My Systems Analysis Ch. 12 – Flashcards
67 test answers
Unlock all answers in this set
Unlock answers 67question
Preset ____ determine whether a firewall will allow network traffic to pass.
answer
rules
Unlock the answer
question
____ include the volume of online data, the number of records accessed, and the number of transactions processed in a given time period.
answer
Metrics
Unlock the answer
question
The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
answer
functional baseline
Unlock the answer
question
With a release methodology, even when changes would improve system efficiency or user productivity, the potential savings must wait until the next release date, which might increase operational costs.
answer
True
Unlock the answer
question
____ describes the amount of data that a system can transfer in a fixed time period.
answer
Bandwidth
Unlock the answer
question
As shown in the accompanying figure, ____ when it becomes clear that the company plans to replace the system.
answer
adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
Unlock the answer
question
A(n) ____ is an unauthorized attempt to increase permission levels.
answer
privilege escalation attack
Unlock the answer
question
____ means examining the whole in order to learn about the individual elements.
answer
Analysis
Unlock the answer
question
A ____ is a formal reference point that measures system characteristics at a specific time.
answer
baseline
Unlock the answer
question
If significant changes take place in an existing system or if a new version is released, the IT department might develop a ____.
answer
user training package
Unlock the answer
question
The procedure for minor adaptive maintenance is similar to routine corrective maintenance.
answer
True
Unlock the answer
question
____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
answer
Maintenance
Unlock the answer
question
____ means that in risk control, nothing is done.
answer
Acceptance
Unlock the answer
question
____ involves studying the parts to understand the overall system.
answer
Synthesis
Unlock the answer
question
When planning capacity, detailed information is needed about ____.
answer
the number of threats and critical risks posed to a system
Unlock the answer
question
The ____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
answer
system administrator
Unlock the answer
question
Companies with limited resources always consider new systems development, adaptive maintenance, and corrective maintenance less important than perfective maintenance.
answer
False
Unlock the answer
question
Bandwidth requirements are expressed in bytes per minute.
answer
False
Unlock the answer
question
____ costs include expenses for items such as supplies, equipment rental, and software leases.
answer
Operational
Unlock the answer
question
Indications that a system has reached the end of its economically useful life include ____.
answer
operational costs and execution times are decreasing rapidly
Unlock the answer
question
As the first step in capacity planning, analysts develop a current model based on the system's present workload and performance specifications.
answer
True
Unlock the answer
question
____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.
answer
Maintenance
Unlock the answer
question
____ protects information from unauthorized disclosure and safeguards privacy.
answer
Confidentiality
Unlock the answer
question
Successful, robust systems often need the most support because users want to learn the features, try all the capabilities, and discover how the system can help them perform their business functions.
answer
True
Unlock the answer
question
Perfective maintenance usually is cost effective ____ the system's operational life.
answer
during the middle of
Unlock the answer
question
When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.
answer
maintenance and new development require similar IT department resources
Unlock the answer
question
When corrective action cannot occur immediately, users appreciate feedback from the system administrator and should be kept informed of any decisions or actions that affect their maintenance requests.
answer
True
Unlock the answer
question
Retention periods can be a specific number of months or years, depending on legal requirements and company policy.
answer
True
Unlock the answer
question
Requests for corrective and adaptive maintenance normally come from the IT department, while users usually initiate perfective maintenance.
answer
False
Unlock the answer
question
Configuration management is sometimes referred to as change control.
answer
True
Unlock the answer
question
Perfective maintenance can improve system reliability.
answer
True
Unlock the answer
question
____ ensures that authorized users have timely and reliable access to necessary information.
answer
Availability
Unlock the answer
question
As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance.
answer
adaptive
Unlock the answer
question
Perfective maintenance ____.
answer
involves changing an operational system to make it more efficient, reliable, or maintainable
Unlock the answer
question
____ is a process for controlling changes in system requirements during software development.
answer
CM
Unlock the answer
question
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
answer
allocated baseline
Unlock the answer
question
As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by ____ maintenance.
answer
corrective
Unlock the answer
question
Adaptive maintenance always is less difficult than new systems development because the enhancements need not work within the constraints of an existing system.
answer
False
Unlock the answer
question
Which of the following is not an advantage of the release methodology?
answer
new features or upgrades are available more often
Unlock the answer
question
The main objective of user training is to show users how to become service desk staff members.
answer
False
Unlock the answer
question
In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.
answer
1.1
Unlock the answer
question
Although the procedures for corrective maintenance and adaptive maintenance are alike, minor corrective maintenance requires more IT department resources than minor adaptive maintenance.
answer
False
Unlock the answer
question
Newly hired and recently promoted IT staff members often are assigned to maintenance projects because their managers believe that maintenance work offers a valuable learning experience.
answer
True
Unlock the answer
question
In most organizations, ____ IT department effort goes into supporting existing systems and making them more valuable to users.
answer
more than half of all
Unlock the answer
question
As the first step in capacity planning, analysts develop a current model based on the system's present workload and performance specifications.
answer
True
Unlock the answer
question
Risk ____ develops safeguards that reduce risks and their impact.
answer
control
Unlock the answer
question
Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
answer
False
Unlock the answer
question
To measure system performance, companies use ____ testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.
answer
benchmark
Unlock the answer
question
A ____ is an internal or external entity that could endanger an asset.
answer
threat
Unlock the answer
question
As enterprise-wide information systems grow more complex, configuration management becomes less and less useful.
answer
False
Unlock the answer
question
Adaptive maintenance ____.
answer
adds enhancements to an operational system and makes the system easier to use
Unlock the answer
question
____ prevents unauthorized users from creating, modifying, or deleting information.
answer
Integrity
Unlock the answer
question
Bandwidth will not be measured in which of the following units?
answer
Dbps (decibits per second)
Unlock the answer
question
Preventive maintenance ____.
answer
requires analysis of areas where trouble is likely to occur in order to avoid problems
Unlock the answer
question
In a PKE environment, each user on the network has a pair of keys: a public key and a private key.
answer
True
Unlock the answer
question
Risk ____ measures risk likelihood and impact.
answer
assessment
Unlock the answer
question
When analysts learn different skills, the organization is more versatile and people can shift to meeting changing business needs.
answer
True
Unlock the answer
question
Perfective maintenance usually is cost effective ____ the system's operational life.
answer
during the middle of
Unlock the answer
question
A main objective of a service desk is to ____.
answer
provide answers to technical or operational questions make users more productive by teaching them how to meet their own information needs
Unlock the answer
question
The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life.
answer
True
Unlock the answer
question
Using a release methodology increases the documentation burden.
answer
False
Unlock the answer
question
A service desk is a highly effective replacement for traditional IT maintenance and support activities.
answer
False
Unlock the answer
question
Application security requires an understanding of services, hardening, application permissions, input validation techniques, software patches and updates, and software logs.
answer
True
Unlock the answer