100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM Exam 3 Questions and Answers Graded A+

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
07-10-2023
Written in
2023/2024

CISM Exam 3 Questions and Answers Graded A+ a business does not need network connectivity in order to maintain a strategic advantage. false a local area network connects two or more communicating devices in a limited geographic area. true twisted-pair wire is the least used form of communications wiring. false which of the following is not a component of a local network? bridge a(n) ______ connects two or more devices in a limited geographical area. local area network a ____ sends messages through several connected LANs or to a wide-area network. Router a _____ allows a device to physically connect to a local area network's communications medium. network interface card the function of ____ is to convert digital signals to analog signals and vice-versa. modems entering data and programs from user departments to the mainframe was called remote data entry. false server virtualization uses software-based partitions to create multiple virtual servers on a single physical server. true utility computing is also called on-demand computing. true The "cloud" in cloud computing is composed of computers, the software on those computers, and the network connections among those computers. true the four types of cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds. false server virtualization uses software to build multiple virtual servers on the same machine grid computing divides the processing of an application among servers utility computing is called on-demand computing the fairness approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties false improvements in information tech are leading to a decreasing number of ethical problems false the fundamental tenets of ethics include responsibility, accountability and liability true various organizations that promote fair and responsible use of information systems often develop a ____ code of ethics what is ____ is not necessarily ____ unethical, illegal ____ issues involve collecting, storing, and disseminating information about individuals privacy ___issues involved the authenticity and fidelity of information that is collected and processed accuracy ____ means accepting the consequences of your decisions and actions responsibility How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other freedom of speech, privacy You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security. false zero-day attacks use deceptive emails to acquire sensitive personal information false supervisory control and data acquisition systems require human data input. false You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a Post It note and put it on your laptop screen. This is an example of ________________. poor security the most overlooked people in information security are janitors and guards unintentional threats to info systems include all of the following except malicious software dumpster diving is ____ typically committed for the purpose of identity theft costs are harder to quantify than benefits false The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets true the buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs true open-source applications are basically the same as a proprietary application except for licensing, payment, and support. true with agile development, a company develops only what it needs right now to be successful true the information systems planning process processed in which order Organization mission - organization strategic plan - IS strategic plan - new IT architecture which of the following statements about determining the costs and benefits of IT are false benefits are hard to quantify because they are tangible Travis just started to work in the IS department for a mid-size firm. One of the first things he was asked to do was read the IS operational plan. Which of the following is Travis not likely to see in this IS operational plan? the organizational mission which of the following are disadvantages to the buy option for acquiring IS applications? all of above which of the following statements is false companies that purchase open source software cannot modify it Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She researched available accounting packages for a business like hers and has decided on Boutique Accounting. Boutique Accounting is offered from a SaaS vendor. Which of the following is true? Jennifer needs network access to the vendors location Only IS projects are constrained by the same factors known as the triple constraints of project management false The traditional approach to project management divides every project into four distinct phases. false PMBOK recognizes five basic process groups and nine knowledge areas that are typical of almost all projects. true The traditional approach to project management divides every project into phases. Which of the following is not one of the phases? redevelopment in this phase of project management every project objective and every activity associated with that objective must be identified and sequenced. planning Considering the knowledge areas of PMBOK, this area of knowledge includes concepts such as staffing decisions; team management; and organizational culture, style, and structure. project human resource management Considering the knowledge areas of PMBOK, this one defines the processes that limit and control the work included in a project. project scope management

Show more Read less
Institution
CISM - Certified Information Security Manager
Course
CISM - Certified Information Security Manager









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM - Certified Information Security Manager
Course
CISM - Certified Information Security Manager

Document information

Uploaded on
October 7, 2023
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1899
Member since
2 year
Number of followers
864
Documents
21000
Last sold
17 hours ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

434 reviews

5
234
4
78
3
60
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions