100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Management 3300 Exam 1-3 Solutions 100% Solved

Rating
-
Sold
-
Pages
43
Grade
A+
Uploaded on
11-02-2025
Written in
2024/2025

Management 3300 Exam 1-3 Solutions 100% Solved

Institution
Management 3300
Course
Management 3300











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Management 3300
Course
Management 3300

Document information

Uploaded on
February 11, 2025
Number of pages
43
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Management 3300 Exam 1-3 Solutions
100% Solved
All of the costs associated with the design, development, testing, implementation,
documentation, training and maintenance of a software system are collectively termed as:
A. total cost of ownership.
B. economies of scale.
C. capitalizable costs.
D. aggregate investment.

E. hurdle rate. Correct Ans-A. total cost of ownership.


Which of the following refers to a variant of utility computing where vendors provide the
operating system and supporting software like database management systems but where client
firms write their own code?
A. Software as a service
B. Open Source
C. Platform as a service
D. Cloudbursting

E. Infrastructure as a service Correct Ans-C. Platform as a service


Which of the following is/are characteristic(s) of using a software as a service?
A. Visibility and customization of code
B. Scalable
C. More expensive than hosting your own software
D. Lessened reliance on internet service providers

E. All of these are characteristics of using SaaS Correct Ans-B. Scalable

,_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and
simply deliver an image of what's executing to a PC or other connected device.
A. Hybrid clouds
B. Cloudbursting
C. Virtualization
D. Server farms

E. Utility computing Correct Ans-C. Virtualization


Based on the Chapter 15 lecture, videos and discussions, which of the following is/are true of
the Apache Log4j incident?
A. It largely targeted individual PC users instead of companies
B. It took several months for developers to create a patch to fix the vulnerability
C. It resulted from a flaw in the code of a logging utility for an open source web application
D. All of these are true

E. None of these are true Correct Ans-C. It resulted from a flaw in the code of a logging
utility for an open source web application


Based on the Cybersecurity lecture, which three principles should be at the heart of every
cybersecurity program?
A. Documentation, Testing, Approval
B. Confidentiality, Integrity, Availability
C. Security, Change Management and Operations
D. Hardware, Software, People

E. Mission Statement, Strategy, Protocol Correct Ans-B. Confidentiality, Integrity, Availability


Based on the Cybersecurity lecture, which of the following attacks can be successful without
using sophisticated technology?
A. DNS spoofing
B. Ransomware

,C. Social Engineering
D. Man in the Middle

E. Denial of Service Correct Ans-C. Social Engineering


Based on the Cybersecurity lecture, which defense technique involves dividing a network into
several smaller and independently secured sub-networks?
A. Defense in depth
B. Hardening
C. Whitelisting
D. Segmentation

E. Layering Correct Ans-D. Segmentation


Based on the Cybersecurity lecture, which of the following was NOT mentioned as a common
cyber defense/countermeasure?
A. Anomalous activity scanning
B. Cloud backup/storage of data and systems
C. Pen Testing
D. Patching

E. All of these were mentioned as common cybersecurity defenses Correct Ans-E. All of
these were mentioned as common cybersecurity defenses


Based on the Cybersecurity lecture, which of the following is NOT a potential cyber threat
actor?
A. National governments
B. Hacktivists
C. Disgruntled employees
D. Drug cartels

E. All of these are potential cyber threat actors Correct Ans-E. All of these are potential cyber
threat actors

, In two decades, the nation of ________ tech sector has grown from "almost nothing" to a $200
billion industry, expanding even during the recent global recession
A. Brazil
B. South Korea
C. Nigeria
D. India

E. None of these Correct Ans-D. India


Based on the Chapter 1 video and class discussion on Artificial Intelligence, what concern(s)
was/were mentioned with respect to using AI to create jobs and recruit candidates?
A. Candidate data privacy
B. Deterioration in entry-level job quality/pay
C. Bias in the application-screening algorithms
D. Both a and b

E. All of these were cited as concerns Correct Ans-E. All of these were cited as concerns


________________ is/are helping to fuel the current age of fast-growth technology
entrepreneurship. This technology means that a startup can rent the computing resources one
previously had to buy at great expense
A. Crowdsourcing
B. Cloud computing
C. The Internet of Things
D. App Stores

E. Consignment Correct Ans-B. Cloud computing


The rise of open source software has lowered computing costs for startup and blue chip
companies worldwide
A. True

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyLoom01 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
118
Member since
2 year
Number of followers
35
Documents
6930
Last sold
3 weeks ago
MINDSPIRE

FIND ALL EXAMS,STUDY GUIDES AND TEST BANKS, REVISION MATERIALS TO BOOST YOUR CAREER!! WELCOME (STUVIA 2025) Leave A review Once Purchased Documents has helped you So that other customers May be Satisfied. Also, Refer 2 colleagues and get One document Free. All the best in your Career. GOODLUCK!!! Thank you!

4.1

30 reviews

5
19
4
1
3
6
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions