Question: Economic, Technological, Sociocultural, International, Political-Legal, Demographic are all considered part of what?

Answer Options:

(A) the synergistic approach.
(B) the macro environment.
(C) corporate spying.
(D) management by observation.
(E) competitive intelligence.

Answer: (B) the macro environment.

 

Question: Many customers shop at Organic Foods because of the employees’ extensive product knowledge. In a SWOT analysis, the employees’ high levels of product knowledge are an example of the company’s

Answer Options:

(A) strengths.
(B) threats.
(C) weaknesses.
(D) opportunities.
(E) intelligence.

Answer: (A) strengths.

 

Question: _______ is the process by which a company compares its performance with that of high-performing organizations.

Answer Options:

(A) Trend analysis.
(B) Synergy.
(C) Contingency planning.
(D) Forecasting.
(E) Benchmarking.

Answer: (E) Benchmarking.

 

Question: The global organization that is responsible for monitoring and enforcing trade agreements is called the _______.

Answer Options:

(A) WTO.
(B) World Bank.
(C) IMF.
(D) The Board of Directors.
(E) The Executives of the Company.

Answer: (A) WTO.

 

Question: The most popular implementation of asymmetric key encryption is

Answer Options:

Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
Advanced Encryption Standard (AES)
Rivest, Shamir and Adleman (RSA)

Answer: Rivest, Shamir and Adleman (RSA)

 

Question: A benefit of using firewalls is that

Answer Options:

It can defend the organization even if an internal computer is compromised
It can protect servers accessible from the internet (e.g., web, email servers)
It can block traffic from any identified host or network
Its effectiveness depends upon the abilities of the administrator

Answer: It can block traffic from any identified host or network

 

Question: SSH is used for

Answer Options:

Secure web browsing
Secure access to direct access to a remote computer
Electronic commerce by end users
Espionage

Answer: Secure access to direct access to a remote computer

 

Question: All the following are properties of asymmetric key encryption, except

Answer Options:

It makes it easy to exchange the encryption key
It uses two keys
It is computationally simple
The key used for encryption cannot be used for decryption

Answer: It is computationally simple

 

Question: Information security controls are commonly classified in the industry as

Answer Options:

Confidentiality, integrity and availability controls
Firewalls, passwords and anti-virus systems
Militarized and de-militarized zones
Procedural, physical and technical controls

Answer: Procedural, physical and technical controls

 

Question: Most commercial encryption technologies such as SSL and VPN

Answer Options:

Combine the best features of symmetric and asymmetric key encryption
Use only symmetric key encryption
Use only asymmetric key encryption
Allow the user to choose whether to use symmetric or asymmetric key encryption

Answer: Combine the best features of symmetric and asymmetric key encryption

 

Question: Redundancy is

Answer Options:

Scheduling periodic maintenance to improve availability
Hiding information to provide confidentiality
The provision of surplus service capacity to improve availability
None of the above

Answer: The provision of surplus service capacity to improve availability

 

Question: Controls are

Answer Options:

Weaknesses in an information system that can be exploited to compromise information security
Capabilities, intentions and methods of adversaries to compromise information security
Measures taken to mitigate the dangers from information security threats
Restrictions on information to protect personal privacy

Answer: Measures taken to mitigate the dangers from information security threats

 

Question: Integrity is defined as

Answer Options:

Guarding against improper modification of information to ensure authenticity
Maintaining restrictions on information to protect personal privacy
Ensuring timely and reliable use of information
None of the above

Answer: Guarding against improper modification of information to ensure authenticity

 

Question: Virtual memory is

Answer Options:

The smallest sequence of instructions an OS can manage independently
Storehouse of computer data that can be accessed directly by the CPU and I/O devices
A technique to take up space on the hard drive and use it as an extension of the main memory
Provided by operating systems

Answer: A technique to take up space on the hard drive and use it as an extension of the main memory

 

Question: Threads of a process share all of the following except

Answer Options:

Code
Global variables
Open files
Register values

Answer: Register values

 

Question: A process state is

Answer Options:

The present condition of the process
The sequence of operations that allow a computer to perform its tasks
The smallest sequence of instructions an OS can manage independently
The invocation of an operating system function by a user program

Answer: The present condition of the process

 

Question: Modern computers distinguish between operating system code and end user code by

Answer Options:

Looking at the process id
Setting the mode bit
Invoking the right API
Displaying the user account control window

Answer: Setting the mode bit

 

Question: What are the four main functions of management? Name each and define what each means to a manager.

Answer: Planning: Defining goals, establishing strategies to achieve goals, and developing plans to integrate and coordinate activities. Organizing: Determining what tasks are to be done, who is to do them, how the tasks are to be grouped, who reports to whom, and where decisions are to be made. Leading: Motivating, directing, and otherwise influencing people to work hard to achieve the organization’s goals. Controlling: Monitoring activities to ensure they are being accomplished as planned and correcting any significant deviations.