93%(119)111 out of 119 people found this document helpful
This preview shows page 11 - 15 out of 20 pages.
Question 281 out of 1 pointsOne modeling technique drawn from systems analysis and design thatcan provide an excellent way to illustrate how a business functions is a(n) ____.:Question 291 out of 1 points
The ____ is used to collect information directly from the end users and business managers.Question 300 out of 1 pointsThe ____ job functions and organizational roles focus on costs of system creation and operation, ease of use for system users, timeliness of system creation, and transaction response time.Question 310 out of 1 pointsWhich of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware?
Question 321 out of 1 pointsWithin an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common goal of making the organization function to meet its objectives.Question 330 out of 1 pointsThe elements required to begin the ____ process are a planning methodology; a policy environment to enable the planning process; anunderstanding of the causes and effects of core precursor activities, and access to financial and other resources.Question 341 out of 1 points____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations.
Question 351 out of 1 pointsA ____ deals with the preparation for and recovery from a disaster, whether natural or man-made.Question 361 out of 1 pointsThe term ____ refers to a broad category of electronic and human activities in which an unauthorized individual gains access to the information an organization is trying to protect.