Which of the following is a logical access control designed to enhance the security of a computer-based application system?
A. Users will not be allowed to use any of their last five passwords to access the system
B. Users will automatically lose access to the system after 15 minutes of inactivity
C. Users will be assigned rights to access the system based on their job responsibilities
D. User accounts will be locked alter three unsuccessful attempts to access the system
正解:A
質問 2:
An organization accomplishes its goal to obtain a 40 percent share of the domestic market, but is unable to get the desired return on investment and output per hour of labor. Based on this information the organization is most likely focused on which of the following?
A. Marketing and not capital investment.
B. Efficiency and not input economy.
C. Effectiveness and not efficiency.
D. Capital investment and not marketing
正解:C
質問 3:
An organization recently documented its procedures for recovering systems and data after a disaster How are these documented procedures most likely to be used during a disaster simulation exercise?
A. To help property configure mass communication notification tools
B. To help validate the contact information of key personnel required to recover systems and data
C. To help identify training needs across the functional areas required to recover systems and data.
D. To help ensure that the team members who are required to recover systems and data understand their roles.
正解:D
質問 4:
According to the waterfall cycle approach to systems development, which of the following sequence of events is correct?
A. System requirements, software design, analysis, program design, testing, coding, operations.
B. System requirements, analysis, coding, software design, program design, testing, operations.
C. System requirements, software design, analysis, program design, coding, testing, operations.
D. Program design, system requirements, software design, analysis, coding, testing, operations.
正解:C
質問 5:
According to IIA guidance, which of the following best describes the activities that occur during the conversion phase of an IT project?
A. Conversion of data from the old system into the new system
B. Conversion of test data into production data
C. Conversion of user requirements into program codes
D. Conversion of user requirements into system specifications
正解:A
質問 6:
A bank uses customer departmentalization to categorize its departments. Which of the following groups best exemplifies this method of categorization?
A. South southwest and east.
B. Mortgages credit cards and savings
C. Teller manager and IT specialist
D. Community institutional and agricultural banking.
正解:D
質問 7:
A multinational organization allows its employees to access work email via personal smart devices. However, users are required to consent to the installation of mobile device management (MDM) software that will remotely wipe data in case of theft or other incidents.
Which of the following should the organization ensure in exchange for the employees' consent?
A. That those employees who do not consent to MDM software cannot have an email account.
B. That personal data on the device cannot be accessed and deleted by system administrators.
C. That monitoring of employees' online activities is conducted in a covert way to avoid upsetting them.
D. That employee consent includes appropriate waivers regarding potential breaches to their privacy.
正解:D
Tagawa -
本当に素晴らしい問題集です。満点を取りました。
当日の問題とうり二つの問題がでた時には感謝感謝でした。
ありがとうございました。