Question: ______ employs a structured process called DMAIC, which stands for Define, Measure, Analyze, Improve, and Control.

Answer Options:
a. Greenbelts
b. Business Process Reengineering
c. FOCUS-PDCA
d. Six Sigma
e. Shewhart or Deming Cycle

Answer: d. Six Sigma

 

Question: As the use of personal devices for work has increased, the work of information security professionals has

Answer Options:
Increased
Decreased
None of the above
Stayed the same

Answer: Increased

 

Question: The ILOVEYOU virus is important to information security for

Answer Options:
Popularizing computers among the masses
Intruding into a number of high profile computer installations
Exposing the implications of international differences in cyber-law
Stealing commercial information by exploiting weakness in wireless networks

Answer: Exposing the implications of international differences in cyber-law

 

Question: White and Asian Nonelderly Adults have higher rates of employer-sponsored health insurance (ESI) due to other:

Answer Options:
a. Unemployment benefits
b. White and Asian adult ESI
c. White and Asian adults experience less racial discrimination in the labor and housing markets and therefore have more access to ESI
d. White and Asian adults are healthier
e. All of the above

Answer: e. All of the above

 

Question: Flowcharting is a quality improvement technique used for:

Answer Options:
a. Process mapping
b. Cause-effect analysis
c. Data collection
d. Geographical mapping
e. Process analysis

Answer: a. Process mapping

 

Question: The gang of 414 is famous in the information security literature for

Answer Options:
Stealing commercial information by exploiting weakness in wireless networks
Gaining unauthorized access to computers and systems
Developing an early prototype of a virus
Being the first known phishing attackers

Answer: Gaining unauthorized access to computers and systems

 

Question: Albert Gonzalez and TJ Maxx are well known in the information security literature for

Answer Options:
Stealing commercial information by exploiting weakness in wireless networks
Intruding into a number of high profile computer installations
Causing one of the most significant Internet outages ever
Falsification of financial records at publicly traded companies

Answer: Stealing commercial information by exploiting weakness in wireless networks

 

Question: The Internet is relevant for information security because

Answer Options:
It led to exploits from weakness in wireless networks
It exposed computers to attacks from around the world
It caused one of the most significant Internet outages ever
It caused falsification of financial records at publicly traded companies

Answer: It exposed computers to attacks from around the world

 

Question: The “failure to provide a service whose benefit is greater than its risk” is the definition of which of the following terms?

Answer Options:
a. Abuse
b. Overuse
c. Misuse
d. Underuse
e. Reuse

Answer: d. Underuse

 

Question: A desired competency for information security professionals is

Answer Options:
Accounting
Marketing
End user awareness
Financial planning

Answer: End user awareness

 

Question: Intuitive (N) People (MBTI):

Answer Options:
a. Are detail-oriented and trust facts
b. Seek out patterns in the facts and look for ‘the big picture’
c. Find energy in things and people
d. Find energy in the inner world of ideas and are reflective thinkers
e. All of the above

Answer: b. Seek out patterns in the facts and look for ‘the big picture’

 

Question: Individuals who are eligible for the Medicare program include:

Answer Options:
a. Adults 65 years of age or older
b. Adults with end-stage renal disease
c. Permanently disabled younger adults
d. All of these are correct.
e. None of these are correct.

Answer: d. All of these are correct.

 

Question: Which of the following is not included in the definition of Continuous Quality Improvement (CQI)?

Answer Options:
a. Process focus
b. Organization-wide impact
c. Employee empowerment
d. Structure focus
e. Data-based decision making

Answer: d. Structure focus