Question: ______ employs a structured process called DMAIC, which stands for Define, Measure, Analyze, Improve, and Control.
Answer Options:
a. Greenbelts
b. Business Process Reengineering
c. FOCUS-PDCA
d. Six Sigma
e. Shewhart or Deming Cycle
Answer: d. Six Sigma
Question: As the use of personal devices for work has increased, the work of information security professionals has
Answer Options:
Increased
Decreased
None of the above
Stayed the same
Answer: Increased
Question: The ILOVEYOU virus is important to information security for
Answer Options:
Popularizing computers among the masses
Intruding into a number of high profile computer installations
Exposing the implications of international differences in cyber-law
Stealing commercial information by exploiting weakness in wireless networks
Answer: Exposing the implications of international differences in cyber-law
Question: White and Asian Nonelderly Adults have higher rates of employer-sponsored health insurance (ESI) due to other:
Answer Options:
a. Unemployment benefits
b. White and Asian adult ESI
c. White and Asian adults experience less racial discrimination in the labor and housing markets and therefore have more access to ESI
d. White and Asian adults are healthier
e. All of the above
Answer: e. All of the above
Question: Flowcharting is a quality improvement technique used for:
Answer Options:
a. Process mapping
b. Cause-effect analysis
c. Data collection
d. Geographical mapping
e. Process analysis
Answer: a. Process mapping
Question: The gang of 414 is famous in the information security literature for
Answer Options:
Stealing commercial information by exploiting weakness in wireless networks
Gaining unauthorized access to computers and systems
Developing an early prototype of a virus
Being the first known phishing attackers
Answer: Gaining unauthorized access to computers and systems
Question: Albert Gonzalez and TJ Maxx are well known in the information security literature for
Answer Options:
Stealing commercial information by exploiting weakness in wireless networks
Intruding into a number of high profile computer installations
Causing one of the most significant Internet outages ever
Falsification of financial records at publicly traded companies
Answer: Stealing commercial information by exploiting weakness in wireless networks
Question: The Internet is relevant for information security because
Answer Options:
It led to exploits from weakness in wireless networks
It exposed computers to attacks from around the world
It caused one of the most significant Internet outages ever
It caused falsification of financial records at publicly traded companies
Answer: It exposed computers to attacks from around the world
Question: The “failure to provide a service whose benefit is greater than its risk” is the definition of which of the following terms?
Answer Options:
a. Abuse
b. Overuse
c. Misuse
d. Underuse
e. Reuse
Answer: d. Underuse
Question: A desired competency for information security professionals is
Answer Options:
Accounting
Marketing
End user awareness
Financial planning
Answer: End user awareness
Question: Intuitive (N) People (MBTI):
Answer Options:
a. Are detail-oriented and trust facts
b. Seek out patterns in the facts and look for ‘the big picture’
c. Find energy in things and people
d. Find energy in the inner world of ideas and are reflective thinkers
e. All of the above
Answer: b. Seek out patterns in the facts and look for ‘the big picture’
Question: Individuals who are eligible for the Medicare program include:
Answer Options:
a. Adults 65 years of age or older
b. Adults with end-stage renal disease
c. Permanently disabled younger adults
d. All of these are correct.
e. None of these are correct.
Answer: d. All of these are correct.
Question: Which of the following is not included in the definition of Continuous Quality Improvement (CQI)?
Answer Options:
a. Process focus
b. Organization-wide impact
c. Employee empowerment
d. Structure focus
e. Data-based decision making
Answer: d. Structure focus