4
50) Which of the following statements about a project WBS is NOT true?
A WBS should be limited to a hundred or fewer tasks to allow for easier management
46) ________ is an example of a data safeguard against security threats.
Backup and recovery
38) Which of the following statements about identification and authentication is NOT true?
Because many users have to sign on to different systems with different usernames and passwords, it is a good practice to write down all of one's username/password combinations and store them in a convenient place.
21) ________ is the process of allowing future system users to try out the new system on their own.
Beta testing
The five phases of the system development life cycle include all the following, EXCEPT
Business Planning
9) According to the textbook, ________ is another, more common title given to the vice president of information systems.
CIO
7) ______________ occurs when extensive traffic is launched against a web server or other IT infrastructure components either inadvertently or maliciously in a way that shuts down the infrastructure component.
Denial of Service
Sources of security threats can be categorized in the following areas, EXCEPT
Denial of Service
25) Which of the following statements is true regarding inherent processes?
Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way.
24) Malware protection safeguards include all of the following, EXCEPT
Encrypt stored data and communications
22) The disadvantages of outsourcing include the following, EXCEPT __________.
Financial risk increase
42) The challenges for planning and managing a project include the following, EXCEPT
Finding effective project planning and management tools
45) Which of the following statements is NOT true regarding IS planning?
IS priorities are established by the IT department
Organizations should respond to security threats in the following ways, EXCEPT
Implement firewalls and other safeguards so that company applications and data can only be accessed from company premises
48) How does the global economy change the competitive environment?
It has intensified rivalry by increasing product and vendor choices.
31) The following are human safeguards against security threats, EXCEPT
Physical security of servers storing company data, including locked, controlled access facilities
12) Which of the following statements is true regarding the system conversion alternatives?
Plunge installations are generally the riskiest, and should be avoided where possible
10) Differences between traditional SDLC projects and those using agile development methodologies include the following, EXCEPT:
SDLC projects are estimated in terms of points (relative difficulty of tasks); whereas Agile projects are estimated in terms of schedule and workday budgets
33) When a company outsources an entire application - including hardware, software and data - what is the type of outsourcing they are utilizing?
Saas
5) Which of the following statements is NOT true regarding international IS management?
Scope and requirements definition is easier for international information systems due to the fact that you can look at each international unit's needs separately
36) The most important task for users on systems development projects is _______________.
Taking responsibility for the requirements
44) Which of the following statements about the SCRUM process is NOT true?
Teams of up to 20 members are ideal for SCRUM
35) Encryption is an example of which type(s) of safeguards against security threats?.
Technical and Data Safeguards
4) Which of the following is true for the various groups in an IS department?
The development group manages the process of creating new information systems.
47) Which of the following statements is NOT true regarding the SCRUM estimation process?
The number of points a team can accomplish each SCRUM period is called its capacity
20) Which of the following statements is NOT true regarding the rights and responsibilities for users of IT department service in general and information systems in particular?
Users have a responsibility to make hardware modifications to their computer on their own to increase its performance
39) Which of the following statements is NOT true regarding the responsibilities of job positions in the IS industry?
at the very end of the project
8) A plan, known as the ________, of a project stipulates the tasks to be accomplished, the labor and other resources assigned to those tasks, and the schedule for completion.
baseline
49) Which of the following components of an information system is least impacted by internationalization?
computer hardware
26) The ________ is the sequence of activities that determine the earliest date by which the project can be completed.
critical path
41) The primary purpose of the requirements analysis phase is to ________.
determine and document the specific features and functions of the new system
15) The primary responsibilities of the IS Department include all the following, EXCEPT___________.
determine business strategies and how to achieve competitive advantage
Which of the following is a technical safeguard against security threats?
identification and authorization
23) During the ________ phase of the SDLC process, developers construct, test, and install the components of the information system.
implementation
11) Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.
phishing
17) According to scrum essentials, the first step of each work period is to ________.
select requirements to consider
43) The ________ approach is the classical process used to develop information systems.
systems development life cycle (SDLC)
13) In the near future, billions of devices from everyday appliances to smartphones to automobiles will be connected online. This concept is commonly called
the internet of things
32) The bigger the system and the longer the project, ________.
the more the requirements change
30) Systems development projects require the balancing of three critical drivers: requirements, cost, and
time
18) One of the reasons for SDLC problems is the ___________ nature of the SDLC, which requires projects to operate in a sequence of non-repetitive phases despite the fact that often there is a need to repeat work in prior phases.
waterfall
14) Brook's Law related to the difficulty of the information systems development process says that
Adding more people to a late project makes the project later
6) Which of the following is NOT likely to be true in the future?
Less data will be available on the Internet about individuals
37) Which of the following is true regarding localizing?
Localization of computer programs should be planned from the very beginning.
28) Key components of a good security incident response plan include the following, EXCEPT _______________.
Make it simple enough so that practice is not necessary
3) Which of the following statements is NOT true regarding the impact of globalization on databases
Mirroring refers to the processing of a single database that resides in multiple locations
27) The advantages of outsourcing include the following, EXCEPT:
More control over resources
34) Which of the following future trends is MOST likely to occur?
More employees will need to be skilled in social media applications and business intelligence tools
19) Which of the following statements is NOT true regarding the impact of technology on business operations in the future?
More mobile devices using business applications will mean fewer security issues
Make it simple enough so that practice is not necessary
Organizations more often will purchase licenses to use software as part of their operations.