SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 305 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 09 Nov 2017 My Price 10.00

standard protocol in the data communications world today:


1.      What is the common standard protocol in the data communications world today:

TCP/IP

NETBIOS

IPX/SPX

None of the above

2. A network encompasses the world is referred to as:

PAN

WAN

MAN

None of the above

3. What is the composition of the TCP/IP stack:

Quenet

Telnet, ftp, and http

Hpp and GUI

None of the above

4. Which type of network uses a token in passing data:

Ring

Star

Bus

None of the above

5. The internet is:

AOL

A linking of networks worldwide

Google

None of the above

6. Project managers work under a triple constraint which is:

Low, medium, and high

Scope, time, cost

Lifecycle, monitoring, closing

None of the above

7. A project is:

An ongoing process with continuous support

A temporary endeavor undertaken to create a unique product, service, or result

A daily process

None of the above

8. A program is:

A small group of related projects

All of the projects for all of the project managers in the group or PMO

A group of tools used by projects

None of the above

9. A project management office (PMO) is:

An organizational unit to centralize and coordinate the management of projects

An organization that manages project managers

A marketing organization for projects

None of the above

10. The practice of overlapping phases, normally done in sequence, is a schedule compression technique called:

Jockeying

Project Squeezing

Fast Tracking

None of the above

11. Primary role of a system owner in a system development project should be to:

Define the vision and scope of the project

Allow for business process redesign

Make sure that the proper technology has been implemented

Have a completely functional executive information system

None of the above

 12. Which of the following is NOT a project management cause of failed projects?

Shortcuts taken during the project

Lack of or imprecise targets

Inadequate systems analysis and design tools

Budget overruns

Schedule delays

13. The application of systems analysis methods to the goal of dramatically changing and improving the fundamental business processes of an organization, independent of technology is:

Total quality management

Continuous process improvement

Cause-and-effect analysis

Business process redesign

None of the above

14. Which of the following is an advantage of prototyping?

It encourages and requires active end-user participation.

It negates the need for the systems analysis phases.

It helps keep the scope and complexity of the system under control.

It can increase creativity because it encourages analysts, designers and end-users to look for better solutions.

None of the above

15. A term coined to collectively describe any information presented in a format other than traditional numbers, codes and words; including: graphics, sound, pictures and animation, is:

Multimodal

Graphical

Zoned

Multimedia

None of the above

16. Which of the following describes an act of human error or failure as a category of threat?

Piracy

Blackmail of information disclosure

Unauthorized access

Accidents

 17. Which of the following is a task that is performed during the analysis phase of developing an information security policy? ______

Gathering key reference material

Making sure that the policies are enforceable

Providing for policy distribution

Making certain that policy is written at a reasonable reading level, with minimal technical jargon and management terminology

18 . The most common organizational structure is one in which the Information Security Department reports to the ______ Department.

Insurance and Risk Management

Marketing

Information Technology

Customer Service

19. Which of the following activities is part of the risk assessment process?

Creating an inventory of information assets

Classifying and organizing information assets into meaningful groups

Assigning a value to each information asset

Calculating the risks to which assets are exposed in their current setting

 20. _____ allow only specific packets with a particular source, destination, and port address to pass through it.

Dynamic packet filtering firewalls

Packet filtering firewalls

Stateful inspection firewalls

Application-level firewalls

Attachments:

Answers

(5)
Status NEW Posted 09 Nov 2017 12:11 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y

Not Rated(0)