IS5803 QUIZ 12

  1. ​A _____ is a security weakness or soft spot.   Vulnerability
  2. ​In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.  ​Risk
  3. _____ costs include expenses for items such as supplies, equipment rental, and software leases.​  Operational
  4. _____ ensures that authorized users have timely and reliable access to necessary information.​  Availability
  5. _____ expenses vary significantly during a system’s operational life and include spending to support maintenance activities.​   Maintenance
  6. _____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.​  Maintenance activities
  7. _____ is a process for controlling changes in system requirements during software development.​   Configuration management
  8. _____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.​   Capacity planning
  9. _____ is the overall time between a request for system activity and the delivery of the response.  Response time
  10. _____ measures risk likelihood and impact.   Risk assessment
  11. _____ measures the time between submitting a request for information and the fulfillment of the request.​    Turnaround time
  12. _____ prevents unauthorized users from creating, modifying, or deleting information.​  Integrity
  13. _____ protects information from unauthorized disclosure and safeguards privacy.​   Confidentiality
  14. _____, a risk control strategy, eliminates risks by adding protective safeguards.   Avoidance
  15. A _____ is a formal reference point that measures system characteristics at a specific time.​   Baseline
  16. A(n) _____ is an attack that takes advantage of a vulnerability.   Exploit
  17. Adaptive maintenance _____.​   adds enhancements to an operational system and makes the system easier to use
  18. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.​   corrective maintenance
  19. As shown in the accompanying figure, near the end of a system’s useful life, _____ when it becomes clear that a company plans to replace the system.​   adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
  20. Corrective maintenance _____.​   diagnoses and corrects errors in an operational system
  21. George’s firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George’s responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.

    One of his firm’s clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident?​   Extortion
  22. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.​   Metrics
  23. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.​    ​programmer/analyst
  24. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.   privilege escalation attack
  25. When a new version of a system is installed, the prior release is _____, or stored.​   ​Archived

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *