IS4414 MCQ

Is this your test? Login to manage it. If not, you can create a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
The most significant security issue with Cloud Computing is one of establishing jurisdiction - finding out what law applies to the protection of data.
2.
1 point
Risk is really about assessing the impacts of change in an organization.
3.
1 point
The set of principles governing the collection and use of information about individuals, which form the basis of most U.S. and European privacy laws, is called
4.
1 point
In essence a SLA is just another term for a contract for the provision of services.
5.
1 point
The ultimate management challenge for security of information within organizations is to ensure maximum control in order to secure information assets.
6.
1 point
Once a Project is well directed and led and once an effective Change Management programme is in place there is almost no boundary to the level of change which an organization can achieve.
7.
1 point
ERP software contains business logic which dictates to a large extent how business processes will be implemented.
8.
1 point
Enterprise software
9.
1 point
Change Management Competency is about
10.
1 point
In Change Management, Role to position mapping is about
11.
1 point
The main costs that arise as a result of badly managed change are those up front costs in implementing the change.
12.
1 point
The Scope of the service level management process involves the IT services organisation and the customer organisation together with Internal Departments and External Suppliers.
13.
1 point
Security Incidents as per ITIL, are
14.
1 point
After major function systems are in place, horizontal systems are created which automate business processes across
15.
1 point
A service is a set of coordinated activities combining and implementing resources and capabilities in order to produce an outcome, which, directly or indirectly, creates value for an external customer or stakeholder.
16.
1 point
The model of informed consent prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use is called
17.
1 point
Change management is about preparing the organization for the impacts of the new technical architectures which inevitably arise in the majority of ICT enabled projects.
18.
1 point
Confidentiality is concerned with protecting the accuracy and completeness of information and software
19.
1 point
Liability means assessing responsibility for decisions made and actions taken.
20.
1 point
A service Catalogue contains a description of IT services and levels which are specific to a particular area of an organisation.
21.
1 point
When companies work with suppliers and buyers to formulate demand forecasts, develop production plans and coordinate shipping, warehousing and stocking activities the process is called
22.
1 point
In data Security terms, which of the following is NOT a value derived from information
23.
1 point
Unplanned change can be described as
24.
1 point
In service management terms, Operational Level agreements are
25.
1 point
Data integrity is concerned with protecting the accuracy and completeness of information and software.
26.
1 point
Security Risk Analysis can be defined as
27.
1 point
The problem with patent protection is that digital media cannot be patented.
28.
1 point
A business function is a collection of related business tasks undertaken to achieve a specific business objective.
29.
1 point
A denial of service attack involves hackers attempting to disrupt a network by hiding their true identity or by misrepresenting themselves.
30.
1 point
The co-ordination of the internal processes of the firm by integrating data from manufacturing and distribution, finance, sales and human resources creates a(n)
31.
1 point
Bounded change is difficult to manage because its scope and impacts cannot be fully determined.
32.
1 point
Security Management is
33.
1 point
In Information Security terms, Confidentiality means
34.
1 point
The situation in which one accepts the potential costs duties and obligations for the decisions made is called
35.
1 point
SLM is the process of managing a delivered IT service using formal SLAs.