EOC Exam

Question 1

3.8 out of 3.8 points

   
  An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:      
  Selected Answer: All of the aboveCorrect Answer: All of the above      

Question 2

3.8 out of 3.8 points

   
  A CIO must spend part of the day performing _____ tasks and the some part of the day working on operational tasks. Rarely can a CIO focus on just one task in any given day.      
  Selected Answer: StrategicCorrect Answer: Strategic      

Question 3

3.8 out of 3.8 points

   
  An organization’s only sustainable competitive advantage lies in:      
  Selected Answer: The employees’ knowledge and how they apply that knowledge to business problems.Correct Answer: The employees’ knowledge and how they apply that knowledge to business problems.      

Question 4

3.8 out of 3.8 points

   
  Business intelligence is a more specific form of knowledge management that seeks to extract knowledge from ______.      
  Selected Answer: dataCorrect Answer:Evaluation MethodCorrect AnswerCase SensitivityExact Matchdata      

Question 5

3.8 out of 3.8 points

   
  What does PMO stand for?      
  Selected Answer: Project Management OfficeCorrect Answer: Project Management Office      

Question 6

3.8 out of 3.8 points

   
  Included in the five critical elements that are used to raise security in a firm are all of the following except:      
  Selected Answer: Law enforcementCorrect Answer: Law enforcement      

Question 7

3.8 out of 3.8 points

   
  The business side of IT is very different from the business itself.      
  Selected Answer: FalseCorrect Answer: False      

Question 8

3.8 out of 3.8 points

   
  Only large, multi-national organizations pursue outsourcing arrangements.      
  Selected Answer: FalseCorrect Answer: False      

Question 9

3.8 out of 3.8 points

   
  The riskiest approach to system implementation is a parallel conversion.      
  Selected Answer: FalseCorrect Answer: False      

Question 10

3.8 out of 3.8 points

   
  Who is responsible for decisions about security strategy?      
  Selected Answer: Business leadersCorrect Answer: Business leaders      

Question 11

3.8 out of 3.8 points

   
  Green computing is often associated with supporting the triple bottom line known as:      
  Selected Answer: Economic, environmental and socialCorrect Answer: Economic, environmental and social      

Question 12

3.8 out of 3.8 points

   
  In today’s hypercompetitive business environment, firms that have strong project management skills have a higher likelihood of success because they are able to:      
  Selected Answer: Adapt processes and systems and therefore innovate faster than their competitors.Correct Answer: Adapt processes and systems and therefore innovate faster than their competitors.      

Question 13

3.8 out of 3.8 points

   
  Outsourcing to a company located in the same time zone is referred to as this type of sourcing.      
  Selected Answer: NearshoringCorrect Answer: Nearshoring      

Question 14

Needs Grading

   
  Discuss how data mining can add value to an organization.      
  Selected Answer:Data mining can add value to an organization by analyzing data and finding redundancies, historical data, customer patterns of behavior and more to pinpoint how the business is doing, consumer interest in certain products etc to boost marketability and drive traffic to certain customers. Correct Answer:[None]Response Feedback:[None Given]      

Question 15

3.8 out of 3.8 points

   
  This is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits.      
  Selected Answer: CookieCorrect Answer: Cookie      

Question 16

3.8 out of 3.8 points

   
  Critical to the business case is the identification of both _________ and ________.      
  Selected Answer: costs, benefitsCorrect Answer: costs, benefits      

Question 17

3.8 out of 3.8 points

   
  All of the following are main processes of knowledge management EXCEPT:      
  Selected Answer: The absorption of knowledgeCorrect Answer: The absorption of knowledge      

Question 18

3.8 out of 3.8 points

   
  Organizations choose to outsource IT activities for all of the following reasons EXCEPT:      
  Selected Answer: To create a core competencyCorrect Answer: To create a core competency      

Question 19

3.8 out of 3.8 points

   
  Sam has just purchased 10 new high speed color laser printers for his company.  He is very excited because he got a 40% discount and paid only $2,990 for each unit.  His boss, Joe, wants to know things such as operating costs, support, overhead, etc. for the printers.  Joe wants to know this value:      
  Selected Answer: TCOCorrect Answer: TCO      

Question 20

3.8 out of 3.8 points

   
  The most common driver for insourcing is to:      
  Selected Answer: Keep core competencies in-house.Correct Answer: Keep core competencies in-house.      

Question 21

3.8 out of 3.8 points

   
  A company should examine this area of the control of information if it wants to determine what data it has the right to monitor and capture from its employees.      
  Selected Answer: PrivacyCorrect Answer: Privacy      

Question 22

3.8 out of 3.8 points

   
  This type of organization management is where IT controls most of its IT infrastructure in one location.      
  Selected Answer: Centralized IS organizationCorrect Answer: Centralized IS organization      

Question 23

Needs Grading

   
  If you were put in charge to develop the policy regarding passwords, what would your recommendations be?      
  Selected Answer:increase password complexityincrease password lengthdecrease password change intervalspasswords cannot be written downincrease password encryption algorithm strengthCorrect Answer:[None]Response Feedback:[None Given]      

Question 24

3.8 out of 3.8 points

   
  This IT governance archetype consists of C-level executives and at least one other business group. An IT executive may be an additional participant.      
  Selected Answer: FederalCorrect Answer: Federal      

Question 25

3.8 out of 3.8 points

   
  If you receive an email from your son, and the body of the email tells you to open an attachment because it is funny, the risk is pretty close to zero because it came from your son.      
  Selected Answer: FalseCorrect Answer: False      

Place an Order

Plagiarism Free!

Scroll to Top