Вы находитесь на странице: 1из 13

Take Test: Final Exam IG 1st Summer Term – 2018_...

6/25/18, 6:46 PM

Take Test: Final Exam IG 1st Summer Term

Test Information
Description Final Exam, Chapters 9, 10, 11, 12, 13, 14, 15, 16 and 18

Instructions Select the one best answer from the choices provided. This exam must be submitted prior to Tuesday, June 26, 2018 at 11:30
p.m. Eastern Standard Time. Exam answers WILL NOT be accepted late. Test will close out promptly at 11:30 p.m.

Multiple Not allowed. This test can only be taken once.


Attempts
Force This test can be saved and resumed later.
Completion

Question Completion Status:

QUESTION 1 2.00000 points Save Answer

Which of the following is a true statement regarding email created using the company e-mail system?
A. If created by an employee on his own time, then it is never discoverable

B. E-mail communications may contain discoverable information during legal discovery in litigation

C. A portion of e-mail will be declared a formal business record

D. A and C above are true

E. B and C above are true

QUESTION 2 2.00000 points Save Answer

International Standard providing high level principles and guidance for senior executives and directors and
those advising them for the effective and efficient use of IT
A. ITIL 2011

B. ISO/TEC 20000

C. ISO 38500

D. ISO 15000

E. ITIL/SOL 15000

QUESTION 3 2.00000 points Save Answer

Sharepoint and Drupal can both be classified as a type of: _________


A. Content management application

B. File Storage/File sharing platform

C. Social Media category

https://ucumberlands.blackboard.com/webapps/assessment/take/launch…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 1 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

D. A, B and C above are all correct answers

E. None of the above is a correct answer

QUESTION 4 2.00000 points Save Answer

"Traditional" email system backups are exactly the same as email archiving software. So it makes no
difference which you use, as long as you use one of the two.
True
False

QUESTION 5 2.00000 points Save Answer

Google Maps could be described, defined or categorized as a type of ________


A. Social Media Platform

B. Web Publishing platform

C. Social media "Mashup"

D. Only A and B above

E. All A, B and C above

QUESTION 6 2.00000 points Save Answer

________ is a term used to describe participative, interactive, collaborative and user-oriented Web sites and
Web applications.
A. Web 1.0

B. Web 2.0

C. Hypermedia Links

D. Internet surfing proficiency

E. None of the above

QUESTION 7 2.00000 points Save Answer

______ is a type of public social media solution for archiving social media. Uses a file system approach to
social media in order to be able to search and sort contents of such things as facebook, Instagram and
twitter content.
A. SharePoint

B. MicroSoft Outlook

C. Cloud Computing

D. Jolicloud

E. Rocket-Launch Cloud Computing

QUESTION 8 2.00000 points Save Answer

Which of the following could NOT be considered a true statement as it relates to mobile devices used for
business

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 2 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

A. Most mobile devices were not designed with security in mind

B. It is particularly difficult to detect viruses on smart phones

C. The most common approach to criminal hacking of mobile devices is social engineering

D. MDM is critical to secure confidential information assess and manage the use of mobile devices

E. None of the above could be considered a true statement. Therefore, none of the above is a correct
answer to the question

QUESTION 9 2.00000 points Save Answer

Which of the following should be included on the IT infrastructure map or diagram for consideration in
performing a records inventory?
A. Tablets

B. Smart Phones

C. E-records residing in the cloud

D. All of the above (A, B and C) should be included in the IT infrastructure map

E. None of the above should be included in the It infrastructure map

QUESTION 10 2.00000 points Save Answer

Records and Information Management is more comprehensive than Records Management as it includes
.....which Records Managment does not.
A. Reports

B. Electronic Documents

C. Data

D. All A, B and C Above

E. None of the above since "Records management" and "Records and Information Management are the
same thing

QUESTION 11 2.00000 points Save Answer

______ is an approach to email archival where email messages are retained for a limited time followed by
their permanent, manual or automatic deletion.
A. Data Modeling

B. IAM systemizing

C. Comprehensive Modeling

D. Destructive Retention

E. Retentive Destruction

QUESTION 12 2.00000 points Save Answer

Assume your goal is that of leveraging IT investments to gain the maximum value on those investments.
Which of the frameworks will you focus on?
A.

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 3 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

ValIT
B. COBIT 5

C. COBIT 4.1

D. ITIL 20000

E. ISO38500

QUESTION 13 2.00000 points Save Answer

A good data governance program will never extend beyond the enterprise to the external stakeholders.
True
False

QUESTION 14 2.00000 points Save Answer

_______ can be defined as the "application of management techniques to collect information, communicate
it within and outside teh organization and process it to enable managers to make quicker and better
decisions".
A. Data Governance

B. Information Governance

C. Records Management

D. Detailed Management Lifecycle Analysis (DMLA)

E. Information Management

QUESTION 15 2.00000 points Save Answer

In what way(s) is/are electronic records management (ERM) principles the same as traditional paper based
records management?
A. Both require classification and taxonomy

B. Both require retention and disposition scheduling

C. Both require the handling of metadata dealing with the characteristics and contents of the records.

D. They are the same with regard to A and B above, but not C since electronic records contain
metadata and traditional records do not
E. They are the same with regard to A, B and C above

QUESTION 16 2.00000 points Save Answer

Which of the following represents one of the most significant paradigm shifts in information technology
history?
A. Use of social media

B. Use of Cloud Computing

C. Use of IM

D. Use of data modeling

E. Use of conceptual databases

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 4 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

QUESTION 17 2.00000 points Save Answer

MDM software is used in an attempt to control or minimize data leakage.


True
False

QUESTION 18 2.00000 points Save Answer

Typically, an electronic records management system will include which of the following basic function(s)?
A. Access and Security Controls

B. Marking the e-document a read-only record to prevent corruption and alteration

C. .Maintaining organizational/historical metadata

D. A and B above only as metadata is not permitted to be archived

E. A, B and C above

QUESTION 19 2.00000 points Save Answer

Approach to data modeling often confused with MDM as it refers to data in categories and is used only to
categorize other data found in a database
A. Physical Data Modeling

B. Conceptual data Modeling

C. Enterprise data modeling

D. Data Integration modeling

E. None of the above

QUESTION 20 2.00000 points Save Answer

Type of system solutions employed to manage e-documents and records for security, auditing, searching,
record retention and disposition, and version control which are predominantly repository based and provide
for collaborative workspaces for unstructured information are referred to generally as _______
A. Enterprise Content Management Systems

B. IAM Systems

C. Information Governance Systems

D. Information Technology Systems

E. Data Model Frameworks

QUESTION 21 2.00000 points Save Answer

Which of the following are Examples of content included on Web 2.0?


A. Blogs

B. Podcasts

C.

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 5 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

Wikis
D. RSS

E. .All of the above are examples

QUESTION 22 2.00000 points Save Answer

Which of the following is not included among data base security best practices?
A. Make sure sensitive data is not encrypted

B. Integrate and automate standardized security processes

C. Hide live production data by masking test data

D. Use data loss prevention tools to map out data flaws in order do identify where your sensitive data
resides
E. Monitor and document any configuration changes

QUESTION 23 2.00000 points Save Answer

E-mail policies as part of your IG program can never be too restrictive. The more restrictive the better.
True
False

QUESTION 24 2.00000 points Save Answer

Which of the following is not included in the principles for governance and management of enterprise IT in
CobiT 5?
A. Meeting Stakeholder needs

B. Service, Infrastructure and Applications

C. Covering the enterprise from end to end

D. Enabling a holistic approach

E. Separating Governance from Management

QUESTION 25 2.00000 points Save Answer

Which of the following is not included among the key functions of ValIT?
A. Define the relationship between IT and the business and those functions in the organization with
governance responsibilities
B. Manage the Organization's portfolio of IT enabled business investments

C. Establish responsibilities and plan to best support the organization

D. Maximize teh quality of business cases for IT enabled business investments

E. None of the above is the correct answer since all of the above are included in the key functions of the
ValIT governance plan

QUESTION 26 2.00000 points Save Answer

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 6 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

___ can be described as a way of standardizing the connection between two software applications. It is
used generally to protect data that is being transported from your workstation to the cloud and from the
cloud to your mobile device.
A. Application programming interface

B. DLS technology

C. Service-Oriented architecture

D. Electronic Records management software

E. None of the above is the correct answer

QUESTION 27 2.00000 points Save Answer

Which of the following features is generally available with MDM software?


A. Improved security

B. Streamlines enterprise management

C. Ability to remotely change the configuration a mobile device

D. Ability to remotely wipe or erase data from a mobile device

E. All of the above

QUESTION 28 2.00000 points Save Answer

You have been commissioned by a major health care provider who has a concern related to privacy and
security but they still want to use some form of cloud computing. Which would you recommend?
A. Private Cloud

B. Community Cloud

C. Public Cloud

D. Hybrid Cloud

E. None of the above

QUESTION 29 2.00000 points Save Answer

In order to be considered "cloud-computing" certain essential characteristic(s) must exist. Which of the
following is NOT among the essential characteristics?
A. An on-demand self-service feature

B. Capabilities must be available over the network and accessed through standard mechanisms that
promote use by mobile devices
C. The host provider's computing resources are pooled to serve multiple consumers using multi-tenant
models with different physical and virtual resources dynamically assigned and reassigned based on
consumer demand
D. The ability to monitor, control and report resource usage

E. None of the above is the correct answer since all of the above are essential characteristics

QUESTION 30 2.00000 points Save Answer

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 7 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

Using together firewall protection, antivirus protection, spyware software, IAM, hierarchial passwords,
intrusion detection and biometric verification together is an example of _______________________
A. Identity dragging

B. Data Srubbing

C. Conceptual modeling

D. Data Modeling

E. Defense in depth

QUESTION 31 2.00000 points Save Answer

Which of the following would be a type of archival method for archival of one or more types of social media
content?
A. TwInbox

B. ArchiveFacebook

C. SocialFolders

D. SocialSafe

E. All of the above

QUESTION 32 2.00000 points Save Answer

The main goal of _______ is to insure that reliable, accurate data from a single source is leveraged across
the business units in an organization.
A. ILM

B. MDM

C. RM

D. IG

E. IT

QUESTION 33 2.00000 points Save Answer

In Japan, the word "Kaizen" is similar to CPI in the maintenance of the IG program effectiveness. It reflects
the gradual and constant process of eliminating _____
A. Problems

B. The main causes of problems

C. Overhead costs

D. Unnecessary time related to IG

E. Wasted time

QUESTION 34 2.00000 points Save Answer

You have come to the sad realization that your employees are going to use IM as part of their business
communications. So, you need to give them tips to make the use safer. Which of the following would NOT
be included in the tips you give your employees?

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 8 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

A. Remember, if you have a choice between email and IM, use IM because those attachments can't
contain the malicious executable files that email does
B. Offer as much personal information as possible in the small number of characters available

C. Try to always use a default message to let those who are trying to communicate with you via IM know
when you will be away and not able to respond immediately
D. All A, B and C are good tips. Use them all.

E. Do not give either A, B or C as tips. All would be detrimental

QUESTION 35 2.00000 points Save Answer

When preserving social media content for legal purposes, you must preserve:
A. Just the post itself, the metadata is not required to be preserved

B. The post itself and the metadata, but the hyperlink to external content is not required to be perserved

C. The post itself, the metadata and the hyperlink to external content is required to be perserved, but
not the external content
D. The social media post is required to be preserved, as is the metadata, the hyperlink to external
content and the external content in its native format must all be preserved
E. None of the above is a correct answer since social media posts are not required to be preserved for
legal purposes

QUESTION 36 2.00000 points Save Answer

With regard to social media content, IG policies must be clear, and must employ real-time capture and
management of blog posts since the content may change over time.
True
False

QUESTION 37 2.00000 points Save Answer

A shared resource that provides dynamic access to computing services that may range from raw
computing power to basic infrastructure to fully operational and supported applications, is a definition or
description of ___________________
A. Mobile computing

B. Cloud computing

C. data modeling

D. Conceptual modeling

E. Data Modeling frameworks

QUESTION 38 2.00000 points Save Answer

___ is a type of cloud computing service that utilizes a more combined approach. The infrastructure is
considered a a composition of two or more clouds that remain unique entities but are bound together by
standardized or proprietary technology.
A. Private Cloud

B. Community Cloud

C.

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 9 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

Public Cloud
D. Hybrid Cloud

E. None of the above

QUESTION 39 2.00000 points Save Answer

Management is considering purchasing a ECM system.. Your advice is solicited. You are specifically asked,
"What do you see as one of the greatest weaknesses of teh ECM system"? Your best response is
__________________________
A. Its too complicated to use.

B. Its too costly

C. If the user has a legitimate password and legitimate access to the system, it won't stop them from
doing something they are supposed to do
D. It is not effective when used with anti-virus software and firewalls

E. It is perfect. I can't find a single issue with it that I could address

QUESTION 40 2.00000 points Save Answer

The need for Records Management has __________ over the past decade for nearly every enterprise or
industry in pbecause of such things as______.
A. Decreased, reduced governmental insight and regulation

B. Decreased, increases in governmental oversight and industry regulations

C. Increased, increases in governmental oversight and industry regulations

D. Increased, reduced governmental oversight and industry regulations

E. None of the above is a true statement

QUESTION 41 2.00000 points Save Answer

.Creating a network map or network diagram of the IT infrastructure is _________ to inventorying e-reords
and ________ required to have a great deal of detail.
A. Critical, is

B. Critical, is not

C. Unnecessary, is

D. Unnecessary, is

E. None of the above is the correct answer

QUESTION 42 2.00000 points Save Answer

A perimeter security approach to securing access to information has certain limitations or flaws. Which is
NOT among those limitations?
A. Unlimited Effectiveness since it can penetrate firewalls

B. Haphazard protection since workers store copies of the same information on their own devices

C. Too many perimeters to manage

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 10 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

D. No direct protection for e-documents and data when stakeholders such as partners, suppliers and
shareholders can share information
E. None of the above is a correct answer since all of the above are restrictions or limitations on
perimeter security

QUESTION 43 2.00000 points Save Answer

Which of the following statements is true regarding the use of e-mail in the work place?
A. It appears that in spite of the fact that employees are repeatedly told of the security risks it generally
makes no difference and does not act as a deterrent to employees sending their work email to their
personal accounts
B. Generally employees over the past couple of years have become aware that sending work
documents outside their corporate network to their personal email accounts is unsafe, and it appears
they have stopped doing it for the most part
C. Whatever policy that is used to deter unsafe email practices can't be a simple policy that says you
can never do it. That is, it can't be restrictive. Also it should be technology neutral rather than
discussing proprietary programs or features
D. A and C are both true statements

E. A, B and C are all true statements

QUESTION 44 2.00000 points Save Answer

In determining whether a document can be classified as a business record that needs to be retained the
organization must consider which of the following?
.
A. Regulatory and legal requirements imposed on the organization

B. Internal definitions

C. Requirements the organization imposes on itself

D. Through internal IG measures and business policies

E. All of the above

QUESTION 45 2.00000 points Save Answer

______ can be described as separating infrastructure, applications and data into layers which permeates
enterprise applications, coupled with an agile scalable infrastructure that make each enterprise a node in
the cloud.
A. Hierarchical computing

B. Service-oriented architecture

C. Conceptual architecture

D. Data Framework architecture

E. None of the above

QUESTION 46 2.00000 points Save Answer

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 11 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

The Data Governance Framework was created by the NIST in 2016.


True
False

QUESTION 47 2.00000 points Save Answer

Which of the following has been characterized as among the greatest social media security threats that an
enterprise faces?
A. The general lack of social media policy inside the organization

B. .Employees who create a potential insider threat because they fail to comprehend the negative
impact that their behavior in posting to social media sites has on the organization
C. The casua use of public comments can create liability for the employer

D. All of the above are important threats to the organization that must be considered when developing a
company social media policy
E. .None of the above is the correct answer since businesses can't be held accountable for what their
employees do on social media such as facebook and twitter

QUESTION 48 2.00000 points Save Answer

Which of the following are included among the reasons that continuous improvement is needed in the IG
program once it has been implemented?
A. New technological capabilities that can streamline or reduce costs of IG

B. Because laws and regulations will not change as they relate to IG

C. Because the business plan or strategy or target market will change over time

D. A and C only are included among the reasons for continuously improving or changing the IG program
once implemented
E. All A, B and C are included among the reasons for continuously improving or changing the IG
program once implemented

QUESTION 49 2.00000 points Save Answer

______ is a type of software used to assist organizations to remotely monitor, secure and manage mobile
devices.
A. ERM

B. ITLA

C. MDM

D. Data Modeling

E. Social Engineering

QUESTION 50 2.00000 points Save Answer

There is actually three layers of SharePoint solutions. The _____ actually sits atop the ____ and adds
additional functionality and features.
A. SWW, MOSS

B. MOSS, WSS

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 12 of 13
Take Test: Final Exam IG 1st Summer Term – 2018_... 6/25/18, 6:46 PM

C. MOSS, Microsoft Search Server

D. MicroSoft Search Server, WSS

E. WSS, Microsoft Search Server

Click Save and Submit to save and submit. Click Save All Answers to save all answers.

https://ucumberlands.blackboard.com/webapps/assessment/take/launc…t_id=_83236_1&course_id=_103876_1&content_id=_1336426_1&step=null Page 13 of 13