MIST 4620 - Exam 2 Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

"Prewritten code to target applications with a history of known security problems or users who fail to update their software" best describes what term? A. New Platforms B. Wide Availability of Exploit Kits C. Targeted & Sophisticated Attacks D. None of the Above

*B. Wide Availability of Exploit Kits*

"Time and access to attempt an attack" best describes which term? A. Method B. Mitigation C. Opportunity D. Motive

*C. Opportunity*

"Stop attacks by using something tangible" best describes this security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*C. Physical Controls*

A data center behind a door with a double-bolted lock is an example of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*C. Physical Controls*

The creation of backup copies of database and real-time replication is an example of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*C. Physical Controls*

When a security camera is placed inside a computer system room, it is an example of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*C. Physical Controls*

If deciding between two alternative designs, choose the one where indirection ___________ coupling or provides ____________ security. A. Reduces, less B. Increases, greater C. Reduces, greater D. Increases less

*C. Reduces, greater*

"The optimized organization of all on-screen elements starts to take shape here through Interface, Navigation, and Information Design" best describes which plane of the UX Design? A. Scope B. Structure C. Skeleton D. Surface

*C. Skeleton*

Based on the flow of activities in use case description, activity diagram, and/or the system sequence diagram, you create a __________ of the dialog, showing the sequence of sketches of the screen for each step of the dialog. A. Story Case B. Feature-Board C. Storyboard D. Case-Board

*C. Storyboard*

"Encryption method that uses same key to encrypt and decrypt" is an example of what? A. Asymmetric Key Encryption B. Twin Key Encryption C. Symmetric Key Encryption D. Similar Key Encryption

*C. Symmetric Key Encryption*

Hacktivists and cyberwarfare are examples of what security threat? A. New Platforms B. Wide Availability of Exploit Kits C. Targeted & Sophisticated Attacks D. None of the Above

*C. Targeted & Sophisticated Attacks*

"The entire process of identifying requirements that meet user needs to be designing a user interface that meets the user needs while being high on usability and aesthetic" best describes which term? A. User Design B. Architecture Design C. UX Design D. Information Design

*C. UX Design*

- Display electronic forms and reports - Capture such input events as clicks, rollovers, and key entries - Display data fields - Accept input data - Edit and validate input data - Forward input data to the domain layer classes - Start and shut down the system The statements above best describe which layer? A. Problem Domain Layer B. Data Access Layer C. View Layer D. Design Layer

*C. View Layer*

What comprises the multi-layer design? A. Design Layer, Problem Domain, and Data Access Classes B. Design Layer, View Layer, and Data Information Classes C. View Layer, Problem Domain, and Data Access Classes D. View Layer, Problem Domain, and Data Attribute Classes

*C. View Layer, Problem Domain, and Data Access Classes*

Add the _______ layer for input screens to handle input messages. A. Control B. Input C. View D. Data Access

*C. View*

"The control is visible so that users know it is available and vice-versa (controls not available should not be visible or should be grayed out)" best matches which principle for good user interface design? A. Feedback B. Closure C. Visibility D. Usability

*C. Visibility*

Security threats are on the rise due to: A. New Platforms B. Wide Availability of Exploit Kits C. Targeted & Sophisticated Attacks D. All of the Above E. B & C Only

*D. All of the Above*

The objectives of User Interface Design are: A. Ease of Use B. Reduction of Cognitive Load C. Error Avoidance D. All of the Above

*D. All of the Above*

What are used to create information architecture? A. Card Sorting B. Common Actor C. CRUD for Common Domain Class D. All of the Above E. None of the Above

*D. All of the Above*

"The ability of a system to ensure that assets are usable by accessible to all authorized parties" best describes which term? A. Accessibility B. Confidentiality C. Integrity D. Availability

*D. Availability*

What is the objective of System Interface Design? A. Error Avoidance B. Efficiency C. Quality Assurance D. Both A & B E. None of the Above

*D. Both A & B*

Threats can be applied to the __________, __________, and ___________ of a system. A. Complexity, Integrity, Accessibility B. Confidentiality, Invisibility, Availability C. Confidentiality, Interoperability, Accessibility D. Confidentiality, Integrity, Availability

*D. Confidentiality, Integrity, Availability*

_________________ outline "what" needs to be included in a site. A. Server Requirements B. Functional Requirements C. Content Specifications D. Content Requirements

*D. Content Requirements*

"Converted encrypted data back to readable format" best describes which term? A. String Encryption B. Encryption Algorithm C. Encryption Key D. Decryption

*D. Decryption*

How will this system interact with other systems and with the organization's existing technologies? A. Design the application components B. Design the database C. Design the user interface D. Describe the environment

*D. Describe the environment*

What is a "standard design techniques and templates that are widely recognized as good practice; for common design/coding problems, and suggests the best way to handle the problem"? A. Controller Pattern B. Attribute Pattern C. Mehndi or Heena D. Design Pattern

*D. Design Pattern*

This diagram is extended from the system sequence diagram and is the most important model in OO Design. A. Design Class Diagram B. Design Sequel Diagram C. Design Systems Diagram D. Design Sequence Diagram

*D. Design Sequence Diagram*

"Alter data so it is unrecognizable" best describes which term? A. String Decryption B. Encryption Algorithm C. Encryption Key D. Encryption

*D. Encryption*

"A design principle that states an intermediate class is placed between two classes to decouple them but still link them" best describes which term? A. Protection from Variations B. Cohesion C. Design Pattern D. Indirection

*D. Indirection*

"Design that describes how we'd like people to be able to use the information we have organized" best describes what term? A. Activity Design B. Information Design C. Interface Design D. Interaction Design

*D. Interaction Design*

If :InventoryItem receives the message updateQty(qty), then a method signature is added to _____________. A. updateQty(qty): B. updateItem: C. QuantityItem: D. InventoryItem:

*D. InventoryItem:*

What is the MOM framework? A. Measurement, Opportunity, Mitigation B. Method, Operability, Modification C. Methodology, Opportunity, Mitigation D. Method, Opportunity, Motive

*D. Method, Opportunity, Motive*

"A reason to attempt an attack" best describes which term? A. Method B. Mitigation C. Opportunity D. Motive

*D. Motive*

When an object needs information from another object, a _______________ might be required from requestor to provider of information. A. Data Point B. Actor C. Supporting Class D. Navigation Arrow

*D. Navigation Arrow*

Mobile, cloud, social media, internet of things, and botnets are examples of what? A. Old Platforms B. Wide Availability of Exploit Kits C. Targeted & Sophisticated Attacks D. None of the Above

*D. None of the Above - New Platforms*

A major goal of information security as a discipline and as a profession is to _________. A. Protect and secure data B. Protect valuable infographics C. Prevent weakness and vulnerabilities D. Protect valuable assets

*D. Protect valuable assets*

A dimension of quality used to evaluate a software system, examples include: Performance, scalability, modularity, usability, security. A. Quantity Attributes B. Quality Assurance C. Quality Queen D. Quality Attributes

*D. Quality Attributes*

"The 'why' plane, as in "why does the site exist?"; this goes for both the creator/owner and user; Details the goals of the user and owner" best describes which plane of the UX Design? A. Surface B. Structure C. Skeleton D. Strategy

*D. Strategy*

The User Interface Design encompasses what planes of UX? A. Scope, Structure, Skeleton B. Structure, Skeleton, Strategy C. Surface, Scope, Structure D. Structure, Skeleton, Surface

*D. Structure, Skeleton, Surface*

22. Match the following statements with terms using the asset protection framework (Vulnerability - Threat - Control) A. A set of circumstances that has the potential to cause loss or harm B. An action, device, procedure, or technique that eliminates or reduces a vulnerability C. A weakness in the system that can be exploited to cause loss or harm

*A - Threat* *B - Control* *C - Vulnerability*

Place the steps of Sketching-Wireframing-Mockup in order: 1 - Sketch (getting a basic concept) 2 - Code (developing in web browser) 3 - Idea 4 - Wireframe (refining the concept further) 5 - Mockup (creating visual graphics & content) A. 3-1-4-5-2 B. 1-3-4-5-2 C. 3-1-4-2-5 D. 3-1-5-4-2

*A. 3-1-4-5-2*

Match the statements with the following terms (Authentication, Access Control List, Authorization) A. List of valid users B. Authenticated user's list of permission level for each resource C. To identify users; ex. multi-factor authentication

*A. Access Control List* *B. Authorization* *C. Authentication*

"The appearance of the object suggests its function" best matches which principle for good user interface design? A. Affordance B. Actuality C. Continuity D. Usability

*A. Affordance*

"Encryption method that uses different keys to encrypt and decrypt" is an example of what? A. Asymmetric Key Encryption B. Private Signature Key Encryption C. Symmetric Key Encryption D. Fraternal Twin Key Encryption

*A. Asymmetric Key Encryption*

"On Dialogues - end of a series of actions; protect user's work - at end and for partially complete work; provide undo to reverse actions" best matches which principle for good user interface design? A. Closure B. Continuity C. Consistency D. Navigation

*A. Closure*

"A quantitative measure of the focus or unity of purpose within a single class" best describes which term? A. Cohesion B. Connection C. Coupling D. Class Relations

*A. Cohesion*

"Code that passes tests are deployed to production automatically" best describes which term? A. Continuous Deployment B. DevOps C. Continuous Integration D. Technology Tools

*A. Continuous Deployment*

"Extended from the domain model class diagram to include UI and Data Access classes and updated from the design sequence diagram (messages to an object become methods of the design class)" best describes which term? A. Design Class Diagram B. Design Sequel Diagram C. Design Systems Diagram D. Design Sequence Diagram

*A. Design Class Diagram*

The following: - Pattern name - Problem that requires solution - The pattern that solves the problem - An example of the pattern - Benefits and consequences of a pattern are categories of what? A. Design Pattern B. Controller Pattern C. Use Case Pattern D. Use Case Controller

*A. Design Pattern*

What are the key parts of the information system and how will they interact when the system is deployed? A. Design the application components B. Design the database C. Design the user interface D. Describe the environment

*A. Design the application components*

How will users interact with the information system? A. Design the user interface B. Design the application components C. Design the database D. Describe the environment

*A. Design the user interface*

"An organization's name and public key that is encrypted and certified by an authorized third party" best describes which term? A. Digital Certificate B. Digital Authority C. Digital Signature D. Digital Server

*A. Digital Certificate*

"It may not be possible for all features to be visible on the user interface. It is important to help users discover 'hidden' features or objects" best matches which principle for good user interface design? A. Discoverability B. Visibility C. Readability D. Usability and Efficiency

*A. Discoverability*

"Some visual or audio response by the system in response to user action to show what has just been accomplished. If nothing has happened, this fact should also be obvious" best matches which principle for good user interface design? A. Feedback B. Closure C. Visibility D. Usability

*A. Feedback*

"This is the user interface and all things visual to aid them in using the product/site/app: fonts, colors, styling, animations" best describes which plane of the UX Design? A. Scope B. Structure C. Skeleton D. Surface

*D. Surface*

What are the five planes of UX Design? A. Surface, Security, Structure, Scope, Strategy B. Surface, Security, Structure, Scope, System C. Surface, Skeleton, Structure, Scope, Specific D. Surface, Skeleton, Structure, Scope, Strategy

*D. Surface, Skeleton, Structure, Scope, Strategy*

"Shortcut keys for experienced users; meaningful error messages - state what is wrong and how it can be fixed; simplicity - KISS" best matches which principle for good user interface design? A. Closure B. Discoverability C. Consistency D. Usability and Efficiency

*D. Usability and Efficiency*

- Switchboard between user-interface classes and domain layer classes - Reduces coupling between view and domain layer - It is a completely artificial class - an artifact The statements above best describe which term? A. Design Pattern B. Controller Pattern C. Use Case Pattern D. Use Case Controller

*D. Use Case Controller*

To study methods of asset protection, what framework is used? A. Variability - Threat - Integrity B. Value - Technology - Control C. Vulnerability - Technology - Confidentiality D. Vulnerability - Threat - Control E. None of the Above

*D. Vulnerability - Threat - Control*

DevOps increases: A. Quality B. Reliability C. Compliance D. Security E. All of the Above

*E. All of the Above*

DevOps reduces or removes: A. Operation OH B. Manual work C. Bottlenecks D. Time to market E. All of the Above

*E. All of the Above*

Which of the following are some new technologies and trends in User Interface Design? A. Artificial Intelligence B. Brain Computer Interfaces C. Augmented Reality D. Gesture Interfaces E. All of the Above F. A and C Only

*E. All of the Above*

When creating a Design Class Diagram (DCD), you should also see _________________. A. Medical Conditions B. Applicable Conditions C. Pre-Conditions D. Post-Conditions E. Both C and D

*E. Both C and D*

It is best to have classes that are tightly coupled. (TRUE or FALSE)

*FALSE* It is best to have classes that are *LOOSELY* coupled.

If care is taken, controller classes can become incoherent, with too many unrelated functions and business logic will be inserted into the controller class. (TRUE or FALSE)

*FALSE*. If care is *NOT TAKEN*, controller classes can become incoherent, with too many unrelated functions and business logic will be inserted into the controller class.

If deciding between two alternative designs, choose the one where there is no protection from variations. (TRUE or FALSE)

*FALSE*. If deciding between two alternative designs, choose the one where *THERE IS* protection from variations.

With the Design Sequence Diagram, you start out by removing a controller and the domain objects. Then replace UI and Data Access objects. (TRUE or FALSE)

*FALSE*. Start out by *adding a controller* and the domain objects. Then *add UI and Data Access objects*.

The 'ribbon' bar on Microsoft word is not an example of Card Sorting. (TRUE or FALSE)

*FALSE*. The 'ribbon' bar on Microsoft word *IS* an example of Card Sorting.

View classes do need to know about the domain or data access layer. (TRUE or FALSE)

*FALSE*. View classes *DO NOT* need to even know about the domain or data access layer.

Mandatory associations, in which objects in one class cannot exist without objects of another class, are usually navigated from the more dependent class to independent. (TRUE or FALSE)

*FALSE.* Mandatory associations, in which objects in one class cannot exist without objects of another class, are usually navigated from the more *INDEPENDENT* class to *DEPENDENT*.

One-to-many associations that indicate a superior/subordinate relationship are usually navigated from the subordinate to the superior. (TRUE or FALSE)

*FALSE.* One-to-many associations that indicate a superior/subordinate relationship are usually navigated form the *SUPERIOR* to the *SUBORDINATE*.

Technology architectures are inherently good or bad and the qualities that arise from architectures do not matter. (TRUE or FALSE)

*FALSE.* Technology architectures are *not inherently good or bad* but rather the *qualities* that arise from architectures make them *suitable or unsuitable* for your needs.

Agile projects typically build more models. (TRUE or FALSE)

*FALSE.* Agile projects typically build *fewer models*, but models are still created.

Computer security is concerned with only protecting a computer system's information assets, but not the computer systems themselves. (TRUE or FALSE)

*FALSE.* Computer security is concerned with protecting a computer system's information assets, *AND* the computer systems themselves

In the UX Design process, when the problem is identified, this includes the system objective and goals from only the user perspective. (TRUE or FALSE)

*FALSE.* It includes system objective and goals from *BOTH* the *user perspective* and *organization perspective*

Low-fidelity wireframes can test performance and shows well to management. (TRUE or FALSE)

*FALSE.* Low-fidelity wireframes *CANNOT* test performance and *DOES NOT* show well to management.

The objective of design is to quickly and vaguely describe how the new system will be implemented. (TRUE or FALSE)

*FALSE.* The objective of design is to *describe in detail* how the new system will be implemented

To most users, the user interface is not the system. (TRUE or FALSE)

*FALSE.* To most users, the user interface *IS* the system.

User Experience (UX) involves only a single aspect of someone's interactions with the system. (TRUE or FALSE)

*FALSE.* UX involves *every aspect* of someone's interactions with the system

Uses Cases that have common actors and event decomposition or implement CRUD actions for same class are bad candidates to be grouped in a single menu. (TRUE or FALSE)

*FALSE.* Uses Cases that have common actors and event decomposition or implement CRUD actions for same class are *GOOD* candidates to be grouped in a single menu.

When creating a Design Class Diagram (DCD), you should not determine the classes from the domain class diagram relevant to the use case. (TRUE or FALSE)

*FALSE.* When creating a Design Class Diagram (DCD), you *SHOULD* determine the classes from the domain class diagram relevant to the use case.

Match the statements with the appropriate terms (Mobile, Social Media, Cloud) I. BYOD, mic and camera hardware enables mobile to be used as a surveillance device II. Theft of data, Denial-of-Service attacks, redirect traffic to other potentially harmful malicious content III. Social engineering, trusted voice to others (e.g., did you see this video - coming from user - that redirects to malicious content)

*I. Mobile* *II. Cloud* *III. Social Media*

Asymmetric Key Encryption is also known as public key encryption. (TRUE or FALSE)

*TRUE*

Design is a model building activity. (TRUE or FALSE)

*TRUE*

DevOps is a cross-functional mode. (TRUE or FALSE)

*TRUE*

Eliminating any of the three Method-Opportunity-Motive (MOM) framework, will lead to an unsuccessful attack. (TRUE or FALSE)

*TRUE*

Menus should contain at most 5 to 10 choices. (TRUE or FALSE)

*TRUE*

Navigation arrows may be bidirectional. (TRUE or FALSE)

*TRUE*

Technology Architecture can enable or constrain what your system can do. (TRUE or FALSE)

*TRUE*

UX Design is also called User-Centered Design (TRUE or FALSE)

*TRUE*

__________________ outline the things we want people to be able to do with the content, e.g. download a white paper. A. Functional Specifications B. Functional Requirements C. Content Requirements D. Functional Outlines

*A. Functional Specifications*

Users might say: "it's easy to use, it looks nice, it feels simple, and the goals are clear", about what type of interface? A. Good B. Bad

*A. Good*

____________ is used to support security by directing messages to an intermediate class as in a firewall A. Indirection B. Cohesion C. Protection from Variations D. Dr. Huber's Cybersecurity Class

*A. Indirection*

"Refers to the combination of organization, labelling, and navigation schemes comprising an information system" best describes which term? A. Information Architecture B. Technlogy Architecture C. Servlet Architecture D. Interface Architecture

*A. Information Architecture*

6. Jumping to programming without design often causes ___________? A. Less than optimal solutions and may require rework B. More than optimal solutions and absolutely no rework C. Less optimal solutions and absolutely no rework D. More than optimal solutions and may require rework

*A. Less than optimal solutions and may require rework*

Classes with ________ cohesiveness are hard to maintain because they are (a) overly sensitive to changes in the system, (b) difficult to understand, and (c) difficult to reuse such classes A. Low B. Medium C. High D. No

*A. Low*

___________ cohesiveness of class responsibilities are broad or makeshift. A. Low B. Medium C. High D. No

*A. Low*

"Use paper, index cards, stickies, markers, prototyping tools" is best described by which term? A. Low-fidelity B. Medium-fidelity C. High-fidelity D. None of the Above

*A. Low-fidelity*

"Skill, knowledge, tools, etc. with which to attempt an attack" best describes which term? A. Method B. Mitigation C. Opportunity D. Motive

*A. Method*

"When a class is passed a parameter (usually through a method call) references another object" best describes which term? A. Parameter Navigation Visibility B. Attribute Navigation Visibility C. Navigation Visibility D. None of the Above

*A. Parameter Navigation Visibility*

- Create problem domain (persistent) classes - Process all business rules with appropriate logic - Prepare persistent classes for storage to the database The statements above best describe which layer? A. Problem Domain Layer B. Data Access Layer C. View Layer D. Design Layer

*A. Problem Domain Layer*

"A design principle that states parts of a system unlikely to change are separated (protected) from those that will surely change" best describes which term? A. Protection from Variations B. Cohesion C. Design Pattern D. Indirection

*A. Protection from Variations*

Match each step with the best term. - Step 1: Give a group of users all the screens from your system printed on cards. Ask them to create categories by grouping similar pages together and then name the category - Step 2: Then give these same screens and derived categories to another group of users. Ask them to categorize the screens under the given categories A. Step 1 - Open Card Sorting, Step 2 - Closed Card Sorting B. Step 1 - Closed Card Sorting, Step 2 - Open Card Sorting C. Step 1 and 2 are both Open Card Sorting

*A. Step 1 - Open Card Sorting, Step 2 - Closed Card Sorting*

"The 'how' plane; how much content is there? How is it organized? How is it prioritized? " best describes which plane of the UX Design? A. Structure B. Strategy C. Safety D. Skeleton

*A. Structure*

"The inputs and outputs that require minimal human intervention" best describes which term? A. System Interface B. System Information C. Technical Interface D. Interfacebook

*A. System Interface*

"Use technology to counter threats" best describes this security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*A. Technician Controls*

Encryption and access controls are examples of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*A. Technician Controls*

Firewalls are examples of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*A. Technician Controls*

Passwords are examples of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*A. Technician Controls*

"Limit a person's ability to access servers, files, data, applications" best describes which term? A. Security Controls B. Access Controls C. Physical Controls D. Data Controls

*B. Access Controls*

"Accomplished by adding an object reference variable to a class" best describes which term? A. Parameter Navigation Visibility B. Attribute Navigation Visibility C. Navigation Visibility D. None of the Above

*B. Attribute Navigation Visibility*

Users might say: "I'm confused, it feels to complex, the goals are not clear, it doesn't work, this feels weird", about what type of interface? A. Good B. Bad

*B. Bad*

__________ informs navigation & structure; insights to mental models of user. A. Common Actor B. Card Sorting C. Card Shuffle D. CRUD Sorting

*B. Card Sorting*

"The ability of a system to ensure that assets are viewable only by authorized parties" best describes which term? A. Complexity B. Confidentiality C. Integrity D. Availability

*B. Confidentiality*

"Consistency across releases over time" best matches which principle for good user interface design? A. Closure B. Continuity C. Consistency D. Call Me Maybe

*B. Continuity*

*Problem:* Deciding how to handle all of the messages from the view layer to classes in the problem domain layer *Solution:* Assign one class between the view layer and the problem domain layer that receives all messages and acts as a switchboard directing messages to the problem domain The statements above best describe which term? A. Design Pattern B. Controller Pattern C. Use Case Pattern D. Use Case Controller

*B. Controller Pattern*

- Establish and maintain connections to the database - Contain all SQL statements - Process result sets (SQL execution results) into appropriate domain objects - Disconnect gracefully from the database The statements above best describe which layer? A. Problem Domain Layer B. Data Access Layer C. View Layer D. Design Layer

*B. Data Access Layer*

"A culture and practice, a methodology for software engineering" best describes which term? A. Continuous Deployment B. DevOps C. Continuous Integration D. Technology Tools

*B. DevOps*

"Mathematical transformation of the data" best describes which term? A. String Encryption B. Encryption Algorithm C. Encryption Key D. Decryption

*B. Encryption Algorithm*

To ensure interoperability, system designers must (Identify the False Statements): A. Understand the environment and make sure system can operate in current environment B. Create/purchase and use new software C. Build components considering interoperability D. Diverging all components into a discrete system

*B. FALSE* System designers should, *reuse software existing components* (purchased or in-house) *D. FALSE* System designers should *combine all components into a solution system*

The front of a CRC Card has _____________, ____________, ___________ and the back has ______________. A. Front: Class Name, Attributes, Responsibilities; Back: Collaborating Classes B. Front: Class Name, Collaborating Classes , Responsibilities; Back: Attributes C. Front: Class Name, Collaborating Classes , Features; Back: Attributes D. None of the Above

*B. Front: Class Name, Collaborating Classes , Responsibilities; Back: Attributes*

"Design that describes how information should be organized best describes what term? A. Activity Design B. Information Design C. Interface Design D. Interaction Design

*B. Information Design*

"We design use case by use case; involve users heavily in designing the user interface; sketch - wireframe - mockup" best describes which term? A. Information Dialog B. Information Design C. Technology Design D. Interface Design

*B. Information Design*

The Skeleton Plane is made up of: A. Information Design, Map-Based Design, Interface Design B. Information Design, Navigation Design, Interface Design C. Integrity Design, Navigation Design, Interface Design D. Artificial Design, Map-Based Design, Interface Design

*B. Information Design, Navigation Design, Interface Design*

In regards to System Interface, ____________ are captured automatically or from other systems and __________ direct to other systems. A. Outputs, Inputs B. Inputs, Outputs C. Data, Design D. Design, Data

*B. Inputs, Outputs*

If deciding between two alternative designs, choose the one where overall coupling is _______. A. More B. Less C. Hard D. Complex

*B. Less*

When an object of a class *receives* a message, that message becomes a _______ in the class on the DCD. A. Message B. Method C. Model D. Attribute

*B. Method*

"Use commands or agreements that require or advise people to act in certain ways" best describes this security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*B. Procedural and Administrative Controls*

Copyrights, patents, and trade secrets are examples of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*B. Procedural and Administrative Controls*

Laws, contracts, and regulations are examples of what security control? A. Technician Controls B. Procedural and Administrative Controls C. Physical Controls

*B. Procedural and Administrative Controls*

Architects pay more attention to ___________ that arise from architecture choices. A. Quantity B. Quality C. Data Analytics D. User Stories

*B. Quality*

"Readable txt for all users (type, size, color)" best matches which principle for good user interface design? A. Usability B. Readability C. Discoverability D. Visibility

*B. Readability*

"The 'what' plane, as in "what are we doing?"; outlines all the features and functions that are going to help achieve the goals in strategy" best describes which plane of the UX Design? A. Strategy B. Scope C. Skeleton D. Surface

*B. Scope*

C-I-A = the ___________ triad A. Systems B. Security C. Threat D. Attack

*B. Security*

What should you do prior to creating a Design Sequence Diagram? A. Cry and just take the "L" B. Select Classes from the Design Class Diagram C. Select Stories from the Storyboard D. Select Objects from Java

*B. Select Classes from the Design Class Diagram*

What is the objective of the process of "design"? A. To protect valuable assets such as a computer system's information assets B. To define, organize, and structure the components of the final solution to serve as a blueprint for construction C. To verify identity of users through design identification and authentication D. To optimize on-screen elements by limiting a person's ability to access data

*B. To define, organize, and structure the components of the final solution to serve as a blueprint for construction*

A university website that groups "Students, Faculty & Staff, Alumni, Parents, Visitors, Community, Companies" is an example of what? A. Uses Cases that have multiple factors B. Use Cases that have common actors C. Use Cases with open card sorting

*B. Use Cases that have common actors*

What is/are created to capture functionality? A. Business requirements B. User stories C. Case studies D. Infographics

*B. User stories*

Place the steps of the use of a Digital Certificate in the appropriate order. 1 - Client generates a secret key to be used for the session and encrypts it with the server's public key 2 - Client verifies certificate signer is a trusted certifying authority and authenticates server 3 - Client sends request to connect to secure server 4 - Server uses its private key to decrypt secret session key 5 - Client and server communicate securely using the secret session key 6 - Server sends signed digital certificate (containing server's public key) 7 - Client sends encrypted secret session key A. 7-6-2-1-3-5-4 B. 3-6-2-7-1-4-5 C. 3-6-2-1-7-4-5 D. 3-6-2-7-1-5-4

*C. 3-6-2-1-7-4-5*

If there are 35 use cases, what is the initial estimate of number of menus? A. 18 B. 5 C. 7 D. 70

*C. 7* Divide 35 by 5, which equals 7

Design _____________ between the requirements and actual implementation. A. Divides the gap B. Widens the gap C. Bridges the gap D. Creates the gap

*C. Bridges the gap*

_____________ are useful for showing a different view of the use case that emphasizes coupling and it also shows the same information as a sequence diagram. A. Connection Diagrams B. Controller Diagrams C. Communication Diagrams D. All of the Above

*C. Communication Diagrams*

"Across platforms; within a suite of application; within a particular application" best matches which principle for good user interface design? A. Closure B. Continuity C. Consistency D. Catch me ousside

*C. Consistency*

"A step in which all code is merged as developers complete code in order to run automated builds and tests" best describes which term? A. Continuous Deployment B. DevOps C. Continuous Integration D. Technology Tools

*C. Continuous Integration *

"A quantitative measure of how closely related classes are linked" best describes which term? A. Connection B. Navigation Arrow C. Coupling D. Class Relations

*C. Coupling*

How will data be captured, structured, and stored for later used by the information system? A. Describe the environment B. Design the application components C. Design the database D. Design the user interface

*C. Design the database*

What internal structure for each application component will ensure efficient construction, rapid deployment, and reliable operation? A. Design the database B. Design the application components C. Design the software classes and methods D. Design the user interface

*C. Design the software classes and methods*

"Technique where a document is encrypted using a private key, but then can only be decrypted with correct public key" best describes which term? A. Digital Certificate B. Digital Authority C. Digital Signature D. Digital Server

*C. Digital Signature*

In order to get the initial estimate of number of menus, you should: A. Multiply the number of use cases by 2 B. Subtract the number use cases by the average C. Divide the number of use cases by 5 D. Divide the number of use cases by 2

*C. Divide the number of use cases by 5*

Design class diagram (DCD) focuses on ________ layer. A. Attribute B. Technical C. Domain D. Design

*C. Domain*

"A long data string that allows the same algorithm to produce unique encryptions" best describes which term? A. String Encryption B. Encryption Algorithm C. Encryption Key D. Decryption

*C. Encryption Key*

A _______ interface can create a ________ experience and a _______ interface can create a ________ experience. A. Good, negative; Bad, positive B. Good, positive; Bad, positive C. Good, positive; Bad, negative D. Bad, negative; Good, negative

*C. Good, positive; Bad, negative*

If deciding between two alternative designs, choose the one where overall cohesiveness is ______. A. Low B. Medium C. High D. Non-Existent

*C. High*

________ cohesiveness of all of a class responsibilities are consistent and make sense for purpose of the class. A. Low B. Medium C. High D. No

*C. High*

__________ coupling implies that change in one class ripples through many other classes in the system. A. Low B. Medium C. High D. No

*C. High*

"Wireframe is as close as possible to actual screen" is best described by which term? A. Low-fidelity B. Medium-fidelity C. High-fidelity D. None of the Above

*C. High-fidelity*

A controller class between UI classes and problem domain classes is an example of what? A. Protection from Variations B. Cohesion C. Indirection D. One Direction the Band

*C. Indirection*

"The ability of a system to ensure that assets are modifiable only by authorized parties" best describes which term? A. Accessibility B. Confidentiality C. Integrity D. Availability

*C. Integrity*

Harm to information systems can be affected in what four different ways? A. Interception, Interruption, Mitigation, Fabrication B. Intervention, Interruption, Modification, Fabrication C. Interception, Interruption, Modification, Fabrication D. Intervention, Interruption, Mitigation, Fabrication

*C. Interception, Interruption, Modification, Fabrication*

A "key point which is the ability of an application to interact with other software" best describes which term? A. Invisibility B. Interactivity C. Interoperability D. Implementation

*C. Interoperability*

What are the advantages of low-fidelity? A. Comprehensive and expensive to build; B. Hard to change C. Lack of polish does not affect user opinion of prototype D. Arts and crafts are fun

*C. Lack of polish does not affect user opinion of prototype* Other advantages include: Easy and inexpensive to build; cheap to change, many times

"The ability of one object to view and interact with another object" best describes which term? A. Google Maps Visibility B. Attribute Visibility C. Navigation Visibility D. Parameter Visibility

*C. Navigation Visibility*

"Provide a way out" best matches which principle for good user interface design? A. Readability B. Waze Maps C. Navigation D. Affordance

*C. Navigation*


Ensembles d'études connexes

Chapter 35, Chapter 36, Chapter 32, Chapter 33, Chapter 34

View Set

Chapter 2: Rivers, Cities, and First States

View Set

Engineering Management Chapter 4

View Set

Tutorial 3-Synapse And neurotransmission

View Set

Pathophysiology NCLEX Questions: Acid/Base Imbalance

View Set

Einstein - Basic Biography Facts

View Set

ATI Standard Quiz- Medical surgical Final

View Set

Marriage and Family Ch 7-14 Final Exam Review

View Set