IAP301

IAP301

University

20 Qs

quiz-placeholder

Similar activities

W4 - Representing and sharing content using technology

W4 - Representing and sharing content using technology

University

17 Qs

Quiz about Selection and use of IMs(online assessment)

Quiz about Selection and use of IMs(online assessment)

University

15 Qs

ICT 2022

ICT 2022

University

20 Qs

Software Engineering Design Phase

Software Engineering Design Phase

University

17 Qs

Blender (Software)

Blender (Software)

1st Grade - Professional Development

18 Qs

AES QUIZ

AES QUIZ

University

15 Qs

W2 - Pedagogies of technology-enhanced learning

W2 - Pedagogies of technology-enhanced learning

University

17 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

IAP301

IAP301

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Sang Minh

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You review how you are going to manage your IT investment such as contracts, new policy ideas, service level agreements (SLAs) which are stated commitment to provide a specific service level". In which phase of COBIT 5.0 does this situation belong to?

a. Align, Plan, and Organize

b. Build, Acquire, and Implement

c. Deliver, Service, and Support

d. Monitor, Evaluate, and Assess

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice sends an email to Bob that says "I agree to purchase 100 widgets at $10 each." Bob receives the email and it is digitally signed by Alice's private key. The signature verifies that the email came from Alice. Later, Alice claims she never sent that email agreeing to purchase the widgets. However, Bob has the digitally signed email which proves the message came from Alice. What is the issue here ?

a. Unauthorized access to the system

b. Integrity of the data

c. Availability of the data

d. Nonrepudiation of the data

e. Unauthorized use of the system

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A major retailer recently began offering an augmented reality (AR) shopping app that allows customers to visualize products in their homes. During a routine security audit, the app developer uncovered that hackers could potentially access the smartphone cameras of users. Further, analysis showed that certain camera permissions were not configured properly, allowing malicious actors a way to activate cameras without the user's knowledge. Which of the following best describes the problem?

a. A new threat was discovered.

.

b. A new vulnerability was discovered.

c. A new risk was discovered.

d. A new breach was discovered

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is developing a new web application and wants to ensure it follows industry standards for security, accessibility, and interoperability. For security, they decide to implement authentication following the OpenID Connect standard. This allows users to login with their existing accounts from Google, Facebook etc. rather than creating new credentials. For accessibility, they ensure the application complies with guidelines. This covers aspects like color contrast, keyboard navigation, and screen reader functionality. For interoperability, they use common web standards like HTTP, HTML5, CSS, and JavaScript. What does the company apply?

a. Policy

b. Standard

c. Procedure

d. Guildline

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An audit that is done by government agencies that assess the company's

compliance with laws and regulations is called ________.

a. Self-Assessment

b. Internal Audit

c. External Audit

.

d. Regulator Audit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital implements a new electronic health record (EHR) system. Shortly after deployment, nurses report that the system is very slow during peak hours of the day, delaying access to patient records. The hospital's IT team investigates and determines the EHR system is undersized for the number of concurrent users during busy shifts, causing performance lag. Which control should they apply to mitigate the problem?

a. Preventative

b. Correlative

c. Detective

d. Corrective

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an detective control?

a. A control that stops behavior immediately and does not rely on human decisions

b. A control that does not stop behavior immediately and relies on human decisions

c. A control that does not stop behavior immediately but automates notification of incident

d. A control that stops behavior immediately and relies on human decisions

a

b

c

d

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?