Key Ita
Key Ita
Key Ita
b. False
b
You are the CIO of a company that wants to create a new software application without
having to worry about purchasing and maintaining all the required underlying hardware
infrastructure (e.g., network, storage, processor, bandwidth) and operating system
support software (e.g., OS updates, antivirus) etc. What are you basically looking for?
(a) SaaS
(b) PaaS
(c) IaaS
d
Which of the following is an example of SaaS?
(a) Cisco Webex
(b) Google Docs
(c) Citrix GoToMeeting
(d) All of the above
a
In which of the scenarios is IaaS NOT applicable:
(a) When regulatory compliance prohibits offshoring data storage and processing
(b) When the demand is very volatile or the organization is growing
(c) When there is limited capital to be spent on infrastructure
(d) When there is temporary infrastructural need
c
A public cloud option may be more suitable for an organization than using a private
cloud when it needs:
(a) Greater control
(b) Lower latency
(c) Higher elasticity
(d) Better performance
d
Which of the following is true for data centers?
(a) Data centers have rows of interconnected servers
(b) Data centers maintain backup of the data stored on each server
(c) If one server fails, another server in the data center can take over its role without
interruption
(d) All of the above
d
Which of the following statements is NOT true?
(a) Fog computing introduces computational power in the edge routers to which IoT
devices connect
(b) Datacenters with fully connected topology improves host-to-host capacity
(c) Blade servers in a rack are interconnected using the TOR switch
(d) Fog computing is a technology that is intended to replace Cloud computing
c
Which of the following statement is true?
(a) Visible light is not a part of the electromagnetic spectrum
(b) All wireless technologies use the same frequency
(c) There is a trade-off between the mobility range and data speed that different
technologies offer
(d) None of the above
d
Which of the following statement is NOT true?
(a) Human voice produce analog signals
(b) Voice signals can be digitized to a binary representation, which can then be sent
over wireless signals through techniques like signal modulation.
(c) FM stands for frequency modulation
(d) None of the above
d
Which of the following statement is true?
(a) The term "Cellular" in cellular networks comes from honeycomb shape of areas for
a coverage region
(b) Adjacent parts of cells in a cellular network operate on different frequencies to
minimize interference in wireless data transmission
(c) Base stations of adjacent cells participate in the handover process to minimize call
drop rates
(d) All of the above
d
Which of the following statements is true?
(a) Mobile CRM modules can help employees in remote locations have real-time access
to customer data
(b) RFID technology can be used to monitor and get reports on equipment status
without the need for physical examination.
(c) Using WiFi and other wireless technologies to connect smart home appliances can
help realize green buildings
(d) All of the above
a
Barcode was intenved in?
a. 1948
b. 1967
c. 1946
d. 1964
a
Which of the following statements is NOT true?
(a) RFID is less expensive than bar codes and QR codes
(b) RFID stands for Radio Frequency Identification
(c) RFID readers can read multiple RFID tags at the same time
(d) The size of the antenna that can be used inside an RFID tag affects the distance
from which it can be scanned.
b
Which of the following statements is NOT true about WiFi networks?
(a) WiFi operates in an unlicensed spectrum band
(b) WiFi and cellular networks use the same set of frequencies
(c) WiFi is an example of Wireless Local Area Networks (WLAN)
(d) All of the above
a
Which of the following statements is NOT true?
(a) 1G cellular networks support voice and data services
(b) 2G cellular networks support both voice and messaging services
(c) 3G and 4G cellular networks support both voice and data services
(d) 5G cellular networks will support Internet of Things and other data heavy services
a
Which of the following pairing of technology to its coverage area is mismatched?
(a) Bluetooth - Wireless Metropolitan Area Network (WMAN)
(b) WiFi - Wireless Local Area Network (WLAN)
(c) CDMA - Wireless Wide Area Network (WWAN)
(d) None of the above
a
The mobile phones we carry today have more computing power than the computers
used for the Apollo 11 to land on the moon.
a. True
b. False
c
Which of the following technology can be used inside a store to track which aisle a
customer is in?
(a) Barcode on each product
(b) QR code on each product
(c) RFID tag on a shopping cart
(d) Geolocation data from cell phone
d
Which of the following statements is true?
(a) Usage based pricing for data is a way to charge based on the volume of data
consumed
(b) Time dependent pricing for data is a way to charge based on the time of day at
which data is consumed
(c) Location based pricing for data is a way to charge based on the location at which
data is consumed
(d) All of the above
d
Which of these are characteristics of secure communication?
(a) Confidentiality
(b) Data Integrity
(c) Authentication
(d) All of the above
b
A Trojan horse refers to a computer program that...
(a) has the intent to slow down a machine through self-replication and using up all the
available resources
(b) has the intent to open a backdoor on a machine for an attacker to gain remote
access
(c) has the intent to create an additional layer of protection against viruses on a
machine
(d) none of the above
d
Which of the following is an example of attack involving impersonation or spying on
ongoing data exchanges?
(a) IP Spoofing
(b) Packet Sniffing
(c) Man-in-the-Middle
(d) All of the above
c
Which of the following statement about cipher based encryption is NOT true?
Which of the following statement about cipher based encryption is NOT true?
(a) Caesar ciphers shift the alphabetical letters by a number (key) that is known only to
the sender and the receiver of a message.
(b) A key challenge with Caesar cipher and its variants is the need to share the key in
advance in a trusted environment
(c) Caesar cipher is a stronger encryption technique than one-time pads
(d) Perfect one time pads can be unbreakable because of the computational power
needed
c
Which of the following private key based data encryption system is the strongest?
(a) DES
(b) 3DES
(c) AES
(d) All of them are of similar strength
b
Which of the following statements about public key cryptosystem is NOT true?
(a) Message can be encoded with one key (either of the two) and decoded with the
other
(b) Message can only be encoded with the private key and decoded with the public
key, not vice versa
(c) Someone can know the public key, but that should not allow him or her to deduce
the private key
(d) It can be used for encryption as well as in authentication and digital signatures
d
Which of the following suggested usage of cyber defense system is correct:
(a) Encryption is used to protect sensitive information and data
(b) Host-based Intrusion Detection Systems are used to monitor and protect individual
machines and systems.
(c) Network-based Intrusion Detection Systems are used to monitor and protect
organization's network
(d) All of the above
b
Which of the following should be AVOIDED to prevent confidential data loss from
cyberattacks?
(a) Store the encrypted data and the encryption key at different locations
(b) Store the encrypted data and the encryption key at the same location
(c) Use a two-factor access control
(d) Limit third-party access to the internal network
b
The type of disclosure process in which a new bug discovery is reported right away to
the public is known as:
(a) Responsible Disclosure
(b) Full Disclosure
(c) Market Disclosure
(d) None of the above
a
Attackers can exploit gaps in cross-organizational processes more easily when
algorithmic decision-making is involved. Which of the following technology may best
help to address some of these concerns?
(a) Blockchain
(b) Cloud computing
(c) Internet of Things
(d) None of the above
b
Which of the following statements about blockchain is NOT true?
(a) It is a distributed ledger that records transactions
(b) It has a centralized validation system
(c) It uses cryptographic codes for securing transaction records
(d) It is the technology behind Bitcoin
c
Which of the following statements provides a valid reason in favor of blockchains
over traditional databases?
(a) Traditional databases are not capable of storing transaction information
(b) Transaction data stored in a traditional database can be validated by anyone but
blockchains offer a more closed solution that increases security.
(c) Transaction data are stored in a traditional database under the control of a single
administrator who needs to be trusted, whereas blockchains create a distributed
ledger that can be validated by anyone.
(d) All of the above
d
Which of the following statements is true about Bitcoins?
(a) Bitcoin is the world's first digital currency based on the blockchain technology that
was launched in 2009 as an alternative to traditional currency.
(b) In Bitcoins, there is no need to have an actual physical currency because its
blockchain keeps an entire transaction history on who owned each bitcoin at different
times in the past.
(c) Transaction records in banking are centrally controlled and closed to the public for
security reasons, whereas bitcoin brings in the public to validate every ownership and
transaction, thus adding transparency.
(d) All of the above
b
Which of the following statements is NOT true about Bitcoins?
(a) Bitcoin uses cryptography to maintain security and immutability of transactions.
(b) Bitcoin miners use private key cryptography for encrypting transactions.
(c) Miners in Bitcoin blockchain collect and validate transaction requests.
(d) When a miner successfully validates and adds a new block of transaction records to
the chain, they earn bitcoins in lieu of their computational power spent in this process.
Skip
d
Which of the following statements about the steps of Bitcoin mining is NOT true?
(a) Bitcoin miners scoop up a whole bunch of transaction requests that they process
(b) Bitcoin miners check to ensure that the digital signatures are valid and that there are
enough bitcoins in the wallet for a valid transaction.
(c) Miners compete globally to produce blocks of validated transactions. The first miner
to produce a valid block of transactions earns bitcoins and their block is added to end of
the blockchain.
(d) All the miners participated in mining will get an equal share of the bitcoins for
participating in the computation process.
d
In the context of the irreversibility of blockchains, which of the following statement is
NOT true?
(a) The process of adding blocks to a blockchain is such that it is very expensive - in
terms of computational power, and hence, electricity - to add new blocks and even more
so to change blocks further back in the chain.
(b) Any miner trying to add a new block of data is required to provide a cryptographic
proof called Proof of Work.
(c) To produce the Proof of Work, a miner will have to perform multiple rounds of
hashing with the data of the previous block such that the resultant hash value begins
with a specified number of zeros.
(d) A miner predicts what hash values will be produced and adjusts the data used in the
hashing process.
d
Which of the following is true for smart contracts?
(a) They are software code outlining contracts associated with transactions, which
remain unaltered, accessible and publicly verifiable for the blockchain's lifespan.
(b) Smart contracts often interface with external applications that reside outside the
blockchain
(c) Smart contracts can be used for peer-to-peer transactions, e.g., smart electricity
grid, ridesharing services, etc
(d) All of the above
a
College diplomas, transcripts, and other educational records are being tracked and
stored in Blockchains because they provide easy accessibility, verifiability and
immutability of data.
a. True
b. False
a
Suppose your organization has data needs to be secured and stored centrally. What
technology option should you use?
(a) Traditional Database
(b) Blockchain
b
Suppose multiple stakeholders in a supply chain need to update some records in a
dynamic manner but they all want verifiability and immutability of the data. What
technology option should you use?
(a) Traditional Database
(b) Blockchain
d
Which of the following statements is true?
(a) Cheap land, cheap electricity, and easy access to advanced hardware vendors for
customization are beneficial for blockchain mining.
(b) As applications of Blockchains continue to grow, the energy consumption for the
computation will be a key factor for enterprises to consider.
(c) Smaller scale permissioned blockchain that limit participation to trusted miners can
reduce computational overhead and energy needs.
(d) All of the above.
A
Informational systems are about?
a. Providing aggregated information for decision making.
b. Performing core business processes of the firm cost effectively.
c. Providing customers with a differentiated service.
d. All of the above.
T
IT Portfolio management means that the IT investment portfolio of a firm must be
continuously evolving with time.
True
False
T
Prior research suggests that if the user organizations are presented with an IT service
that has a price associated with it, it reduces the demand for the IT service.
True
False