MULTIPLE CHOICES ANSWERED
CORRECTLY.
1. .Match .each .action .with .the .corresponding .category.
a. .Provides .professional .standards .for .ethical .behavior
i. .Part .of .the .role .of .IT
b. .Writes .laws .dealing .with .information .technology.
i. .Outside .the .role .of .IT
c. .Engages .in .best .practices .for .information .systems.
i. .Part .of .the .role .of .IT .- .CORRECT .ANSWER-
2. .How .can .an .organization .assist .employees .with .the .ethical .use .of .information
.technology?
a. .By .ensuring .databases .are .backed .up
b. .By .monitoring .network .throughput
c. .By .developing .policies .for .information .usage
d. .By .establishing .optimal .server .performance .- .CORRECT .ANSWER-c. .By
.developing .policies .for .information .usage
3. .Which .regulation .governs .the .actions .of .a .company .in .the .case .of .data .records
.being .compromised, .lost, .or .stolen?
a. .Digital .Signature .and .Electronic .Authorization .laws
b. .Security .Breach .Notification .Laws
c. .The .Electronic .Communication .Privacy .Act .of .1986
d. .Computer .Matching .and .Primary .Protection .Act .of .198 .- .CORRECT .ANSWER-
Security .Breach .Notification .Laws
4. .Which .action .would .support .confidentiality?
a. .Checking .that .data .is .correct
b. .Enabling .file .encryption
c. .Ensuring .that .software .is .properly .licensed
d. .Making .sure .data .is .available .when .needed .- .CORRECT .ANSWER-Enabling .file
.encryption
, 5. .Which .disaster .recovery .strategy .is .used .to .save .info .to .multiple .hard .drives .at .the
.same .time? .
a. .Site .sharing
b. .Cold .site .storage
c. .Data .mirroring
d. .Storing .tape .backups .- .CORRECT .ANSWER-Data .mirroring
6. .What .two .necessary .elements .of .business .continuity .planning? .
a. .Identifying .risks .that .may .occur
b. .Assessing .key .organizational .activities
c. .Ensuring .continuity .in .the .sequence .of .staffing .schedules
d. .Hiring .an .outside .consultant .to .develop .a .plan .- .CORRECT .ANSWER-identifying
.risks .that .may .occur
Ensuring .continuity .in .the .sequence .of .staffing .schedules
7. .Which .type .of .systems .conversation .involves .starting .the .conversion .with .a .portion
.of .end .users? .
a. .Phased .
b. .Pilot
c. .Direct
d. .Parallel .- .CORRECT .ANSWER-Pilot
8. .Which .type .of .systems .testing .includes .having .the .customer .test .the .system .in .an
.operational .setting .to .see .if .it .is .useful?
a. .User .acceptance
b. .Beta
c. .Alpha
d. .Analysis .- .CORRECT .ANSWER-User .acceptance
9. .Which .system .requirement .is .an .example .of .considering .user .needs .in .the .design
.of .an .information .system?
a. .Allowing .easy .access .to .customer .account .information
b. .Including .an .eye-tracking .device .for .an .input .device
c. .Incorporating .a .program .that .can .translate .text .into .spoken .words
d. .Ensuring .that .insertions .into .the .buffer .are .limited .in .size .- .CORRECT .ANSWER-
Allowing .easy .access .to .customer .account .information
10. .What .effect .does .scope .creep .have .on .a .project?
a. .It .moves .up .the .deadline .of .the .project