100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

INFORMATION TECHNOLOGY EXAM QUESTIONS & SOLUTIONS 2025 LATEST VERSION.

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
19-01-2026
Written in
2025/2026

INFORMATION TECHNOLOGY EXAM QUESTIONS & SOLUTIONS 2025 LATEST VERSION. What has led to the rapid change of today's business climate? How does that affect what you will study in this course? The rapid change was led from modern business. It drastically transformed all the existing business models. What is a legacy system? IT architecture? Legacy Systems are old methods, computers, technology that are outdated but still used. IT architecture is when it guides the process of planning, building, and interfacing with deployed IT resources. What are the on-demand and sharing economies? What propelled on-demand and shared services? Give an example of an industry that drives the on-demand economy. On demand Economy is economic activity created by technology companies that fulfil consumer demand. Sharing economy is when economic system in which good or services are shared between private individuals. They are propelled by smartphone-connect consumers, simple and secure purchase flows, and location-based services. For example, Airbnb, Uber... Give examples of key strategic and tactical questions that determine an organization's profitability/performance. For example, "What do we do," "How do we do it," "How can we be more efficient" ... How can a company benefit from a strong business model? Why is a good customer experience so important? It can deliver an incredible customer experience, increase market share, engage their employees and many more. Having a strong relationship with customers can increase revenue and make the business grow. What is a disruptive business model? In what three ways do these business models serve the on-demand economy? Some disruptive business models are their subscription because customers pay monthly for Netflix, Hulu, and many more. Another example is their experience and how they are willing to pay a high price for a tesla or apple. The three what's for On-Demand Economy are Time, Convenience and Personalized Service. What role does today's IT play in the on-demand economy? Companies become more invested in cybersecurity, application software development and maintenance, enterprise resource planning and many more. What is a technology platform? A technology stacks? Technology platform is the operating system and computer hardware used as a base upon which other applications processes, or technologies are developed. Technology Stack is the multiple layers of hardware, software, network connectivity and data analytics capability that comprise a technology platform. Describe several trends that will drive the on-demand economy is the future. 1. Artificial intelligence Everywhere 2. Transparently Immersive Experiences 3. Technology platforms will become more sophisticated. 4. Supply chains with be re-invented. 5. Products will be delivered to consumers before they know they need it. What does it mean to have a competitive advantage? When an organization differentiates itself by charging less and creating and delivering better quality products then there competitors. Define the three components of a business process. Explain the differences between formal and informal processes. The three components of a business process are inputs which are raw materials, activities which are the work that transforms input and acts on data and knowledge and deliverables which are the products, services, planes or actions. Formal processes are step by step instructions, they are well documented, they can increase efficiency and better quality. While informal processes are undocumented, undefined, and usually found in highly skilled industries. How would you go about evaluating and improving a business process? 1. Develop Vision and Objective 2. Understand Existing Processes 3. Identify Process for Redesign 4. Identify Change Levers 5. Implement New Process 6. Make New Process Operational 7. Evaluate New Process 8. Perform Continuous Improvement As discussed in class, what are the two ways an organization's profits are determined? Industry Structure determines the range of profitability of the average competitor and can be very difficult to change. Competitive Advantage can be sustained only by continuously pursuing new ways to compete. What are a company's mission, goals, objectives, and strategies? How are these terms different? The company's mission is the core purpose or function of an organization. The goal is statements made about the future of the business for example "To become the sales leader in Industry X". The objective is more specific, the ends organizations set out to achieve. Not the process by which those benefits are achieved. Example "To grow sales of products line Y by 3% in the first quarter." What is a SWOT analysis? How is this tool useful to an organization? SWOT stands for Strength which a motivated workforce, weaknesses which is lack of expertise, opportunities which is a developing market, ability to create a new market or product, and threat which is price ware or other fierce reaction by competitors. Explain the three components of competitive advantage. The three components are Agility is the ability to respond quickly, to change directions quickly. Responsiveness is the IT capacity that can be easily scaled up or down as needed. Flexibility is the ability to quickly integrate new business functions or to easily reconfigure software or applications. Explain the SMAC model. Social-Mobile-Analytics-Cloud which is a huge data centers accessible via the Internet from the core for the cloud by providing 24/7 access to storage, apps, and services. Explain the five mega trends with regards to IT innovation and disruption. 1. Connectivity needs to connect across multiple channels and platforms. 2. Big Data and Data Analytics is the process that is used when traditional data mining and handling techniques cannot uncover the insights and meaning of the underlying data. 3. Artificial intelligence and Robotics are to improve their ability to meet evolving customers' expectations in a timely manner, digital innovators use 4. Digitization is the process of transforming any kind of activity or information into a digital format that can be collected, stored, searched, and analyzed electronically and efficiently. 5. Machine-to-Machine technology enables sensor-embedding products to share reliable real time data via radio signals. What is the difference between machine-to-machine technology and the Internet of Things? Machine-to-machine sensors enables sensors to share reliable real time data via radio signals. While Internet of Things refers to a set of capabilities enabling when physical things are connected to the internet via sensors What is a "gig" worker? What are the benefits of being a "gig" worker? What are the disadvantages of being a "gig" worker? Gig worker is a person who works temporary jobs typically in the independent contractor or freelancer. Freelancers get paid per task, get to set your own schedule. Disadvantages are you must find work and sometimes it's not available to you, sometimes don't have benefits like 401k, or health insurance. Why should this course be important to you? Can help raise your understanding of IT terminology, practices, and tools. Give examples of organizational assets. What is an organization's most important asset? Some examples are the inventory and owns or leases. They provide inventory and creates policies to guide in the process of planning. What is an information system? Name the six components of an IS. Information system is a combination of information technology and people's activities using technology to support business process, operations, management, and decision-making at different levels of the organization. The six components of IS are 1. Hardware, which is any physical device, used to computerized IS. 2. Software which is a set of machine-readable instructions that make up a computer application. 3. People is any person involving in developing operating and using an IS 4. Procedures which is documentation containing directions on how to use the other components 5. Network which is a combination of lines, wires, and physical devices connected to each other and 6. Data which is raw or unorganized facts and figures such as invoice, orders, payments. Explain the IPOS Cycle. The cycle goes from Input, which is the data information, for example any website that is being opened, then processing which is programs, equipment, and storage for example the system finding the correct website. Then output which is the report, graphics, and calculations which is when the site is displayed onto the screen. After that is storage, which is the hard drive, server, USB for example any websites you bookmark for future use. Then lastly, feedback which is error reports, performance metrics for example is when the system recordes how long it took for it to go from input to output. Define the terms data, information, knowledge, and wisdom. What makes each term unique? Give examples of each. Data describes products, customers, events, or transactions that are recorded, classified, and stored for example raw figures. Information is that data that have been processed, organized, or put into context with meaning and value to the recipient for example who, what, where, and when. Knowledge applies understanding, experience, and learning to current problems for example how. Then Wisdom is a collection of values, ethics, moral codes, and prior experiences that form an evaluated understanding for example why. Clearly understand the hierarchy of ISs, input/output and user levels (Figure 2.5) At the bottom is the transaction processing systems which is information system that collects, monitors, stores, processes and distributes specific types of data input from ongoing transactions. Then management information system which is a reporting system that provide reports to managers for tracking operations, monitoring and control. Then decision support systems which is the knowledge-based system used by senior managers to facilitate the created of knowledge. Lastly executive information systems which is strategic-level information systems that help executives and senior managers analyze the environment. What is a structured decision? What is an unstructured decision? Structured decisions are relatively straightforward and made on a regular basis, and an IS can ensure that they are done consistently Unstructured decision are decisions that depend on human intelligence, knowledge, and/or experience as well as on data and models to solve. What is a TPS? What does it do? What kinds of decisions does it support? TPS is information system that collects, monitors, stores, processes, and distributes specific types of data input from ongoing transaction. It processes raw data. It uses internal and external data. What is the difference between real-time and batch processing? Real-time processing is when airlines or theatres need to process seat reservation in real time to verify that seats are still available. Batch processing is when transactions for a day, shift, or other time period are processed. What is a MIS? What kinds of reports does it generate? Management Information System is a general-purpose reporting system whose objective is to provide managers with scheduled reports to track operations. The reports are Periodic reports which are easily distributed via-email, blogs, internal websites. Also easily ignored because people don't find the time to review them. There are also exception reports are generated only when something is outside the norm, either high or lower than expected. What is a DSS? What kinds of decisions does it support? What kind of analyses can you run from the output from a DSS? Decision Support System is a knowledge-based system used by senior managers to facilitate the creation of knowledge and allow its integration into the organization. It supports structured and unstructured decisions. It can be run with What-If analysis and more structured Goal-Seeking. What is an EIS? What is the source of the data used in an EIS? Executive Information System is strategic-level information that help executives and seniors managers analyze the environment in which the organization exists. It uses internal data from lower level IS and external data sources. What is an IT infrastructure? What is an IT architecture? How are they different? IT infrastructure is the inventory of the physical IT devices that an organization owns and operates. IT Architecture guides the process of planning, acquiring building, modifying, interfacing, and deploying IT resources in a single department within an organization. IT infrastructure is the materials while IT Architecture is the planning, and building. What is the purpose of an EA? What two critical challenges does it solve? Enterprise architecture adds value to an organization in that it can provide the basis for organizational change just as architectural plans guide a construction project. The two critical challenges are "where an organization is going" and "how it will get there. What is a KPI? What are some examples of KPIs? What are the benefits of having a good EA? What are the components of an EA? Key Performance Indicators which is a set of quantifiable measures used to evaluate factors that are critical to the success of an organization. Some examples are current radios, accounts payable, turnover, net profit margin, new followers per week...Some benefits are Cuts IT costs, increases productivity with information, determines competitiveness, flexibility, reduces risk of buying or building systems and enterprise apps. The components are Business Architecture, Application Architecture, Information Architecture and Technology Architecture. What are two types of IT infrastructures? The two types are Data Centers and Cloud Computing. What is data virtualization? What is the goal of data virtualization? How does it benefit an organization? Data virtualization allows an application to retrieve and manipulate data without requiring technical details about the data. The goal is to provide a single view of overall data. Benefits provide instant access to data at any time in any format, responds fast to changing data analytic needs, and cut complexity and cost. What is cloud computing? What are the different types of cloud computing? What are the advantages/disadvantages of cloud computing? Cloud computing is the delivery of computing resources, such as IT infrastructure of a data center over the internet. Different types are Public Cloud which on-demand computing services and infrastructure are managed by a third-party provider and shared with multiple organizations using the Internet. Private Cloud which is IT infrastructure is dedicated to a single organization. Hybrid Cloud, which is used to supplement IT capacity, enables businesses to scale IT capacity depending on traffic or service demand. Lastly Multi cloud, which is a combination of clouds, businesses can use difference clouds for different purposes. Some advantages are flexibility, security, increased collaboration, disaster recovery. The disadvantages are downtime, vendor lock-in, limited control, security, data loss or theft. Briefly describe the five as-a-service solutions. The 5 are Software as a Service which is instead of buying and installing expensive packaged enterprise applications, users can access software application over a network using an internet browser. Platform as a Service which allows businesses to concentrate on the development, deployment and management of software apps and services without having to worry about the underlying infrastructure. The next one is Infrastructure as a Service which providers deliver and manage virtualized computing infrastructure over the Internet. Data as a Service is an information provision and distribution model in which data files are made available to customers over a network by a service provider. Lastly, Technology solutions as a service which combines software, hardware, networks, and telecommunications to provide specialized technology solutions that allow companies to adopt new technologies and transforms their business. What is virtualization and what are virtual machines? How is virtualization beneficial to an organization? Virtualization allows the sharing of a single physical app among multiple customers and organizations. Virtual machines run on a simple computer hardware layer. Benefits cost-effective, hardware-reducing, energy saving techniques. What is data management? Goals of data management? Benefits of data management? Data management is the management of the flow of data from creation and initial storage to the time when the data becomes obsolete and is deleted. Goals are mitigating the risks and costs of complying with regulations, ensuring legal requirements are met, safeguarding data security, maintaining accuracy of data and availability, certifying consistency in data that come from or go to multiple locations, and ensuring that data conforms to organizational best practices for access, storage, backup, and disposal. The benefits are greater compliance, higher security, less legal liability, improved sales and marketing strategies, better product classification, and improved data governance to reduce risk. What is a database? Database management system? Data warehouse? Data mart? Make sure you understand how these concepts are different. Database is a collection of data sets or records stored in a systematic way. Database management system is software that integrates with data collection systems to store data in a organization way and provide facilities for accessing and managing data. Datawarehouse are large data set that integrates data from multiple databases and data silos across the organization and organizes them for complex analysis. Data mart is a small-scaled warehouse that support a single function or one department. How does data flow through an organization? It goes from transaction system to operational databases to ETL processes, from there it goes to data warehouse, data mart, business intelligence environment, then to information. What does it mean when data is "volatile"? Data volatile is when medium and large enterprises typically have many databases of various types, the data in the databases are extremely volatile. Describe a centralized database vs a distributed database, understand the advantages and disadvantages of both databases. Centralized database stores all data as a unified body in a single central computer such as a mainframe or server in one physical location. Distributed database stores portions of the database on multiple computers controlled by a database management system within a network in a client-server configuration. Centralized advantages are easier to manage, better IT security, better IT integrity their disadvantages are transmission delays, security, bottleneck from multiple users accessing the same data. Distributed advantages are quicker data access since files retrieved locally, of one site fails, system can still run their disadvantages are time for synchronization of the multiple databases, data replication for each different database file, expensive. What is a database management system? What are the five functions of a DBMS? Database management system is a software package designed to define, manipulate, store, access, and manage data in a database. The five functions are data filtering and profiling which process and stores data efficiently, inspected data for errors. Data integrity and maintenance which correct, standardize, and verify the consistency and integrity of the data. Data Synchronization which integrates, match, or link data from disparate sources. Data Security which checks and controls data integrity over time. Data access which provides authorized access to data in both planned and ad hoc ways within acceptable time. What is OLTP? What is OLAP? Online Transaction processing system which is a database design that breaks down complex information into simpler data tables to strike a balance between transaction processing efficiency and query efficiency. Online analytics processing and decision support, which is the analysis of complex data from a data warehouse. How is a database setup? It goes from Files which could be students, then to records which could be the name of the students, and lastly the fields which could be the major, GPA, their ID number. Describe the five approaches to a DBMS? The five approaches are Hierarchical which is tree like structure based on a one-to-many parent-child relationship between data elements. Network Data Model which is a data model that allows multiple records to be linked to the same parents, for example children can have multiple parents. Relational Data Model is use of data tables to collect groups of elements into relations. Object-oriented model which data model that support the modelling and creation of data entities as objects that contain both data and the relationship of those data. Lastly blockchain which is a distributed ledger represented by a sequential chain of data blocks that records transactions, establishes identity of the user, and establishes contracts. What is blockchain technology? How does it work? How is it beneficial? Blockchain technology many users can write entries into a database and a community of users controls how the data is amended and updated. How it works is if you want to send money, the transaction is "blocked" then the transaction is sent to every part network, those in the network approve or disapproves the transaction the "block" lets through the transaction. It is beneficial because it is secure and builds trust, it allows anyone to send value anywhere the blockchain file can be accessed. What is a data warehouse? How is it different than a database? Where is it used in business intelligence management? Datawarehouse integrate large amounts of structured data from multiple sources in a centralized place. It's different because it is a collection of data sets or records stored in a systematic way. It is used in business to require formatting processing and/or standardization. What is a data mart? How is it different from a data warehouse? Data mart supports a single function or one department. It is different from data warehouse because it integrates data from multiple databases. What is the process that is used to move data from a database to a data warehouse or a data mart? It is moved in three main steps. 1. Extracted from designated databases. 2. Transformed by standardizing formats, cleaning the data, and integrating them. 3. Loaded into a data warehouse. What is an active data warehouse? How can it be used in an organization? The active data warehouse is used for operational decision making. It provides a single integrated view of a customer across multiple business lines. It is used to provide superior customer service, responds to business events in near real time. What is an enterprise data warehouse? Enterprise data warehouse is a database, or collection of databases that centralizes a business's data from multiple sources and applications and making it available for analytics and use across the organization. What is a data lake? How is it different from a data warehouse? What is the difference between structured and unstructured data? Data lake stores structured, semi-structed and unstructured data supporting the ability to store raw data from all sources without the need to process or transform it at that time. It is different because data warehouse organizes the data while data lake just stores them. What is data governance? The control of enterprise data through formal policies and procedures to help ensure data can be trusted and are accessible. What is the difference between data governance and data management? Data governance is establishing policies and procedures around data. Data management enacts the policies and procedures to compile and use that data for decision making. What are the consequences of poor data governance? What are the benefits of good data governance and master data management? Some consequences are data duplication causes isolated data silos, leads to inaccurate data analysis, results in increased workloads and processing time. Benefits are improved regulatory compliance, more efficient decision-making, improved data understanding, increased revenue. Describe the three types of enterprise data. Transactional Data which support the application. Master Data which describe enterprises, business entities upon which transaction are conducted and dimensions, products, supplier... Analytical Data are supporting decision making and planning. What is a data entity? Master file? What is a customer centric approach to business? Data entity is anything real or abstract about which a company wants to collect and store data. Master file is a collection of records describing one of the main entities in a database such as customers, products, employees, and vendor. The customer centric approach is doing business that focuses on providing a positive customer experience at and after the point of sale to drive profit and gain competitive advantage. Keep in mind the definitions of data and information. What is information management? Information management is the process of collecting, storing, managing, and maintain data that is accurate, timely, reliable, valid, available, unique, and relevant to an organization. Explain the data life cycle. It goes from internal data and external data to data warehouse then to data marts to data mining. Then from there data visualization, decisions support, and knowledge and its management, then to SCM, CRM, E-commerce, Strategy and Others. Explain the three general data principles related to the data life cycle. Principle of diminishing data value, Principal of 90/90 of 90/90 data use, and Principle of data in context What is the "silo effect" and how does it affect business performance? How can an organization eliminate data silos? They are stand-alone data stores. Their data are not accessible by other ISs that need it or outside that department. They are unable to share or exchange data, they cannot consistently be updated...Publicly acknowledge shared goals, embrace the why, culture comes from the top. What is "dirty data"? What is the cost of "dirty data"? Dirty data are data of such poor quality that they cannot be trusted or relied upon for decisions. The cost is lost business plus cost to prevent errors, plus cost to correct errors. Why is it important to have good information management practices? Improves decision quality, Improves accuracy and reliability of management predictions, lower time and cost, and better data quality. Define the term "electronic content". It is a collection of documents, records, and unstructured data available as a board range of digital assets such as audio, video, flash... Describe the main differences between an electronic document and an electronic record. Electronic documents are any paper, electronic form, file, email, fax, contract, lease and so on actively being worked on. While Electronic records is any document that has been made final and is no longer meant to be altered. Why do companies use an electronic records management system? How can organizations benefit from a good ERMS? Electronic records management system establishes policies and standards for maintaining diverse types of records. ERMS benefits on enabling the company to access and use the content contained in documents, cutting labor costs by automating business processes, reducing the time and effort required to locate information the business needs to support decision-making, improving the security of content, thereby reducing the risk of intellectual property theft, minimizing the costs associated with printing, storing and searching for context. What is data privacy? What are the four main concerns of data privacy? Data privacy is the right to self-determine what information about you is made accessible, to whom, when and for what use or purpose. The four concerns are How data are shared with third parties, how data are collected and stored, how data are used, and How data are regulated. Why is it important for you to know how your online data is handled? In case of any cyber-attacks, or your information gets leaked, or others information get leaked. Explain the phenomenon where users are concerned about data privacy, but their behaviors contradict these concerns? Privacy paradox is the disconnect between how important people say their online privacy is versus how they behave in real life. Who has responsibility for data privacy laws at the U.S. federal level? Be able to describe at least ONE US consumer protection data privacy regulation. Health Insurance Portability and Accountability Act, Gramm-Leach-Bliley Act, Privacy Protection Act of 1980, Driver's Privacy Protection Act, Fair Credit Reporting Act. Driver's Privacy Protection Act can't share driver's license info. What is the purpose of the EU's general data protection rules (GDPR)? Why is the US not considered part of the GDPR? What is the name of the mechanism that brings the US under the jurisdiction of the GDPR? EU's general data protection rules empowers EU consumers by forcing retailers, marketers, and other to explicitly tell consumers how they are collecting, using, and storing consumers personal data. US isn't considered the data privacy laws currently for them. The Swiss-U. S privacy Shields are what the mechanism that brings the US under the jurisdiction of the GDPR. What is cybersecurity? A cyberattack? A cyberthreat? Data breach? Vulnerability? Attack vector? Cybersecurity is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. Cyberattack is an actual attempt to expose, alter, disable, destroy, steal, or gain unauthorized access to a computer system or any other smart device. Cyber threat is the method used to commit a cyberattack that seeks to damage data, steal sensitive data, or disrupt digital life in general. Data breach is the successful retrieval of sensitive information by an unauthorized individual, group, or software system. Vulnerability is a gap in IT security defenses of a network, system, or application that can be exploited by a cyber threat to gain unauthorized access. Attack vector is a path or means by which a computer criminal can gain access to a computer or network server to deliver a malicious outcome. Define and give an example of an intentional threat and an unintentional threat. Unintentional threats have three cyber threats human error which can occur in the design of the hardware or information system, during programming, testing, or data entry. Environmental hazards which include volcanoes, earthquakes, blizzards...Computer systems failure can occur as the result of poor manufacturing, defective materials, or poor maintenance. Intentional cyber threats are intentional security breaches are overt and direct actions designed to disrupt a system and include data theft such as inappropriate use of data, theft of computer time, theft of equipment and/or software, deliberate manipulation in handling, entering, programming, processing, or transferring data. Describe the three types of hackers. There is white hat which is computer security specialist who breaks into protected systems and networks to test assess their security. Black hat which has a person who attempts to find computer security vulnerabilities and exploit them from personal financial gain or other malicious reason. Gray hat which has a person who may violate ethical standards or principles, but without the malicious intent. What is social engineering? What is a phishing attack? How is a spear phishing attack different from a phishing attack? Social engineering is a hacker's clever use of deception or manipulation of people's tendency to trust, be helpful, or simply follow their curiosity on social media. Phishing is the attacker sends an email to gain the victim's trust by evoking a sense of curiosity urgency or fear. Spear phishing usually targets a select group of people with something in common, when phishing attack targets just anyone. List and define three types of malwares. Intrusive malware: Cookie which is a small piece of data sent from a website and stored in a user's Web browser while the user is browsing the website. Spamware is software that enables attackers to search, sort, and compile a list of email address, generate random addresses, insert fake headers into messages. Adware which is software that embeds advertisements in the application. Hostile Malware: Backdoor is a difficult to detect malicious computer program used to provide an attacker with unauthorized remote access to a compromised PC by exploiting security. Rootkit is a set of software tools that enables an attacker to gain control of a computer system without because detected. Virus which infects apps like Microsoft Word where it executes instructions once opened before transferring back control to the app. What is a botnet? How are botnets used in carrying out cyberattacks? Botnet is when you string together several computers that are infected with malware. Botnets are typically used to send span and phishing emails and launch DDoS attacks. What is ransomware? Crypto jacking? How can you protect yourself from being a victim of crypto jacking? Ransomware is designed to block access to a computer system until a sum of money has been paid. Crypto jacking is a ransomware-like scheme to use other people's devices without their consent or knowledge to secretly syphon off cryptocurrency at the victim's expense for example, if you get an email with a link you don't know about and you press on it the link could have an infection on it. Try not to open any emails with links you don't know. Why are MitM attacks on the rise? How might organizations guard against these types of attacks? MitM attacks occur when cyber criminals insert themselves between two-parties in a transaction with the intention of stealing data. Secure your Wi-Fi, put it too private not public. What are the risks caused by data tampering? The risks are someone enters false or fraudulent data into a computer, or changes/deletes existing data. What is a distributed-denial-of-service (DDoS) attack? It crashes a network or website by bombarding it with traffic and effectively denying services to all those legitimately using it and leaving it vulnerable to other threats. What is an advanced persistent threat? What motivates hackers? Advanced Persistent Threat launched by attacks through phishing to gain access to enterprises network. Hackers get motivated by high-profile which wants to gain recognition and notoriety. Why is data tampering so serious? Because the threat can write down false data about you or other people into a computer. What is critical infrastructure? List three types of critical infrastructures. Critical infrastructure are systems and assets whether physical or virtual, to vital to a country that the incapacity or destruction of such a systems and assets would have a debilitating impact on security. Critical infrastructure types are national economic security, national public health, or safety, How do social network and cloud computing increase vulnerability? The increase vulnerability by providing a single point of failure and attack for organized criminal networks. What is time-to-exploitation? Why are patches and service packs needed? Time-to-exploitation is the elapsed time between when vulnerability is discovered and when it is exploited. Patches are service packs to update and fix vulnerabilities in its operating systems, including vista and apps. Service packs can be downloaded from Microsoft Service Pack and Update Center. Why is it important to protect intellectual property? Because it is copyrighted property such as a blueprint manuscript or a design. Losing customers data to hackers can be costly and embarrassing. Explain how identity theft can occur. When you put down your information on a website that website could get hacked and everything you put down there could be compromised. Why does the concept of BYOD bring both advantages and disadvantages to an organization? The advantage is it cuts purchase and maintenance costs. The disadvantages is mobile devices rarely have strong authentication, access control, and encryption even though they connect to mission-critical data and cloud services. Could be lost or stolen. Why is it becoming more important for organizations to make cyber risk management a high priority? What initiative can organizations take to ensure that it is? So, their information doesn't get stolen, or the people working for them or their customers information. There initiative is choosing a cyber defense strategy, adopt risk mitigation strategies specific to different types of assets. Describe what a cyber defense strategy should look like. Strategic intelligence is How an organization will defend itself. Also, tactical intelligence what an organization needs to do when it is attacked. Name three IT defense tools. There are Antivirus Software which can be anti-malware tools are designed to detect malicious codes and prevent users from downloading them. Intrusion detection systems an IDS scans for unusual or suspicious traffic. Intrusion Prevention Systems is an IPS is designed to take immediate action, such as blocking specific IP addresses whenever a traffic-flow anomaly is detected. What is a malware signature? How is a malware signature related to a zero-day exploit? Malware signature is a specific pattern that allows cybersecurity technologies to recognize a malicious threat. They are related because zero-day exploits are malware so new their signature are not yet known while software relies on malware signatures. How can mobile devices be protected? Why does a mobile kill switch an important part of managing cyber risk? Some ways are mobile biometrics such as voice and fingerprint biometrics, can significantly improve the security of physical device. Mobile kill switch works to help people in loss or theft of a device. Why does an organization need to have a business continuity plan? It helps maintain a business function or restoring them quickly when there has been a major disruption. The plan covers business processes, assets, human resources, business partners, and more. What is the purpose of general defense controls? Describe at least three general controls. General defense controls are established to protect the system regardless of the specific application. For example, Physical which protect physical computer facilities and resources, access which dictates who is authorized to use an organization's computing resources, administrative control which deals with issuing guidelines and monitoring compliance with an organization security guidelines What is the purpose of application defense controls? Describe at least three application controls. Application defense controls is a security practice that blocks or restricts unauthorized apps from executing in ways that put data at risk. For example, input, processing, output. What is the purpose of the COBIT 2019 framework? What is the purpose of the PCI DSS? The COBIT 2019 framework is a globally recognized governance framework that integrates security, risk management, and IT governance. PCI DSS is to improve customers trust in e-commerce, especially when it comes to online payments and to increase the Web security of online merchants. What four components comprise the IT security defense-in-depth model? The four components are Senior management commitment and support, Acceptable use policies and IT security training, IT security procedures and enforcement, Hardware, and software (kept up to date)

Show more Read less
Institution
Info Technology
Course
Info Technology










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Info Technology
Course
Info Technology

Document information

Uploaded on
January 19, 2026
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

INFORMATION TECHNOLOGY EXAM QUESTIONS &
SOLUTIONS 2025 LATEST VERSION.
What has led to the rapid change of today's business climate? How does that affect what you
will study in this course?

The rapid change was led from modern business. It drastically transformed all the existing
business models.




What is a legacy system? IT architecture?

Legacy Systems are old methods, computers, technology that are outdated but still used. IT
architecture is when it guides the process of planning, building, and interfacing with deployed IT
resources.




What are the on-demand and sharing economies? What propelled on-demand and shared
services? Give an example of an industry that drives the on-demand economy.

On demand Economy is economic activity created by technology companies that fulfil consumer
demand. Sharing economy is when economic system in which good or services are shared
between private individuals. They are propelled by smartphone-connect consumers, simple and
secure purchase flows, and location-based services. For example, Airbnb, Uber...




Give examples of key strategic and tactical questions that determine an organization's
profitability/performance.

For example, "What do we do," "How do we do it," "How can we be more efficient" ...




1

,How can a company benefit from a strong business model? Why is a good customer experience
so important?

It can deliver an incredible customer experience, increase market share, engage their
employees and many more. Having a strong relationship with customers can increase revenue
and make the business grow.




What is a disruptive business model? In what three ways do these business models serve the
on-demand economy?

Some disruptive business models are their subscription because customers pay monthly for
Netflix, Hulu, and many more. Another example is their experience and how they are willing to
pay a high price for a tesla or apple. The three what's for On-Demand Economy are Time,
Convenience and Personalized Service.




What role does today's IT play in the on-demand economy?

Companies become more invested in cybersecurity, application software development and
maintenance, enterprise resource planning and many more.




What is a technology platform? A technology stacks?

Technology platform is the operating system and computer hardware used as a base upon
which other applications processes, or technologies are developed. Technology Stack is the
multiple layers of hardware, software, network connectivity and data analytics capability that
comprise a technology platform.




Describe several trends that will drive the on-demand economy is the future.

1. Artificial intelligence Everywhere


2

, 2. Transparently Immersive Experiences

3. Technology platforms will become more sophisticated.

4. Supply chains with be re-invented.

5. Products will be delivered to consumers before they know they need it.




What does it mean to have a competitive advantage?

When an organization differentiates itself by charging less and creating and delivering better
quality products then there competitors.




Define the three components of a business process. Explain the differences between formal and
informal processes.

The three components of a business process are inputs which are raw materials, activities which
are the work that transforms input and acts on data and knowledge and deliverables which are
the products, services, planes or actions. Formal processes are step by step instructions, they
are well documented, they can increase efficiency and better quality. While informal processes
are undocumented, undefined, and usually found in highly skilled industries.




How would you go about evaluating and improving a business process?

1. Develop Vision and Objective

2. Understand Existing Processes

3. Identify Process for Redesign

4. Identify Change Levers

5. Implement New Process

6. Make New Process Operational

7. Evaluate New Process

3
$9.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
richardrichy

Get to know the seller

Seller avatar
richardrichy EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
3 days
Number of followers
0
Documents
5
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions