CH 6

27 August 2022
4.7 (114 reviews)
33 test answers

Unlock all answers in this set

Unlock answers (29)
question
Limiting user access to the system is considered what type of design activity??
answer
Security and Control Design
question
Which of the following is NOT considered a design model?
answer
Activity Diagram
question
Which of the following really is both an analysis (discovery) and a design process (solution).?
answer
User Interface design
question
What is the name of a general control technique used to ensure that entered data is correct??
answer
Data Validation Control
question
Using digital signatures is primarily a technique to ____.?
answer
verify who sent the document
question
A major comparison between analysis and design can be stated as:?
answer
analysis is understanding, design is solution
question
Which is NOT an objective of integrity controls??
answer
Ensure a stable functioning operating environment
question
A user who has special security and access to a system, such as the right to assign passwords, is called a ____.?
answer
privileged user
question
A ____ is an institution's name and public key, which is encrypted and certified by a third party.?
answer
Digital certificate
question
The domain model is always used as an input to which design activity??
answer
Database design
question
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered??
answer
completeness control
question
What is a control that checks the value of a field to ensure that it is within the correct range?
answer
Value limit control
question
Which is not a model normally produced as part of application component design?
answer
design class diagram
question
When describing the interfaces to external systems, which is not one of the important issues??
answer
Programming languages
question
A storyboard is useful for what??
answer
design of the user unterface
question
Which of the following can be classified as privileged users??
answer
system programmers, application programmers, and system administrators
question
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.?
answer
private
question
Which user is known to the system and is authorized to access all or certain parts of it??
answer
Registered user
question
Which is NOT the objective of Integrity controls?
answer
Ensure a stable functioning operating environment.
question
The domain model is always used as an input to which design activity?
answer
database design
question
A deployment diagram is most useful for which design activity?
answer
designing application components
question
Limiting user access to the system is considered what type of design activity?
answer
security and control design
question
A primary model used in software design is which of the following?
answer
Design Class Diagram
question
Which of the following is not one of the design activities included in the Design System Components core process?
answer
Design the security controls
question
An application component can be thought of as a(n) __________.
answer
unit of software
question
Which of the following is NOT considered an analysis model?
answer
user interface screen layout
question
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
answer
field combination
question
Software methods are usually identified in which design model?
answer
Design Class Diagram
question
Which of the following is NOT a factor that affects the risk of fraud?
answer
authorization of users
question
The design activity key question, "How will this system interact with other systems..." is part of which design activity?
answer
Describe the environment
question
Which of the following is a type of model used in user interface design?
answer
Systems sequence diagram
question
What are two key elements of describing the environment?
answer
External systems and technology architecture
question
Three types of users that are considered in the design of a security system are ____.
answer
unauthorized users, privileged users, and registered users