Reference no: EM132242596
Questions: 1. The process of cleaning and securing data and getting it to the right people at the right time. Making sure that data is not redundant is generally referred to as:
A. Information Governance
B. Records Management
C. Master Data Management (MDM)
D. Data Governance
E. Either, A, B, C or D above as the terms are interchangeable
2. Which of the following would NOT be included among the recommendations that you would make to your company to improve security on its mobile devices?
A. Always encrypt sensitive data stored on the mobile device
B. Assess the security around your mobile application server
C. Require your user to re-enter his or her credential after a period of time even though it can be annoying and time consuming
D. Make sure your application developer has training on secure-coding training
E. None of the above is a correct answer since all are among the guidelines or tips or best practices for improving security for mobile devices
3. Which of the following are included among the reasons that continuous improvement is needed in the IG program once it has been implemented?
A. New technological capabilities that can streamline or reduce costs of IG
B. Because laws and regulations will not change as they relate to IG
C. Because the business plan or strategy or target market will change over time
D. A and C only are included among the reasons for continuously improving or changing the IG program once implemented
E. All A, B and C are included among the reasons for continuously improving or changing the IG program once implemented
4. An OAIS compliant repository will preserve:
A. The SIP and AIP
B. The PDI and its associated dissemination packets
C. The AIPs and associated packets
D. The SIP, AIP, DIP abut will discared the PDI
E. None of the above is a correct answer
5. Which of th ISO standards is the audit and certification standard recommended by the ISO?
A. ISO 14721
B. ISO 18492
C. ISO 16363
D. ISO/IEEE 1000 (2005)
E. None of the above since there is no actual standard that has been recommended for audit and certification
6. Which of the following has been characterized as among the greatest social media security threats that an enterprise faces?
A. The general lack of social media policy inside the organization
B. .Employees who create a potential insider threat because they fail to comprehend the negative impact that their behavior in posting to social media sites has on the organization
C. The casua use of public comments can create liability for the employer
D. All of the above are important threats to the organization that must be considered when developing a company social media policy
E. .None of the above is the correct answer since businesses can't be held accountable for what their employees do on social media such as facebook and twitter
7. SharePoint is considered "self-provisioned" in that it
A. It is typically deployed by business users with IT given the authority to create new repositories for information within that environment without the author's input or intervention
B. It is typically deployed by IT and new repositories are also generally created by IT only
C. It is typically deployed by IT with business users given the authority to create new repositories for information within that environment without IT input or intervention
D. It is typically deployed by business users with those business users also given the authority to create new repositories for information within that environment without input from any other authority
E. It can be created and deployed remotely, and in the cloud environment
8. Which of the following is not included among data base security best practices?
A. Make sure sensitive data is not encrypted
B. Integrate and automate standardized security processes
C. Hide live production data by masking test data
D. Use data loss prevention tools to map out data flaws in order do identify where your sensitive data resides
E. Monitor and document any configuration changes
9. Which of the following is/are true statement(s) concerning SharePoint?
A. The best way to deploy it is just through trial and error. Get used to it and familiarize yourself with it as part of deployment
B. Simply deploying SharePoint will resolve business issues such as compliance.
C. There is no need to "tailor" SharePoint to your organization. It is designed to work seamlessly with every organization right out of the box
D. A, B and C are all true of SharePoint
E. None of the above is a correct answer
10. SharePoint has the following capabilities:
A. Content repository
B. automate business processes
C. Help Organizations govern their information
D. Provides a collaboration platform
E. All of the above
11. is the process of blocking out sensitive fields of information.
A. Concatenation
B. Venue
C. Decatitnation
D. Redacting
E. Muting
12. The core of OAIS is a functional model that consists of entitles. One of those included entities is the :
A. 2; API's and PDI
B. 6; Ingest process
C. 4; ISO 13720
D. 3; Migration refreshment
E. None of the above is a correct answer
13. Type of system solutions employed to manage e-documents and records for security, auditing, searching, record retention and disposition, and version control which are predominantly repository based and provide for collaborative workspaces for unstructured information are referred to generally as
A. Enterprise Content Management Systems
B. IAM Systems
C. Information Governance Systems
D. Information Technology Systems
E. Data Model Frameworks
14. Which of the following are included among the main processes of the ValIT framework?
A. Investment Management
B. Portfolio Management
C. IT and Business Management
D. Value Governance
E. None of the above is the correct answer to the since all of the above are among the processes of ValIT
15. can be described as separating infrastructure, applications and data into layers which permeates enterprise applications, coupled with an agile scalable infrastructure that make each enterprise a node in the cloud.
A. Hierarchical computing
B. Service-oriented architecture
C. Conceptual architecture
D. Data Framework architecture
E. None of the above
16. is an approach to email archival where email messages are retained for a limited time followed by their permanent, manual or automatic deletion.
A. Data Modeling
B. IAM systemizing
C. Comprehensive Modeling
D. Destructive Retention
E. Retentive Destruction
17. With regard to social media content, IG policies must be clear, and must employ real-time capture and management of blog posts since the content may change over time.
True
False
18. Federal Law that prohibits the unauthorized interception and disclosure of wire, oral or electronic communications.
A. Federal Wiretap Act
B. Stored Communications and Transactional Records Act
C. Electronic Communications Privacy Act
D. Children's Internet Protection Act
E. Children's Online Protection Act
19. You have been commissioned by a major health care provider who has a concern related to privacy and security but they still want to use some form of cloud computing. Which would you recommend?
A. Private Cloud
B. Community Cloud
C. Public Cloud
D. Hybrid Cloud
E. None of the above
20. The idea of using a hash digit algorithm to validate the integrity of electronic content after execution of media renewal activities that do not alter the underlying bit streams of electronic content is for the purpose of , as described in
A. insuring security of data; ISO 18492
B. Purposes of authenticity; ISO 18492
C. Security and Authenticity; both ISO 18492 and ISO 16363
D. Purposes of media retrieval; ISO 18492
21. can be described as a huge dump of email to mass storage, where the data is stored sequentially and is not compressed or indexed. Searching is difficult.
A. Email backups
B. Email archiving
C. Data scrubbing
D. Both A and B
E. All A, B and C fall within the definition generally
22. would be considered the first and best way logically to protect confidential information assets.
A. Install IDM software on the device
B. Removal of confidential, unnecessary or unneeded data from the mobile device
C. Use the device only behind a firewall
D. Put a password on the device
E. Use a device that has only SSD technology
23. The first step in SharePoint deployment is
A. Drafting the project schedule
B. Drafting the project charter
C. Drafting the formal SharePoint governance document
D. Employee training
E. Develop strategies and guidelines and put them on paper
24. Typically, an electronic records management system will include which of the following basic function(s)?
A. Access and Security Controls
B. Marking the e-document a read-only record to prevent corruption and alteration
C. Maintaining organizational/historical metadata
D. A and B above only as metadata is not permitted to be archived
E. A, B and C above
25. Your company had determined that in using cloud computing it has experienced information breaches that it does not believe is malicious, but is the result of lack of training and awareness, which causes the employees to accidentally compromise sensitive data. What would you recommend as a "fix" or partial fix for this problem?
A. Implementation of a DLS
B. Strong encryption
C. The use of secure storage, management and document destruction practices
D. Only B and C above
E. All A, B and C above
26. Type of API migration which occurs when one or more APIs are copied exactly to the same type of storage media with no alterations occurring in the packaging of information, the content information, the PDI, when there is a change to the AIP location and access archival storage mapping infrastructure
A. Repackage migration
B. Migration replication
C. Migration transformation
D. Migration refreshment
E. Migration assessment
27. In planning for SharePoint deployment and governance, after your business objectives are formed and your guiding principles are established, then the next step is to:
A. Determine the scope of deployment
B. Train your employees
C. Develop the business strategy
D. Identify the executive sponsor
E. Develop a formal deployment manual
28. is an approach to security that uses multiple layers of security mechanisms to protect information assets and reduce the likelihood that rogue attacks can succeed.
A. Missile defense
B. Defense in depth
C. Objective Defensive identity defense
D. All A, B and C would achieve the same objective
E. None of the above
29. How does social media differ from other communications and collaboration systems such as email and IM in a significant way?
A. The architecture of social media is different
B. The underlying assumptions are different in that social media tends to bring attention to the user's endorsement or rejection of content or ideas
C. Social Media Sites are more dynamic
D. There is essentially no differences between social media, email and IM
E. All A, B and C are differences
30. There are broad categories of digital preservation standards. They include:
A. 1, There is only one standard, namely OAIS
B. 2, the first is System infrastructure capabilities and the second is services that support trustworthy repositories and open standard technology-file formats
C. 3, OAIS, ISO 14721 and ISO ASCII
D. 4, PDI, SIP, DIP and AIP
E. There are an infinte number of standards
31. "Traditional" email system backups are exactly the same as email archiving software. So it makes no difference which you use, as long as you use one of the two.
True
False
32. In Japan, the word "Kaizen" is similar to CPI in the maintenance of the IG program effectiveness. It reflects the gradual and constant process of eliminating
A. Problems
B. The main causes of problems
C. Overhead costs
D. Unnecessary time related to IG
E. Wasted time
33. By comparison, which of the following types of archival information packet migration would have the greatest risk of potential loss of information?
A. Repackage migration
B. Migration replication
C. Migration transformation
D. Migration refreshment
E. Migration assessment
34. Which of the following would be a type of archival method for archival of one or more types of social media content?
A. TwInbox
B. ArchiveFacebook
C. SocialFolders
D. SocialSafe
E. All of the above
35. What is the difference between COBIT 4.1 and CobiT 5?
A. CobiT 5 does not include key principles for governance and management
B. CobiT 5 does not include enablers
C. CobiT 5 is a value oriented framework where COBIT 4.1 is a process based framework
D. CobiT 5 does not relate to the ISO standard whereas COBIT 4.1 does
E. None of the above is the correct answer
36. is a type of cloud computing service where the cloud infrastructure is made available to the general public or a large industry group and is owned by the organization selling cloud services.
A. Private Cloud
B. Community Cloud
C. Public Cloud
D. Hybrid Cloud
E. None of the above
37. Approach to data modeling often confused with MDM as it refers to data in categories and is used only to categorize other data found in a database
A. Physical Data Modeling
B. Conceptual data Modeling
C. Enterprise data modeling
D. Data Integration modeling
E. None of the above
38. Which of the following are among the most serious concerns regarding using cloud computing?
A. Security risks
B. Loss of direct IT control
C. Privacy concerns
D. Records management issues
E. All of the above are among the limitations or concerns related to cloud computing
39. One of your departmental managers tells you, "I am thinking about protecting our MicroSoft Office files by password protecting the files. I am told many organizations all over the world do this." What do you think? Do you see any downsides? Your best response is
A. Your are right, it is used all over the world. But make sure that you know what the password is because if the employee who creates the password leaves you are stuck because you can't retrieve it.
B. I don't think anybody has ever used it. It just doesn't exist with MicroSoft file applications
C. Sure go for it. I don't see any problems. It would be good with the number of employees who are coming and going these days
D. I don't think it will work of you are also using a firewall, so be careful
E. Yeah, its okay but you are limited to only 6 characters and it has weak securty
40. You use cloud computing solutions. Your company has discovered that the cloud provider's employee has stolen information from your compnay and has sold it to one of your competitors. What can you use to combat this in the future?
A. Implement DLP and IRM technology
B. Request an assessment of the supplier's practices and complete supply supply chain including the services that are subcontracted
C. Implement a firewall
D. Only A and B above will help with this problem
E. All A, B and C will minimize the risk of this happening again
41. Legal concept where emails are improperly destroyed and for that reason cannot be produced during discovery. The business that destroyed the email is punished by the Court. This is referred to as
A. Data scrubbing
B. Data de-redundancy
C. Spoilation
D. .Social Engineering
E. Phishing
42. is a type of problem created when the maintenance of identities does not keep up with the changing identitie of authorized users. This is combated by
A. Data Modeling, Firewalls
B. Data Scrubbing, Antivirus Software
C. Data de-redundancy, Anti-spyware software
D. Identity drag, IAM softwre
E. None of the above
43. The ISO defines "long term" in which of the following standards?
A. ISO 23434
B. ISO 14721
C. ISO/IEEE 803
D. ISO 9999
E. None of the above is a correct answer since the ISO stated that long term is not capable fo being defined.
44. For some unexplained reason, it appears that the popularity of mobile computing has appeared to decline over the past couple of years.
True
False
45. While it is teh CIO who has line responsibility for implementing IT governance, he/she is typically not the officer who should receive the reports and updates to discharge the responsibilities for IT governance and to see that the program is functioning well and providing business benefits.
True
False
46. You, a U.S. citizen wish to request a copy of Hillary Clinton's emails that have been disclosed to the U.S. Government, which were stored on her private server in her basement. You would most likely use which federal law to try to get access to these documents?
A. The Federal Wiretapping Act
B. The Federal Criminal Abuse Act
C. The Freedom of Information Act
D. The Whitewater Act
E. The Monica Lewenski Act
47. The PREMIS data model include semantic models. Included among them is the "Right" which involves :
A. 3, discrete units of information in digital for m that may exist as a bit stream, a file or a representation.
B. 5, actors in digital preservation that can be individuals, organizations, or software applications.
C. 4, the assertion of access rights and access privileges that relate to intellectual property, privacy or other related items.
D. 5, actions that involve at least one digital object and or agent known to the repository. Used to support the chain of custody of digital objects
E. None of the above
48. There is actually three layers of SharePoint solutions. The actually sits atop the and adds additional functionality and features.
A. SWW, MOSS
B. MOSS, WSS
C. MOSS, Microsoft Search Server
D. MicroSoft Search Server, WSS
E. WSS, Microsoft Search Server
49. The retention decision related to e-mail, along with other e-documents should ultimately rest with the IT department head.
True
False
50. THE ISO recommends protecting security of electronic records by
A. ISO 16363; creating a network monitoring system and implementing numerous routers
B. ISO 16363; creating a firewall between the electronic content outside the repository and the external users
C. ISO 18492; by creating a firewall between the electronic content in a repository and the network router
D. ISO 18492; by creating a firewall between the electronic content outside the repository and the external users
E. None of the above is the correct answer