6. How does Impact Analysis help to detect cyber-crime?
control incoming and outgoing network traffic by analysing data packets and allowing / blocking them through based on the rules set.
By identifying vulnerable points in the network that can easily be accessed by external and internals users.
By establishing which systems are most likely to be attacked and the likely consequences. Efforts concentration on those with highest risk and severity.
Assesses computers, networks and apps for weaknesses.
7. What software products can be purchased to allow non-technical users to develop reports over a database without using SQL?
DEX, omego, Bloomberg
ORACLE, IBM's DB2, Sybase, Microsoft SQL server, MY SQL
Microsoft SQL sever, My SQL
Omego, IBM's DB2, ORACLE
8. What is the definition of scope expansion risk in business change?
Risk of over or under spending.
Creating a Business Change which brings little to no benefit
The scope grows and grows - unable to keep up
Creating a Business Change which is too complex to manage
9. Which Support is best suitable for a firm with very few number, but critical, of out-of-hours calls?
"Extended Working Hours"
"Follow-The-Sun"
"Partial Outsourcing"
"Full Outsourcing"
10. Which "round the clock" support would be needed for a firm who has operations in more than one time zone and users are accessing the same apps from different time zones?
"Follow-The-Sun"
"Full Outsourcing"
"Extended working Hours"
"Partial Outsourcing"
11. What is meant by the term "thin client"?
A user which interacts with the system via mobile only
PC on which an application other than a browser is installed
Laptop or PC running on an internet browser only.
A user which has no access to the internet or PC
12. What is meant by the term "fat client"?
A user which interacts with the system via mobile only
Laptop or PC running on an internet browser only.
PC on which an application other than a browser is installed
A user which has no access to the internet or PC
13. What is the last stage of the Disaster Recovery Plan ?
Approval by senior managers
The Plan should be reviewed
Approval by Board Executives
The Plan should be tested
14. A firm is conducting business in a single time zone but is using apps that are working throughout the day and night. What Support is most suitable for them?
"Extended Working Hours"
"Partial Outsourcing"
"Follow-The-Sun"
"Full Outsourcing"
15. Which of these explains what is the risk of "reinventing the wheel"?
implementing duplicate systems
The end solution is so complex it is too costly to implement
Risk of over or under spending.
Creating a Business Change which brings little to no benefit
16. What would be an example of " an unplanned emergency activity?
An item of hardware / app is not performing correctly & requires fixing
A poor decision causing large financial losses.
An item of hardware/app has broken and needs replacing
A disaster has struck causing disruption to apps/ hardware used by customers.
17. When an issue requires a software enhancement, who will MAKE the changes?
The Developer
Help Desk Specialists
The Business Analyst
The Test Analyst
18. What parts of the business should the Planning Committee risk assess with regards to Disaster Recovery?
IT areas only
All functional Areas
Critical Areas only
Highest risk areas only
19. What is the primary objective of Disaster Recovery Plan?
To prepare in the event the premises are lost/ damaged.
to protect the organisation in the event that all (or part) of its operations are rendered unusable.
To protect the firm against key person dependencies
That the firm is able to recover from an emergency such as software failure
20. What is the Head of Production & Support responsible for?
Manages all other staff in the IT Department and sets the IT Strategy
Provision of all servers and desktop fascilities to all users & day-to-day running and support of the production/ live systems