IT Management chapters 1-3
two of more what depend on the predecessor task?
Concurrent task
When a project manager first recognizes that a project is in trouble, one of the options available to the manager includes what?
delaying the project deadline
In addition to tasks, every project has events, or milestones.
true or false
True
Weight is an importance value that is added to each duration estimate.
true or false?
True
A project manager should never develop time and cost estimates based on the resources used for previously developed information systems?
true or false?
False
A what displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more detail?
network diagram
A condition, restriction, or requirement that a system must satisfy
Constraint
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
Hardware Security Module (HSM)
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
The areas of a file in which steganography can hide data include all of the following EXCEPT
in the directory structure of the file system
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should be rare
Which of these is NOT a basic security protection for information that cryptography can provide?
Risk loss
Which of the following key exchanges uses the same keys each time?
Diffie-Hellman (DH)
Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?
verify the receiver
Public key systems that generate random public keys that are different for each session are called what?
perfect forward secrecy
Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor.
Which of the following did he choose?
RSA
At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. losif raised his hand and said that security through obscurity was a poor idea. Why did he say that?
It depends too heavily upon non-repudiation in order for it to succeed.
Which of these is the strongest symmetric cryptographic algorithm?
Advanced Encryption Standard
The Hashed Message Authentication Code(HMAC) does what?
encrypts the key and the message
Proving that a user sent an email message is known as what?
non-repudiation
When planning an information system, a company must consider how a new system will interface with older systems, which are called?
legacy systems
In a typical company organizational model, middle managers?
provide direction, necessary resources, and performance feedback to supervisors and team
leaders
When planning an information system, a company must consider how a new system will interface with older systems, which are called?
legacy systems
In a typical company organizational model, middle managers?
provide direction, necessary resources, and performance feedback to supervisors and team
leaders
The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation?
true or false?
False
what includes ongoing support and maintenance costs, as well as acquisition costs?
Total cost of ownership (TCO)
in system development life cycle the purpose of what is to create a physical model?
systems design phase
When several tasks can start at the same time, each is called a(n) what task?
Concurrent
A task that cannot be started until one or more other
tasks are completed.
dependent task
Projects where management has a choice in implementing them are called what?
discretionary projects
usually focus on long-term challenges and goals, the importance of a firm's stakeholders, and a
commitment to the firm's role
Mission Statement
It is easier to assign dollar values to intangible than to tangible benefits
true or false?
False
is an analysis tool that represents the possible causes of a problem as a graphical outline
A fishbone diagram
Agile methodology primarily uses what model?
incremental model
During the
what of the
systems development life cycle (SDLC), the IT staff maintains, enhances, and protects the system?
systems support and security
what is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyse, test, and modify?
Modelling
Of the measures of feasibility, questions such as "Does the proposed platform have sufficient capacity for future needs?"
Technical Feasibility
If team members lack experience with certain aspects of the required technology, temporary help might be obtained from IT consultants or part-time staff.
true or false?
True
what limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced?
Performance
tradtional models are still used but so called nosql databases are gaining in popularity due to their ability to scale extremely large and ustructed datasets
true or false
True
the result of each phase is called adeliverable, which flows into the next phase.
In thewaterfall model,
Business support systems do what?
provide job related information support to user of all levels at a company
what is a full-featured program that holds the dominant share of the
project management software market?
Microsoft project
A feasibility study includes tests for
feasibility, which means that a proposed system will be used effectively
after it has been
developed
Operational feasibility
A continuous risk-tracking process can do what?
notice changes