Back to quiz

6. How does Impact Analysis help to detect cyber-crime?

  • control incoming and outgoing network traffic by analysing data packets and allowing / blocking them through based on the rules set.
  • By identifying vulnerable points in the network that can easily be accessed by external and internals users.
  • By establishing which systems are most likely to be attacked and the likely consequences. Efforts concentration on those with highest risk and severity.
  • Assesses computers, networks and apps for weaknesses.

7. What software products can be purchased to allow non-technical users to develop reports over a database without using SQL?

  • DEX, omego, Bloomberg
  • ORACLE, IBM's DB2, Sybase, Microsoft SQL server, MY SQL
  • Microsoft SQL sever, My SQL
  • Omego, IBM's DB2, ORACLE

8. What is the definition of scope expansion risk in business change?

  • Risk of over or under spending.
  • Creating a Business Change which brings little to no benefit
  • The scope grows and grows - unable to keep up
  • Creating a Business Change which is too complex to manage

9. Which Support is best suitable for a firm with very few number, but critical, of out-of-hours calls?

  • "Extended Working Hours"
  • "Follow-The-Sun"
  • "Partial Outsourcing"
  • "Full Outsourcing"

10. Which "round the clock" support would be needed for a firm who has operations in more than one time zone and users are accessing the same apps from different time zones?

  • "Follow-The-Sun"
  • "Full Outsourcing"
  • "Extended working Hours"
  • "Partial Outsourcing"

11. What is meant by the term "thin client"?

  • A user which interacts with the system via mobile only
  • PC on which an application other than a browser is installed
  • Laptop or PC running on an internet browser only.
  • A user which has no access to the internet or PC

12. What is meant by the term "fat client"?

  • A user which interacts with the system via mobile only
  • Laptop or PC running on an internet browser only.
  • PC on which an application other than a browser is installed
  • A user which has no access to the internet or PC

13. What is the last stage of the Disaster Recovery Plan ?

  • Approval by senior managers
  • The Plan should be reviewed
  • Approval by Board Executives
  • The Plan should be tested

14. A firm is conducting business in a single time zone but is using apps that are working throughout the day and night. What Support is most suitable for them?

  • "Extended Working Hours"
  • "Partial Outsourcing"
  • "Follow-The-Sun"
  • "Full Outsourcing"

15. Which of these explains what is the risk of "reinventing the wheel"?

  • implementing duplicate systems
  • The end solution is so complex it is too costly to implement
  • Risk of over or under spending.
  • Creating a Business Change which brings little to no benefit

16. What would be an example of " an unplanned emergency activity?

  • An item of hardware / app is not performing correctly & requires fixing
  • A poor decision causing large financial losses.
  • An item of hardware/app has broken and needs replacing
  • A disaster has struck causing disruption to apps/ hardware used by customers.

17. When an issue requires a software enhancement, who will MAKE the changes?

  • The Developer
  • Help Desk Specialists
  • The Business Analyst
  • The Test Analyst

18. What parts of the business should the Planning Committee risk assess with regards to Disaster Recovery?

  • IT areas only
  • All functional Areas
  • Critical Areas only
  • Highest risk areas only

19. What is the primary objective of Disaster Recovery Plan?

  • To prepare in the event the premises are lost/ damaged.
  • to protect the organisation in the event that all (or part) of its operations are rendered unusable.
  • To protect the firm against key person dependencies
  • That the firm is able to recover from an emergency such as software failure

20. What is the Head of Production & Support responsible for?

  • Manages all other staff in the IT Department and sets the IT Strategy
  • Provision of all servers and desktop fascilities to all users & day-to-day running and support of the production/ live systems
  • Support of live systems only
  • Manages IT facilities