MANAGEMENT Based Assessment Explore New
|Questions and Answers| PA and OA| -
LatestUpdate|100% Correct
What external technological environment can be used to help address these
issues? - ANSWER-Cloud computing
A company is considering an expansion into a new target market. The
company's management team develops a decision process to analyze
current market strengths and to predict needs for the proposed new target
market.
Which benefit does the company gain by developing this target market
decision process? - ANSWER-The company becomes data-centric.
An online mail order company decides to create its own Customer
Relationship Management (CRM) system to help management analyze
customer's purchasing patterns. To be successful at managing relationships
with customers, the CRM system must have access to large amounts of
customer purchasing data for analysis and report generation.
Which MIS tool is also useable by the company's CRM system? - ANSWER-
Decision support system
,A decades-old company has several hundred employees and a modern IT
infrastructure. An IT security analyst has been hired to provide a layered
defense structure and must take measures to ensure confidential
information remains confidential.
Which activities will help the IT security analyst accomplish this goal?
Choose 3 answers - ANSWER-Enforcing document retention and destruction
policies
&
Requiring the use of ID badges at building access points
&
Mandating annual information security training for all employees
A company has issued smartphones to its employees with a policy that the
devices may not be used off of the company's campus. An IT analyst has
been tasked with finding a way to enforce this policy.
Which solution provides a fitting solution to this problem? - ANSWER-
Proximity authentication access control
Hostile or intrusive software with harmful intent can take the form of
executable code and greatly damage a user's computer.
Which technology can be used to minimize the chances of this happening? -
ANSWER-Anti-malware
, A regional manager has received an important financial document seemingly
sent by a branch manager, but he doubts whether the report was actually
sent by that manager.
Which technology could be used to verify that the report was indeed sent by
the branch manager? - ANSWER-Digital signature
A corporation needs to improve its security policies and has decided to limit
physical access to corporate computers.
What value will the corporation realize with this policy? - ANSWER-System
protection
A business wished to extend the use of its virus scanning software to the
business' customers. This requires the business to allow customers enough
access to the internal network so virus scanning software can be
downloaded to a customer's computer.
Which two security measures will the business have to take to ensure
customer access for virus scanning downloads, yet protect internal systems
from possible unauthorized access?
Choose 2 answers - ANSWER-Take steps to detect any presences of malware.
&
Require a username and password for network access.