ACTUAL Exam Questions and CORRECT
Answers
What is a way that companies acquire information system? - CORRECT ANSWER -
Subscribe to a service for system functionality they need.
What is creative work that is expressed in physical from and includes patents and trademarks? -
CORRECT ANSWER - Intellectual Property
Which of the following best describes this situation: you download an application from a shady
web site, only to discover later that it had a virus hidden in it that collects data from your
computer's hard disk? - CORRECT ANSWER - Trojan horse
What are two basic ways by which businesses keep their data and applications safe? -
CORRECT ANSWER - Authentication and Authorization
In class, we talked about the dilemma that you , as future business professionals, will have to
deal concerning personal information and privacy. What is that dilemma? - CORRECT
ANSWER - Companies want personal information to serve their customers, but consumers
want their personal information to be kept private.
What is the best description of phishing? - CORRECT ANSWER - Phishing is a technique
to gain personal information for the purpose of identity theft, usually by means of fraudulent
emails that look as though they came from legitimate businesses.
_______ is the amount of time on a PERT chart (used in project management) that a task can be
delayed without pushing the ultimate deadline back. - CORRECT ANSWER - Slack
You have joined a work group that agrees to collaborate as a value of the group. Which is an
example of a moral behavior for that value? - CORRECT ANSWER - Share your ideas
, What is a VPN? - CORRECT ANSWER - Virtual Private Network
Which of the following is NOT one of the 3 reasons that an I.S. development project can be seen
as a failure? - CORRECT ANSWER - Project cost less than anticipated
If you're smart about personal technology, you have a current subscription to anti-virus software.
On what security level does that type of software belong? - CORRECT ANSWER -
Application
Which of the following project management tools uses calendar time as a key guide? -
CORRECT ANSWER - Gantt chart
You are hired as a consultant for a company, and you notice an activity in the business for which
a high-quality output is required. Two key features of this activity are that it involves people
from different skill areas from around the company, and it will last for just 6 months. What is the
best name for this activity, given that is all the information you have about it? - CORRECT
ANSWER - Business project
Which of the following tests of system feasibility is concerned with how likely the staff will
resist the proposed computer system? - CORRECT ANSWER - Organizational Feasibility
The Fair Use provision of the U.S. Copyright Law lets people use copyright material ONLY if
which of the following conditions is met? - CORRECT ANSWER - The material you? re
selling is factual, not creative
Companies protect their data assets in different level. Which of the following is NOT one of the
information security levels we talked about in class? - CORRECT ANSWER - Logical
There are people who are technology experts who break into computers and networks for profit
or just as a challenge. What do we call those people? - CORRECT ANSWER - Hackers