Filters
Question type

Study Flashcards

How do authentication and authorisation differ?

Correct Answer

verifed

verified

Authentication is a method of confirming...

View Answer

What determines future environmental infrastructure requirements that ensure high-quality system performance?


A) Capacity system
B) Capacity planning
C) Capacity function
D) Performance indicators

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

________ is a technique used to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.

Correct Answer

verifed

verified

Portability determines future environmental infrastructure requirements to ensure high-quality system performance.

A) True
B) False

Correct Answer

verifed

verified

__________ are one of the most ineffective ways of determining authentication.

Correct Answer

verifed

verified

Grid computing,cloud computing,and virtualisation are all elements of a(n) ________ enterprise architecture.


A) agile
B) sustainable
C) information
D) virtualised

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a backup.

A) True
B) False

Correct Answer

verifed

verified

Cloud computing could change not only the way businesses operate,but also the way people interact with technology.The Google family of applications,for example,is probably the most popular cloud computing service today.

A) True
B) False

Correct Answer

verifed

verified

The three primary areas of support provided by information architecture are backup and recovery,the disaster recovery plan,and the business continuity plan.

A) True
B) False

Correct Answer

verifed

verified

What is usability?


A) The system is easy to learn and efficient and satisfying to use
B) The system functions correctly and provides accurate information
C) The system allows varying levels of access
D) The system quickly transforms to support environmental changes

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Fault tolerance is an exact copy of a system's information.

A) True
B) False

Correct Answer

verifed

verified

What are the seven characteristics of an agile infrastructure architecture?


A) Accessibility, availability, maintainability, portability, reliability, scalability and usability
B) Accessibility, affordability, mobility, portability, reliability, scalability and usability
C) Accessibility, availability, mobility, penetrability, responsibility, sensibility and usability
D) Accessibility, affordability, functionality, changeability, constancy, sources and understanding

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Just as organisations protect their tangible assets-keeping their money in an insured bank or providing a safe working environment for employees-they must also protect their ________ capital: everything from patents to transactional and analytical information.

Correct Answer

verifed

verified

e-Waste is discarded electronics and is growing with increased innovation,for example,a business computer has a life expectancy of only two to four years and a mobile phone less than two years.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes how well a system can scale up,or adapt to the increased demands or growth?


A) Flexibility
B) Scalability
C) Reliability
D) Affordability

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is an example of sustainable enterprise architecture?


A) Cloud computing cluster
B) Cluster computing
C) Grid computing
D) All of the above are examples of sustainable enterprise architecture

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

________ can switch the order of characters,replace characters with other characters,insert or remove characters or use a mathematical formula to convert the information into a code.

Correct Answer

verifed

verified

Every company,regardless of size,relies on some form of enterprise architecture,whether it is a few personal computers networked together or many interconnected around the world.

A) True
B) False

Correct Answer

verifed

verified

Organisations address security risks through two lines of defence,namely:


A) technology and controls.
B) people and controls.
C) controls and detection technology.
D) people and technology.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A sustainable enterprise architecture identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 73

Related Exams

Show Answer