Filters
Question type

Study Flashcards

A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

A) True
B) False

Correct Answer

verifed

verified

What are the ramifications of improper electronic recycling,when analysing the example of a single desktop computer?


A) One computer contains more than 700 chemicals that can be toxic to the environment
B) Computers in landfills can leak these toxic chemicals into our land, water and air
C) Computers contain high levels of mercury, lead and cadmium, all harmful toxins
D) All the answers are correct

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

The increased demand in technology devices has caused an increase in discarded devices,a phenomenon known as _______.


A) e-Waste
B) Grid computing
C) Ergonomic code
D) Electronic sustainability

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?


A) Grid computing
B) Smart phones
C) Utility computing
D) Computing services

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Explain the three components of a sustainable enterprise architecture,along with their business benefits.

Correct Answer

verifed

verified

Sustainable enterprise architecture iden...

View Answer

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called what?


A) Clones
B) Insiders
C) Sleepers
D) Hacktivists

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What do information security policies identify?


A) Imminent threats to the organisation
B) The best information security options
C) Rules required to maintain information security
D) All the answers are correct

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

When building a scalable system that can support new company developments,what are the key factors to consider?


A) Anticipating expected and unexpected growth
B) Organising and deploying additional resources
C) Understanding competitor products and services
D) Analysing the accessibility and availability of competitor systems

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What are the three business functions that enterprise architecture supports?


A) Supports operations, change and sustainability (the environment)
B) Supports operations, customers and e-waste
C) Supports operations, clients and servers
D) Supports information, change and business continuity planning

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What occurs when the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime?


A) Failover
B) Disaster recovery cost curve
C) Reliability
D) Maintainability

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Sean works at the local electrical company in Brisbane,which provides electricity to the entire city.This area is prone to floods.As the lead enterprise architect on the night shift,he has been asked to suggest ways the company can protect its IT infrastructure.Sean notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of service to Brisbane residents.What should he recommend his company implement?


A) Accessibility
B) Moore's law
C) Antivirus software
D) Fault tolerance

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which characteristics of well-designed information architecture support business operations?


A) Accessibility, availability, maintainability, portability, reliability, scalability, usability
B) Backup,recovery, disaster recovery plan, business continuity plan
C) Grid computing, cloud computing, and virtualisation
D) All the answers are correct

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What might change the way businesses operate,as well as the way people interact with technology?


A) Agile computing
B) Grid computing
C) Cloud computing
D) Smart grid computing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What does a business continuity plan (BCP) typically include?


A) How frequently the system backup is performed
B) Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
C) How quickly the system recovery needs to be performed
D) Where a hot site is located

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What does reliability ensure?


A) The system has the ability to operate in many different operating systems
B) The system is easy to learn and efficient and satisfying to use
C) The system is functioning correctly and providing accurate information
D) The time frames when the system is operational

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following sustainable enterprise architecture components is a collection of computers,often geographically dispersed,that are coordinated to solve a common problem?


A) Cloud computing
B) Grid computing
C) Virtualised computing
D) Database computing

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the below is not contributing to e-waste?


A) VCR
B) Automobile
C) Microwave
D) Computer

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A ________ hides inside other software,usually as an attachment or a downloadable file.It often masquerades as a benign or legitimate application but in fact does something completely different.

Correct Answer

verifed

verified

High availability occurs when a system is continuously operational at all times.

A) True
B) False

Correct Answer

verifed

verified

What has the ability to recover information or systems in the event of catastrophic disasters?


A) Recovery
B) Disaster recovery
C) Backup
D) Failback

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 73

Related Exams

Show Answer