Question: The CRUD matrix shows:

Answer Options:

The crud that is coming into the system and how to quarantine it Exactly how data are used and created by the major processes in the system The 1 relationships on an ERD diagram The external entities, process and major data flows from the Context DFD diagram Where customers, relationships, users and developers will interact with a system

Answer: Exactly how data are used and created by the major processes in the system

 

Question: One common method to increase access speed is to:

Answer Options:

Use legacy databases in an indexed sequential access method Encrypt all data with 256 byte encryption Denormalize the tables Delete all primary keys Only use alphabetic data

Answer: Denormalize the tables

 

Question: Frame relay specifies data rates in the range of

Answer Options:

56 kbps – 45 mbps 50.112 mbps – 150.336 mbps 1.544 mbps – 622.08 mbps 56 kbps – 2 mbps

Answer: 56 kbps – 45 mbps

 

Question: Virtual circuits are used with

Answer Options:

All WAN technologies Point-to-point WANs Statistical multiplexed WANs None of the above

Answer: Statistical multiplexed WANs

 

Question: Information security is becoming increasingly important because of

Answer Options:

There is a general increase in criminal behavior in society The increasing criticality of information to individuals and organizations People are greedier these days Organizations are wealthier these days

Answer: The increasing criticality of information to individuals and organizations

 

Question: Many users are vulnerable to

Answer Options:

Stolen usernames and passwords from a compromised site being used to compromise their bank accounts Hackers compromising the IT systems at large financial institutions Attacks on ATM machines Demands for usernames and passwords at gunpoint

Answer: Stolen usernames and passwords from a compromised site being used to compromise their bank accounts

 

Question: The biggest time-consuming activity for most information security professionals is

Answer Options:

Fixing software bugs Responding to information security incidents Researching new technologies Helping customers

Answer: Responding to information security incidents

 

Question: Desired competencies for information security professionals include all of the following except

Answer Options:

Risk management Forensics Secure SDLC Marketing

Answer: Marketing

 

Question: The authors of this study hypothesize which of the following?

Answer Options:

A. Sex is an important variable in racial identification.
B. Socio-economic status is the key variable in racial identification.
C. Skin color is an important variable in racial identification.
D. Racial identification is multi-variable with no one factor more important than others.

Answer: C. Skin color is an important variable in racial identification.

 

Question: Which conclusion cannot be drawn from the data presented in Table 1?

Answer Options:

A. The number of subjects in the study.
B. The distribution of white colored subjects.
C. Choices is indicative of color of subjects.
D. Motives for the choices of the subjects.
E. Percent differences of the choices of lighter vs. darker subjects.

Answer: D. Motives for the choices of the subjects.

 

Question: The authors argue that identification of self among these subjects is most likely based on what variable?

Answer Options:

A. Physical characteristics.
B. Gender traits.
C. Socially defined racial differences.
D. A history of discrimination.

Answer: A. Physical characteristics.

 

Question: One of the potential experimental/statistical problems with data evident in Table 1 is ______.

Answer Options:

A. The authors don’t clearly define skin tone differences.
B. The gender of the children isn’t listed.
C. The choices the children made were not calculated.
D. The subjects’ names are not identified.
E. The difference in sample sizes for each skin-type color.

Answer: A. The authors don’t clearly define skin tone differences.

 

Question: The authors argue that consciousness of self as different from others on the basis of observed skin color —-any consciousness of self in terms of —– defined group differences of Negro children.

Answer Options:

A. Follows; economically.
B. Precedes; socially.
C. Is correlated with; peer.
D. Is not correlated with; socially.
E. Is proportional to; skin-tone.

Answer: B. Precedes; socially.

 

Question: Why did the authors mean all of the cases without regard to sex differences?

Answer Options:

A. There is little difference between attitudes of boys and girls.
B. Sex differences were not an area of interest to the investigators.
C. The answer is not given for this.
D. Most likely, it was an oversight in the study; sex differences should have been noted.
E. Because the small number of cases in each category of male-female breakdown.

Answer: E. Because the small number of cases in each category of male-female breakdown.

 

Question: The authors are reticent to accept the “wishful thinking” explanation for why some of the children choose the white doll over the dark doll. What BEST represents the authors’ beliefs on this subject?

Answer Options:

A. Children are generally incapable of “wishful thinking.”
B. “Wishful thinking” cannot be operationalized sufficiently to measure.
C. No explanation is given.
D. “Wishful thinking” is only inferred by investigators.
E. The concrete clue of obvious skin differences carries more weight.

Answer: E. The concrete clue of obvious skin differences carries more weight.

 

Question: The results indicate a slight trend for the light children to make identifications contrary to the objective clue of their own skin color. How do the authors explain this paradox?

Answer Options:

A. They don’t explain it.
B. Lighter children practice “wishful thinking.”
C. Older children are more aware of racial differences.
D. Lighter children may be identifying with white society.

Answer: D. Lighter children may be identifying with white society.

 

Question: In the Allegory of the Cave, Plato raises the question of “how do we know what we know and how can we be certain of what we know?” This is an age-old question asked by philosophers, scientists, and truth seekers for thousands of years. It began the debate on the theory of knowledge. This inquiry into how thinkers can be certain of what we know is a branch of philosophy known as ______.

Answer Options:

A. Ontology
B. Metaphysics
C. Epistemology
D. Logic
E. Hermeneutics

Answer: C. Epistemology

 

Question: According to Plato, to rely only on one’s senses to understand “reality” is to live in a world of:

Answer Options:

A. Truth and beauty
B. Shadows and illusions
C. Common sense
D. Reason
E. Facts and certitude

Answer: B. Shadows and illusions