MIS Exam 3
68) One of the critical factors that contribute to the failure of projects is ________.
the lack of executive support for the project
59) Which of the following best defines a critical path in a project?
the longest project path that identifies tasks that cannot be delayed without affecting the finish date
57) Which of the following best defines predecessors in a work breakdown structure?
the tasks that need to be completed before a particular task can begin
92) Which of the following best describes confirmation bias?
the tendency to choose information that supports our existing position
69) Which of the following best defines escalation of commitment?
the tendency to continue to invest in a project despite mounting evidence that it is not succeeding
99) Which of the following best describes an availability bias?
the tendency to judge the probability of an event based on how easily examples come to mind
100) Which of the following best describes an anchoring bias?
the tendency to rely on one specific piece of information, irrespective of its irrelevance
95) Which of the following best describes a planning fallacy?
the tendency to underestimate the time it will take to complete a task
43) Which of the following best describes the term scope creep?
the way in which project features are added in an uncontrolled way
48) In which of the following project management areas is a Gantt chart most likely to be used?
time management
67) Which of the following is the most critical factor that contributes to failure of projects?
unrealistic time frames
34) Screen attractiveness is an example of the ________ included in a requirements definition document (RDD).
usability requirements
45) A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables.
work breakdown structure
32) Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each customer with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case?
Digital rights management (DRM)
71) A ________ switches off the old system and launches all the modules of the new one on a single, very hectic go-live date, sometimes called the "big bang."
Direct implementation
72) A major advantage of a ________ is that people whose roles span modules do not have to switch back and forth between old and new modules.
Direct implementation
85) ________ refers to all the procedures, documentation, and resources an organization puts into place to prepare for a crisis situation and recover technical infrastructure.
Disaster recovery
62) ________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.
Distributed denial of service
32) Which of the following is an example of the security requirements included in a requirements definition document (RDD)?
Encryption
81) ________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it.
Encryption
________ refers to a system of moral principles that human beings use to judge right and wrong, and to develop rules of conduct.
Ethics
67) What is the step involved in risk management after vulnerabilities of an organization have been examined?
Evaluation of controls that fill in security gaps
52) ________ in project management include all the coordinating efforts that ensure that tasks on the work breakdown structure are carried out properly.
Executing processes
83) An agile method that focuses on frequent releases of workable software and short time boxes for development is known as ________.
Extreme programming
84) A distinguishing feature of ________ is that developers work in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written.
Extreme programming
25) A ________ is an important part of the planning stage of the systems development life cycle (SDLC) and examines whether an initiative is viable from technical, financial, and legal standpoints.
Feasibility study
78) Which of the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security?
Fingerprint scanner
87) A ________ is a technical control that inspects a network's incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes.
Firewall
26) Which of the following principles is consistent with the utilitarian ethical framework?
First, do no harm
47) A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format.
Gantt chart
49) Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a work breakdown schedule?
Gantt chart
50) Which of the following is true about work breakdown structure?
Gantt charts are generally used to show work breakdown structures.
37) Which of the following features is most likely an example of the usability requirements included in a requirements definition document (RDD)?
High task efficiency
50) The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.
Honeypots
75) Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.
Incidence response plan
30) The ________ process lays the groundwork for the project by clarifying the value it will bring to the organization, setting its objectives, and estimating the project's length, scope, and cost.
Initiating
32) The stage at which a project is conceived is known as the ________ process.
Initiating
31) Which of the following sets of processes is carried out first in project management?
Initiating process
38) Lee works for Pink Net Worldwide Inc., an advertising company in California. Lee is developing software to improve the process of coordination with clients. Which of the following requirements is he concentrating on if he is interfacing the clients' software with a few of the information systems that are currently functioning within the company?
Integration requirements
27) ________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value.
Intellectual property
89) Which of the following systems are used to combat spam?
Intrusive prevention systems
72) ________ help(s) in determining the cause of a security threat in an incidence response plan.
Investigating system logs
79) Which of the following technologies serves as a biometric identifier for physical security?
Iris configuration
88) Which of the following functions does a firewall perform?
It defines which IP addresses or domain names should be blocked.
105) Which of the following is true of the European Union's Data Protection Directive?
It establishes privacy as a fundamental human right for EU citizens
99) Which of the following is an accurate description of the Privacy Act of 1974?
It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies.
86) Which of the following reasons explains why waterfall methods are still widely in use?
It has a logical and familiar structure which is comfortable to use.
97) Which of the following is an accurate definition of scareware?
It is a kind of social engineering used to persuade people that a computer is infected when it is not.
82) Which of the following statements is true of encryption?
It is a powerful technical control that protects sensitive data
51) Which of the following is an accurate definition of a computer virus?
It is a software program that can damage files or other programs
81) Why is it a challenging task to calculate a project's return on investment (ROI)?
It is difficult to estimate ROI for projects where costs rise unexpectedly and revenue increases are hard to predict.
29) Enforcing intellectual property laws becomes difficult when ________.
It is digitized
87) Which of the following is an advantage of custom system development?
It is tailored closely to an organization's needs.
63) Which of the following is true of phishing?
It is the process of stealing personal data from a victim by convincing him to disclose information
78) Which of the following is a drawback of the waterfall method?
It is unable to adapt to changes in the business landscape.
39) Which of the following is an advantage of online anonymity?
It protects corporate whistleblowers and political activists in oppressive regimes
30) Which of the following is an accurate definition of digital rights management?
It refers to technologies that intellectual property owners use to control access to their digital content.
36) Which of the following statements is true of information privacy?
It refers to the protection of data about individuals
89) Which of the following is an advantage of prepackaged software?
It requires a short implementation time.
90) Which of the following is a disadvantage of prepackaged software?
It requires an organization to change its business processes.
88) Which of the following is a disadvantage of custom system development?
It requires long periods of time before going live.
38) Which of the following statements is true of a project charter?
It shows that the senior management support the project.
100) Which of the following is a disadvantage of using consulting services?
It tends to make employees feel less ownership of a project and less committed to changes.
83) Which of the following is a feature of public key encryption?
It uses a pair of keys, one to encrypt the data and the other to decrypt data.
79) The ________ compresses the time horizon for software development and focuses on the time available until the next release while the development team determines how many of the requirements it can deliver in that time frame.
Iterative method
45) Which of the following is potentially a negative impact of surveillance in online communications?
Lowered productivity of employees
53) Botnets function with the use of ________.
Malware
55) ________ track progress from start to finish, pinpointing any deviations from the plan.
Monitoring and controlling processes
________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences.
Natural laws and rights
Which of the following statements is true of natural laws and rights?
Natural laws and rights do not consider the actual consequences of an action when judging its morality.
33) Digital rights management (DRM) offers IP holders the benefit of ________.
Offering technological protection for their products
68) Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a short period of time. It launches the new system while the old one is still running and employees have to do their jobs twice, once on each system. Which of the following is the company using?
Parallel implementation
61) Which of the following is a type of testing for information systems where developers use the same input and compare the new system's output to the output generated by the system it is replacing?
Parallel testing
93) Which of the following precautions need to be taken in order to create a secure password?
Personal information should not be used in passwords
64) Janet received an email that contained a link to a website that imitated the authentic website of her bank. The email requested her to key in her credit card number, her Social Security number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.
Phishing
66) ________ refers to an attempt to steal passwords or other sensitive information by persuading the victim to enter the information into a fraudulent website that masquerades as the authentic version.
Phishing
34) ________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source.
Plagiarism
35) Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________.
Plagiarism
21) ________ is the first step in the systems development life cycle (SDLC), which defines the business need for a project, assesses its importance to the company, and determines whether the project is feasible.
Planning
22) Jonathan has joined a new software company in Manhattan and has been assigned the task of developing an internal communications system. He begins the task by assessing how the system will help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle (SDLC).
Planning
51) The ________ process in project management focuses on devising how the project will be executed.
Planning
26) A ________ is a series of events designed to deliver a product or service that is recurring in nature.
Process
69) Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?
Prohibiting downloading data to USB drives
24) A ________ is a temporary activity that is launched for a specific purpose, to carry out a particular objective.
Project
79) ________ is a continuous process that oversees all the projects for an organization, selecting which projects to pursue and culling those projects that have a poor prognosis.
Project portfolio management
25) Which of the following is a difference between projects and processes?
Projects are unique and one of a kind, whereas processes are recurring.
40) A drawback of online anonymity is that it ________.
Protects spammers and imposters
41) A ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations.
Proxy
80) ________ refers to the creation of software prototypes that can be shared with users for receiving feedback, so that developers can make improvements before a lot of effort is spent building a fully functioning version.
Rapid application development
27) Which of the following is a characteristic of a process?
Recurring in nature
77) Which of the following authentication strategies is the easiest to compromise or crack?
Reliance on user knowledge
26) ________ is a process in which stakeholders identify the features that a project will need and then prioritize them as mandatory, preferred, or nonessential.
Requirements analysis
27) Mike, a research analyst, is in the analysis phase of a project, the goal of which is the development of smile shutter technology in cameras. Mike first identifies and analyzes the integral elements that need to be included in the technology such as red eye removal, blink detection, and face identification and then prioritizes them as mandatory, preferred, or nonessential. Which of the following processes is being illustrated in the given scenario?
Requirements analysis
96) Which of the following is a reason why humans are soft targets for social engineering?
Respect for authority
73) ________ is one way of recovering systems in an incidence response plan.
Restoring from media known to be good
71) According to the incidence response plan, which of the following would be most useful in containing any damage caused by a security threat?
Restrict system access
24) ________ is a driver of information systems development that touches on security, privacy, safety, and regulatory compliance.
Risk management
68) A(n) ________ lists out and rates the vulnerabilities of an organization.
Risk matrix
82) ________ is an agile method for software development that relies on tightly knit, cohesive teams that do sprints of 2 to 4 weeks each.
Scrum
39) Sam Torres, a security officer at a content management firm, is required to monitor the people coming in and going out of the organization and ensure data privacy through the process of encryption. Which of the following types of requirements is Sam focusing on in the given scenario?
Security requirements
61) In Internet terminology, a worm refers to a(n) ________.
Self-replicating program that sends copies to other nodes on a computer network
92) A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to multiple software applications.
Single sign-on
95) ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
Social engineering
28) Which of the following is an example of intellectual property owned by an IT firm?
Software code
49) Which of the following is an accurate definition of malware?
Software designed to attack computer systems
65) Which of the following methods is often used for phishing purposes?
Soliciting personal information through emails
57) The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.
Spyware
58) Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her email communications, etc. Data gathered from the monitoring activity is sent to a remotely located hacker. Which of the following is most likely to have infected Evelyn's computer?
Spyware
60) Which of the following types of testing for information systems is conducted to assess how well a system performs under peak loads?
Stress testing
44) ________ are used to monitor email, web surfing, and other online communications in organizations.
Surveillance technologies
57) Which of the following types of testing involves both end users and IT staff testing the functionality of an entire IS?
System testing
102) Which of the laws stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually?
The Gramm-Leach-Bliley Act
86) Which of the following is true of public key encryption?
The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.
84) Which of the following is a technical control that helps secure information flow in an organization?
The information system enforces the organization's policy about human review.
103) Which of the following is true of black swan events?
The invention of the personal computer is an example of a black swan.
42) Which of the following is a drawback of using a proxy server to ensure online anonymity?
The need to rely on the promise of the company that operates the proxy to protect its customers' identities
Which of the following administrative control actions helps enforce approved authorizations for access to systems in an organization?
The organization defines the information to be encrypted or stored offline in a secure location.
98) Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies?
The privacy act of 1974
67) Which of the following is a disadvantage of a parallel implementation of an information system?
The process is expensive in nature and is usually in place for only a short period.
80) Which of the following is an accurate definition of multifactor authentication?
The process of combining two or more authentication strategies
37) Which of the following is an element of privacy?
The right to be left alone
76) Which of the following statements is true about acceptable-use policies?
The surveillance and monitoring processes that are in place are also included in the policy.
66) Which of the following is an advantage of a parallel implementation of an information system?
There are two systems processing the same case, both of which should have the same output.
48) Which of the following statements is true of honeypots?
They have specific vulnerabilities that attract different varieties of malware in the wild.
85) Which of the following best defines agile methods?
They involve characteristics of cohesiveness and trust.
104) Which of the following is a provision of the State Security Breach Notification Laws?
They require organizations to inform state residents if sensitive data are released.
Which of the following principles is consistent with the natural laws and rights ethical framework?
Thou shalt not kill
43) Which of the following is a reason why employers adopt surveillance technologies to track online communications?
To increase employee productivity
52) The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to a computer, as for a botnet.
Trojan horse
46) What is the first step involved in risk management?
Understanding what information assets need protection
47) Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches?
Understanding which information assets need protection
97) ________ refers to an approach in which organizations strongly prefer systems that are offered by a single vendor, which also supplies the ERP.
Unified procurement
56) ________ is a type of testing for information systems that involves programmers checking the functionality of small modules of code during the development phase of the systems development life cycle (SDLC).
Unit testing
35) Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface and to enhance the ease of learning the software?
Usability requirements
________ is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones.
Utilitarianism
76) Which of the following technologies is most likely to be used by organizations as an authentication strategy?
Voice pattern recognition
76) The ________ involves the sequential occurring of systems development life cycle tasks, with one activity starting only after the previous one has been completed.
Waterfall method
38) Under which of the following circumstances is information privacy most difficult to achieve?
When information is stored on highly interconnected systems
56) When does a computer become a zombie?
When it is infected by malware
60) A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.
Worm
99) Which of the following is an example of a systems integrator?
a consultant who ensures that the hardware and software components of an IS work together
77) Which of the following disclaimers would protect a firm from implied contract obligations in the event of an employee's email containing wording that implies a firm contract?
a disclaimer stating that any contract must be confirmed by the employee's manager
34) Which of the following best describes a project charter?
a key document that authorizes a project
80) Which of the following best describes project portfolio management?
a process that oversees all projects and selects which projects to pursue
73) Which of the following is a critical success factor for projects?
a strategy to manage conflicts among stakeholders
23) Which of the following is an accurate definition of a project?
a temporary activity to carry out a particular objective
95) The ________ procures the finest systems for each application, regardless of the vendor.
best-of-breed approach
The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, and science.
black swan
29) An early form of business process management (BPM) that was developed as a means to make sweeping changes to eliminate all processes that did not add value was known as ________.
business process reengineering
33) The stage at which early phase managers identify the major players in the project, including the sponsor, the project manager, the team members, and other stakeholders, is known as the ________.
initiating process
36) User navigation and data display are examples of the ________ included in a requirements definition document RDD.
interface requirements
48) Which of the following should be undertaken during the design phase of the systems development life cycle (SDLC)?
keeping in mind end users with disabilities
40) A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time.
kickoff meeting
64) Which of the following will take place in a parallel implementation of an information system?
launching the new system while the old one is still running
51) Which of the following functions does a project-and issue-tracking software perform?
maintaining a complete history of project activity, including dates and tasks assigned
56) In the ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind.
monitoring
78) A company requires its employees to include a certain disclaimer in their emails that states that the company is not responsible if recipients of emails rely on the advice provided by the employees. What potential threat does such a disclaimer protect the company from?
negligent misstatements
75) Which of the following best describes legacy systems?
old systems which are built on aging or obsolete architectures
28) Which of the following is the best example of a project?
opening a new branch office
87) Which of the following disasters is most likely to cause massive absenteeism in organizations?
pandemics
65) A ________ of an information system launches the new system while the old one is still running and employees either do their jobs twice or two separate teams handle the same processes.
parallel implementation
33) Components such as response time, availability, and scalability are examples of the ________ included in a requirements definition document (RDD).
performance requirements
69) A disadvantage of a ________ is that the new system's modules may be tightly integrated, so implementing one without the others may create some confusion and require temporary interfaces to the old systems.
phased implementation
54) Which of the following activities should project managers spend more time on?
planning and team building
96) A ________ refers to the tendency to underestimate the time it will take to complete a task.
planning fallacy
104) Black swan events ________.
pose difficult challenges for strategic planners
58) The term ________ refers to a task in the work breakdown structure that needs to be completed before a particular task can begin.
predecessor
96) An organization is using a unified procurement approach if it ________.
prefers systems that are offered by a single vendor
28) The major function of a process diagram is to trace ________.
process operations from beginning to end clearly to all stakeholders
94) An organization is using the best-of-breed approach if it ________.
procures the best systems, regardless of the vendor
41) Which of the following best describes deliverables in a project?
products, documents, or services that will be handed over to the sponsor
82) A ________ oversees all the projects going on throughout the organization and provides project management training, software, and support.
program management office
83) Which of the following collects data from each project and aggregates it, building a larger picture of the overall health of the organization's project portfolio?
program management office
63) Independent testers are critical in testing information systems mainly because ________.
programmers are inept at testing their own code
35) A ________ is a document that authorizes a project and includes a clear statement of objectives, estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and other pertinent information.
project charter
39) A kick-off meeting involves ________.
project stakeholders meeting one another to review the project charter
52) The ________ offers customizable dashboards so that developers can see at a glance how a process is coming along, what activities they need to complete in a day, and how they can keep abreast of all aspects of the process.
project- and issue-tracking software
94) A single sign-on is implemented by organizations for the purpose of ________.
reducing the cognitive load associated with multiple passwords
91) A ________ is a request sent to software vendors describing a new system that an organization requires in broad, high-level terms, to which interested vendors can respond by describing the products and services that could fit the requirement.
request for information
92) Which of the following includes a high-level description of a system that an organization is on the lookout for?
request for information
93) A ________ is an invitation to software companies to submit a formal bid, including a detailed description of their products, services, and costs.
request for proposal
44) The term ________ refers to the way in which features are added in an uncontrolled way, often without considering the impact on the budget or timeline.
scope creep
46) A(n) ________ is a document that clarifies which features are included in a project.
scope statement
61) Which of the following is a feature of a project's closing process?
signing off by the sponsor that all deliverables have been accepted
41) A general rule of thumb is that an organization should consider buying software rather than building it if the ________.
software can meet 75% to 80% of all business requirements
31) Which of the following is a function of a requirements definition document (RDD)?
specifying the features that an information system should have
103) Which of the following provisions does the Gramm-Leach-Bliley Act make?
stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies
42) Which of the following best describes service-oriented architecture (SOA)?
systems assembled from relatively independent software components
59) Which of the following is involved in the integration testing process for information systems?
testing a new system's interfaces with other software components it links to
90) Which of the following best describes overconfidence bias?
the act of having more faith in our own estimates than is realistically justified
94) Which of the following best describes a hindsight bias?
the belief that an actual event was predictable even if it was not
37) How does a project charter help in managing a project?
avoids unexpected surprises and leaves room for changes to meet organization's needs
47) Designers use the unified modeling language (UML) to ________.
improve communication and clarity by using standardized graphics symbols and notations
55) Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a software that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in?
Development phase
23) Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. What is the amount of savings earned from the project per month if it returns the investment in 3 years?
$5,000
59) Which of the following is an accurate definition of a keylogger?
A monitoring software that records a user's keystrokes
58) The type of testing that involves end users performing final testing to determine whether a project is complete as specified is known as ________.
Acceptance testing
43) Service-oriented architecture is especially useful in ________ companies.
Agile
81) In the ________, tasks are not sequenced according to the systems development life cycle (SDLC) and many activities occur simultaneously.
Agile method
77) The ________ phase of the waterfall method involves nailing down requirements, at which point the developers estimate the time and resources needed to complete a project.
Analysis
45) A use case diagram is used to indicate how ________.
Different types of users will interact with a system
74) An incidence response plan is created for the purpose of ________.
Avoiding chaos and missteps
54) The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.
Botnet
86) ________ refers to maintaining an organization's business operations to avoid a devastating revenue loss and damaged reputation.
Business continuity
40) ________ an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human resource management.
Buying
101) Which of the following laws prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own?
CAN-SPAM Act
55) For which of the following purposes are botnets most likely to be used?
Capturing Internet users' sensitive information
65) ________ is a structured approach that the transition employees must make as they switch from their existing work processes to new ones.
Change management
29) Which of the following is true of the triple constraint in projects?
Changes in one fundamental constraint affect the other constraints as well.
62) The ________ phase in a project involves documenting lessons learned from the project, so that the experience is useful to other project teams and adds to the organization's knowledge base.
Closing
63) The ________ phase ideally involves wrapping up a project in an orderly way and a sponsor signing off that all deliverables have been received and accepted.
Closing
53) ________ is a peer review process in which programmers familiar with the project and the development environment check over one another's work to ensure it is well documented and properly written.
Code review
70) One way to identify a threat in an incident response plan is to ________.
Communicate with a crisis management team
91) ________ makes it more difficult for a hacker to break into passwords.
Creating passwords with symbols, mixed cases, and characters
98) Which of the following is an advantage of customizing a packaged solution?
Customization adds competitive advantage to processes that an organization cannot alter.
50) Which of the following functions does the version control software perform?
D) allowing developers to track versions of the source code during development
31) Which of the following is a drawback of digital rights management encountered by users today?
DRM systems prevent legitimate duplication of digital content in the event of hardware failure.
90) What of the following is a drawback of cloud computing?
Data protection laws are not uniform across countries.
42) The term ________ refers to products, documents, or services that will be handed over to the sponsor during the course of the project.
Deliverables
44) The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will function together to accomplish goals, using descriptions, diagrams and models.
Design
46) Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be able to easily locate what they need on the website. She avoids flashy graphics and chooses a font with high readability. Joanna is most likely in the ________ stage of the SDLP.
Design
54) Testing is a part of the ________ phase of the systems development life cycle (SDLC).
Development
98) An ________ bias refers to the tendency to judge the probability of an event based on how easily examples come to mind.
availability
74) The ________ lays out rules about what employees are allowed to do with IT resources and what activities are disallowed.
acceptable-use policy
75) The ________ encompasses services each employee will be provided, whether and how much they can utilize company resources for personal use, the kinds of surveillance that are in place, and reinforce legal requirements, such as prohibitions against unauthorized copying.
acceptable-use policy
53) Which of the following is an example of an executing process?
allocating work assignments
88) Which of the following is most likely to be a consequence of a security breach in an organization?
alteration of data
66) Which of the following best defines change management?
an approach to the transition employees make as they switch from existing work to new processes
97) The term ________ refers to the tendency for people to rely too heavily on one piece of information to adjust their estimates, even if it is irrelevant.
anchoring
74) The ________ refers to a process organizations put into place to manage and prioritize requests to add new features to an information system.
change control process
89) The term ________ refers to a common human tendency to make systematic mistakes when processing information or making judgments.
cognitive bias
84) Which among the following is the hardest task for an organization's program management office?
collecting consistent data from projects
72) Which of the following should a project manager ideally do to efficiently manage a project?
communicate the time, cost, and scope constraints clearly as the project unfolds
91) The human tendency to choose information to examine and support a view they already hold and ignore data that might refute their hypothesis is known as a(n) ________.
confirmation bias
49) Which of the following is the primary goal of the development phase of the systems development life cycle (SDLC)?
converting a design into a fully operational information system
60) The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date.
critical path
73) A ________ is often the only logical implementation strategy for smaller systems.
direct implementation
64) Which of the following challenges is typically a feature of the closing phase of a project?
documenting lessons learned
70) The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment. This tendency is known as ________.
escalation of commitment
71) A real estate developer in the New Jersey area purchases a large tract of land and plans to build an apartment complex equipped with a golf course and other amenities. The developer is targeting the affluent software engineers from Manhattan who are looking for second homes. Halfway through the process of construction, recession hits the nation and many people lose their jobs. There are no takers for the apartments the developer is building, as homebuyers look for less expensive options. The developer, dismayed at the huge investment he has already made in the project, decides that it would be unwise to stop the project and plans to go ahead with it. The developer's reasoning is consistent with the idea of ________.
escalation of commitment
100) What does the Family Educational Rights and Privacy Act (FERPA) stipulate?
establishing privacy rights over educational records
36) Which of the following functions does a project charter perform?
estimating start and end dates for the project
101) Which of the following is an accurate definition of "black swans"?
events that occur very rarely and are difficult or nearly impossible to predict
62) Which of the following do all types of information system tests mimic?
events the system is likely to handle when it goes live
30) Michael Hammer's business process reengineering was criticized because it ________.
failed to realize that the human element is key to improving business processes
70) Which of the following occurs during a phased implementation?
focusing on launching modules in steps rather than all at once
93) A(n) ________ bias refers to a belief that an actual event was predictable even if it was not.
hindsight