The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 305 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
1.      What is the common standard protocol in the data communications world today:
TCP/IP
NETBIOS
IPX/SPX
None of the above
2. A network encompasses the world is referred to as:
PAN
WAN
MAN
None of the above
3. What is the composition of the TCP/IP stack:
Quenet
Telnet, ftp, and http
Hpp and GUI
None of the above
4. Which type of network uses a token in passing data:
Ring
Star
Bus
None of the above
5. The internet is:
AOL
A linking of networks worldwide
None of the above
6. Project managers work under a triple constraint which is:
Low, medium, and high
Scope, time, cost
Lifecycle, monitoring, closing
None of the above
7. A project is:
An ongoing process with continuous support
A temporary endeavor undertaken to create a unique product, service, or result
A daily process
None of the above
8. A program is:
A small group of related projects
All of the projects for all of the project managers in the group or PMO
A group of tools used by projects
None of the above
9. A project management office (PMO) is:
An organizational unit to centralize and coordinate the management of projects
An organization that manages project managers
A marketing organization for projects
None of the above
10. The practice of overlapping phases, normally done in sequence, is a schedule compression technique called:
Jockeying
Project Squeezing
Fast Tracking
None of the above
11. Primary role of a system owner in a system development project should be to:
Define the vision and scope of the project
Allow for business process redesign
Make sure that the proper technology has been implemented
Have a completely functional executive information system
None of the above
 12. Which of the following is NOT a project management cause of failed projects?
Shortcuts taken during the project
Lack of or imprecise targets
Inadequate systems analysis and design tools
Budget overruns
Schedule delays
13. The application of systems analysis methods to the goal of dramatically changing and improving the fundamental business processes of an organization, independent of technology is:
Total quality management
Continuous process improvement
Cause-and-effect analysis
Business process redesign
None of the above
14. Which of the following is an advantage of prototyping?
It encourages and requires active end-user participation.
It negates the need for the systems analysis phases.
It helps keep the scope and complexity of the system under control.
It can increase creativity because it encourages analysts, designers and end-users to look for better solutions.
None of the above
15. A term coined to collectively describe any information presented in a format other than traditional numbers, codes and words; including: graphics, sound, pictures and animation, is:
Multimodal
Graphical
Zoned
Multimedia
None of the above
16. Which of the following describes an act of human error or failure as a category of threat?
Piracy
Blackmail of information disclosure
Unauthorized access
Accidents
 17. Which of the following is a task that is performed during the analysis phase of developing an information security policy? ______
Gathering key reference material
Making sure that the policies are enforceable
Providing for policy distribution
Making certain that policy is written at a reasonable reading level, with minimal technical jargon and management terminology
18 . The most common organizational structure is one in which the Information Security Department reports to the ______ Department.
Insurance and Risk Management
Marketing
Information Technology
Customer Service
19. Which of the following activities is part of the risk assessment process?
Creating an inventory of information assets
Classifying and organizing information assets into meaningful groups
Assigning a value to each information asset
Calculating the risks to which assets are exposed in their current setting
 20. _____ allow only specific packets with a particular source, destination, and port address to pass through it.
Dynamic packet filtering firewalls
Packet filtering firewalls
Stateful inspection firewalls
Application-level firewalls
Attachments:
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y