6

8 September 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
In information security, which of the following is true about managing risk?
answer
Organizations should implement safeguards that balance the trade-off between risk and cost.
question
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
answer
Unauthorized data disclosure
question
Which of the following is classified as a technical safeguard?
answer
Firewalls
question
A ________ is a type of virus that self-propagates using the Internet or other computer network.
answer
Worm
question
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
answer
True
question
Which of the following statements is TRUE about the relationship between business processes and information systems?
answer
A business process need not relate to any information system, but an information system relates to at least one business process.
question
What is the software component of a BI System called?
answer
BI Application
question
Which of the following are the steps in the business process management (BPM) cycle?
answer
model processes; create components; implement processes; assess results
question
Which phase in the SDLC is considered the MOST important?
answer
Determine Requirements
question
In the context of system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced.
answer
Plunge
question
The situation that occurs when the addition of resources creates inefficiencies is known as ________.
answer
Diseconomies of Scale
question
Data produced from actual viewing habits of customers is more reliable than data produced via focus groups because buyers often say they want one thing, but purchase something else.
answer
True
question
The Business Intelligence Process contains three primary activities. What are they?
answer
Acquire data, Perform analysis, Publish results
question
Which of the following are examples of unsupervised data mining techniques?
answer
Cluster analysis, Market-basket analysis and Decision trees
question
Which of the following statements is TRUE about data marts?
answer
Data marts address the needs of a particular department or functional area of a business.