QN01. Which is not a function of ERP?
a. Warehousing
b. sales
c. scheduling
d. None of the above
Answer: D
QN02. Which is a function of ERP?
a. Warehousing
b. sales
c. scheduling
d. all of the above
Answer: D
QN03. Which of the following is the primary characteristic of an intranet?
a. People outside the organization can access it
b. People inside the organization can’t access it
c. People outside the organization can’t access it
d. None of the above
Answer: C
QN04. Which concept suggests that different applications and computer systems should be able to communicate with one another?
a. Integration
b. Web services
c. Scalability
d. Interoperability
Answer: D
QN05. Which service encompasses all technologies used to transmit and process information on an across a network?
a. Interoperability
b. Scalability
c. Benchmarking
d. Web services
Answer: D
QN06. Which process can prevent data from lose due to computer problems or human errors?
a. backup
b. recovery
c. benchmarking
d. data cleansing
Answer: A
QN07. Which process is used to reinstall data from a copy when the original data has been lost?
a. backup
b. recovery
c. benchmarking
d. data cleansing
Answer: B
QN08. What describes a process of continuously measuring results and comparing those results to optimal performance so that actual peformance may be improved?
a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing
Answer: C
QN09. Who protects system from external threats?
a. firewall
b. EDI
c. ERP
d. Script kiddies
Answer: A
QN10. Who breaks into other people’s computer systems and steals and destroys information?
a. Hackers
b. softwares
c. Hacktivists
d. Script kiddies
Answer: a
QN11. What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer’s CPU and storage for some task you know nothing about?
a. Web log
b. Clickstream
c. Anonymous Web browsing service
d. None of the above
Answer: D
QN12. ERP stands for
a. Enterprise resolution planning
b. Enterprise reverse planning
c. Enterprise resource planning
d. None of the above
Answer: C
QN13. Which is not a component of ERP?
a. Legacy systems
b. Bolt on applications
c. Operational database
d. Cybersoft
Answer: D
QN14. Which is not a function of ERP?
a. Human resource management
b. financial
c. warehousing
d. None of the above
Answer: D
QN15. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?
a. Computer virus
b. Worm
c. Denial-of-service attack
d. None of the above
Answer: B
QN16. What floods a Web site with so many requests for service that it slows down or crashes?
a. Computer virus
b. Worm
c. Denial-of-service attack
d. None of the above
Answer: C
QN17. What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
a. Computer virus
b. Worm
c. Denial-of-service attack
d. None of the above
Answer: D
QN18. What consists of the identification of risks or threats, the implementation of security measures,
and the monitoring of those measures for effectiveness?
a. Risk management
b. Risk assessment
c. Security
d. None of the above
Answer: A
QN19. What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
a. Risk management
b. Risk assessment
c. Security
d. None of the above
Answer: B
QN20. What is the process of making a copy of the information stored on a computer?
a. Backup
b. Anti-virus
c. Firewall
d. Biometrics
Answer: A
QN21. What software detects and removes or quarantines computer viruses?
a. Backup
b. Anti-virus
c. Firewall
d. Biometrics
Answer: B
QN22. What is hardware and/or software that protects computers from intruders?
a. Backup
b. Anti-virus
c. Firewall
d. Biometrics
Answer: C
QN23. What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?
a. Backup
b. Anti-virus
c. Firewall
d. Biometrics
Answer: D
QN24. All of the following are considered biometrics, except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer: C
QN25. What scrambles the contents of a file so you can’t read it without having the right decryption key?
a. Encryption
b. Intrusion-detection software
c. Security-auditing software
d. All of the above
Answer: A
QN26. What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
a. Encryption
b. Public key encryption
c. Intrusion-detection software
d. Security-auditing software
Answer: B
QN27. What looks for people on the network who shouldn’t be there or who are acting suspiciously?
a. Encryption
b. Public key encryption
c. Intrusion-detection software
d. Security-auditing software
Answer: C
QN28. What checks out your computer or network for potential weaknesses?
a. Encryption
b. Public key encryption
c. Security-auditing software
d. None of the above
Answer: C
QN29. Which of the following to viruses harm?
a. Your keyboard
b. Your monitor
c. Your processor
d. Viruses do not harm any of the above
Answer: D
QN30. Which of the following can a virus do?
a. Hurt your hardware
b. Hurt any files they weren’t designed to attack
c. Infect files on write-protected disks
d. None of the above
Answer: D
QN31. In simple terms, what does risk assessment ask?
a. What can go wrong?
b. How likely is it to go wrong?
c. What are the possible consequences if it does go wrong?
d. All of the above
Answer: D
QN32. Which of the following is a characteristic of a firewall?
a. Examines each message as it seeks entrance to the network
b. Blocks messages without the correct markings from entering the network
c. Detects computers communicating with the Internet without approval
d. All of the above
Answer: D
QN33. Which of the following are ways to prove access rights?
a. What you know, like a password
b. What you have, like an ATM card
c. What you look like
d. All of the above
Answer: D
QN34. Which item can a password be used to protect?
a. Network
b. File
c. Folder
d. All of the above
Answer: D
QN35. Which is the most important component of IT?
a. Information
b. People
c. Information technology
d. Computers
Answer: B
QN36. Which of the following applies to the implementation of an idea?
a. Copyright
b. Intellectual property
c. Patent
d. Denial-of-service attack
Answer: C
QN37. When you purchase copyrighted software, what actually are you paying for?
a. The cost of the CDs, manuals, and development of the software
b. The cost of the CDs, manuals, and a share of the cost of the software development
c. A share of the cost of software development
d. All of the above
Answer: D
QN38. Which of the following is not a dimension of privacy?
a. Need for personal space
b. Need to feel in control of our possessions
c. Need to feel in control of our personal information
d. All of the above are dimensions of privacy
Answer: D
QN39. Which of the following captures screen images?
a. Key logger
b. Packet sniffer
c. Log analysis tools
d. Screen capture software
Answer: D
QN40. Which of the following examines information passing through switches, hubs, or routers?
a. Key logger
b. Packet sniffer
c. Log analysis tools
d. Screen captures
Answer: B