Question: It is virtually impossible to obtain 100% security; it would cost too much to achieve it and there is no guarantee that the IS infrastructure
-
It is virtually impossible to obtain 100% security; it would cost too much to achieve it and there is no guarantee that the IS infrastructure would be 100% secured. The ultimate responsibility lies on the top management to protect the system from compromise. What is the realistic outcome of security?
a. Transfer risk.
b. Negate risks.
c. Accept risk.
d. Reject risk.
-
Knowledge is strength. It is useful at the personal and professional levels. Knowledge can increase or decrease in some cases. What is considered part of knowledge management?
a. Process improvements.
b. Efficiency gains.
c. Business intelligence.
d. Improved features.
-
What organizational capabilities can help to maintain the competitive edge of a company by adding value:
a. Skills and experiences.
b. Knowledge and expertise.
c. Hardware and software.
d. Resources and Knowledge.
-
BlueTech engineers work in a dynamic environment to develop complex systems within the estimated budget and timeline. What approach do they follow?
a. Object-oriented.
b. Rapid App Development.
c. Open sourcing.
d. User-centric.
-
Since security is a critical element of a system and business, organizations implement various solutions to protect against adverse impact in case of a security breach. What is a common way of transferring risks?
a. Appoint a Chief Security Officer.
b. Buy insurance.
c. Create a security team.
d. Implement secured devices.
-
You are working on an infrastructure project where new hardware has been purchased. Network engineering is currently working on running physical cables between different devices, so they are physically plugging in connections. What kind of control do you need to exert to complete this phase of the work?
a. Input.
b. Output.
c. Behavior.
d. Network.
-
In this age companies collect a vast amount of information and mine them for various purposes. Which of the following many people consider to be important for protecting personal interest?
a. Integrity.
b. Confidentiality.
c. Privacy.
d. Availability.
-
Social media has gained popularity in recent times. Facebook, twitter, and similar companies have users in every country of the world. They are a reliable source of data for which of the following?
a. ERP.
b. CRM.
c. Google.
d. Big data.
-
Manages to need various tools to monitor performance. The objective is never to be caught off-guard when a major incident takes place. What is a tool commonly used by mangers to get status updates?
a. Scorecards.
b. Status reports.
c. Dashboards.
d. Metrics.
-
Various challenges need to be addressed before a project can be completed. COBIT is used especially for which of the following?
a. Issue management.
b. Budget management.
c. Process management.
d. Risk management.
-
BlueTech company has many projects and contract with many clients to develop IT solutions. As part of gaining efficiencies it bought subsidiary in Brazil to support its innovation and provide solutions. What is this type of sourcing referred to?
a. Outsourcing.
b. Offshore.
c. Far shore.
d. Captive center.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
