81. In maintenance, which of the following is most risky?
a. Local maintenance
b. Scheduled maintenance
c. Nonlocal maintenance
d. Unscheduled maintenance
81. c. Nonlocal maintenance work is conducted through either an external network (mostly through the Internet) or an internal network. Because of communicating across a network connection, nonlocal maintenance work is most risky. Local maintenance work is performed without communicating across a network connection. For local maintenance, the vendor brings the hardware and software into the IT facility for diagnostic and repair work, which is less risky. Local or nonlocal maintenance work can be either scheduled or unscheduled.
82. The IT operations management of RDS Corporation is concerned about how to increase its data storage capacity to meet its increased growth in business systems. Based on a storage management consultant’s report, the RDS management is planning to install redundant array of independent disks 6 (RAID6), which is a block-level striping with double distributed parity system to meet this growth. If four disks are arranged in RAID6 where each disk has a storage capacity of 250GB, and if space efficiency is computed as [1-(2/n)] where “n” is the number of disks, how much of this capacity is available for data storage purposes?
a. 125GB
b. 250GB
c. 375GB
d. 500GB
82. d. The RAID6 storage system can provide a total of 500GB of usable space for data storage purposes. Space efficiency represents the fraction of the sum of the disks’ capacities that is available for use.
Space efficiency = [1−(2/n)] = [1−(2/4)] = 1−0.5= 0.5
Total available space for data storage = 0.5 × 4 × 250 = 500GB
83. In redundant array of independent disks (RAID) technology, when two drives or disks have a logical joining, it is called:
a. Disk concatenation
b. Disk striping
c. Disk mirroring
d. Disk replication
83. a. Disk concatenation is a logical joining of two series of data or disks. In data concatenation, two or more data elements or data files are often concatenated to provide a unique name or reference. In disk concatenation, several disk address spaces are concatenated to present a single larger address spaces.
The other three choices are incorrect. Disk striping has more than one disk and more than one partition, and is same as disk arrays. Disk mirroring occurs when a file server contains two physical disks and one channel, and all information is written to both disks simultaneously. Disk replication occurs when data is written to two different disks to ensure that two valid copies of the data are always available.
84. All the following are needed for a timely and emergency maintenance work to reduce the risk to an organization except:
a. Maintenance vendor service-level agreement
b. Spare parts inventory
c. Help-desk staff
d. Commercial courier delivery service agreement
84. c. Information system components, when not operational, can result in increased risk to organizations because the security functionality intended by that component is not being provided. Examples of security-critical components include firewalls, hardware/software guards, gateways, intrusion detection and prevention systems, audit repositories, and authentication servers. The organizations need to have a maintenance vendor service-level agreement, stock spare parts inventory, and a delivery service agreement with a commercial transportation courier to deliver the required parts on time to reduce the risk of running out of components and parts.
Help-desk staff, whether they are internal or external, are not needed for all types of maintenance work, whether it is scheduled or unscheduled, or whether it is normal or emergency. Their job is to help system users on routine matters (problems and issues) and escalate them to the right party when they cannot resolve these matters.
85. Which of the following is the basis for ensuring software reliability?
a. Testing
b. Debugging
c. Design
d. Programming
85. c. The basis for software reliability is design, not testing, debugging, or programming. For example, using the top-down design and development techniques and employing modular design principles, software can be made more reliable than otherwise. Reliability is the degree of confidence that a system will successfully function in a certain environment during a specified time period.
Testing is incorrect because its purpose is to validate that the software meets its stated requirements. Debugging is incorrect because its purpose is to detect, locate, and correct faults in a computer program. Programming is incorrect because its purpose is to convert the design specifications into program instructions that the computer can understand.
86. In software configuration management, changes to software should be subjected to which of the following types of testing prior to software release and distribution?
a. Black-box testing
b. Regression testing
c. White-box testing
d. Gray-box testing
86. b. Regression testing is a method to ensure that changes to one part of the software system do not adversely impact other parts. The other three choices do not have such capabilities. Black-box testing is a functional analysis of a system, and known as generalized testing. White-box testing is a structural analysis of a system, and known as detailed testing or logic testing. Gray-box testing assumes some knowledge of the internal structures and implementation details of the assessment object, and known as focused testing.
87. Which of the following software quality characteristics is difficult to define and test?
a. Functionality
b. Reliability
c. Usability
d. Efficiency
87. c. Usability is a set of attributes that bear on the effort needed for use, and on the individual assessment of such use, by a stated or implied set of users. In a way, usability means understandability and ease of use. Because of its subjective nature, varying from person to person, it is hard to define and test.
Functionality is incorrect because it can easily be defined and tested. It is a set of attributes that bear on the existence of a set of functions and their specified properties. The functions are those that satisfy stated or implied needs. Reliability is incorrect because it can easily be defined and tested. It is the ability of a component to perform its required functions under stated conditions for a specified period of time. Efficiency is incorrect because it can easily be defined and tested. It is the degree to which a component performs its designated functions with minimum consumption of resources.