A. Candidate data privacy
B. Deterioration in entry-level job quality/pay
C. Bias in the application-screening algorithms
D. Both a and b
E. All of these were cited as concerns Correct Ans-E. All of these were cited as concerns
________________ is/are helping to fuel the current age of fast-growth technology
entrepreneurship. This technology means that a startup can rent the computing resources one
previously had to buy at great expense
A. Crowdsourcing
B. Cloud computing
C. The Internet of Things
D. App Stores
E. Consignment Correct Ans-B. Cloud computing
The rise of open source software has lowered computing costs for startup and blue chip
companies worldwide
A. True