Attched Pleasse find the WORD Document Exam Quiz

 Question Completion Status: QUESTION 1
  1. By comparison, which of the following types of archival information packet migration would have the greatest risk of potential loss of information?

A.

Repackage migration

B.

Migration replication

C.

Migration transformation

D.

Migration refreshment

E.

Migration assessment

2 points   

QUESTION 2
  1. Ultimately, which department or personnel should make the final decision as to which e-mails are subject to record retention?

A.

The creator/author of the email

B.

The departmental manager for the department sending the email

C.

The recipient of the email

D.

The IT department supervisor or manager

E.

The legal department or legal consultant or in-house counsel

2 points   

QUESTION 3
  1. The main goal of _______ is to insure that reliable, accurate data from a single source is leveraged across the business units in an organization. 

A.

ILM

B.

MDM

C.

RM

D.

IG

E.

IT

2 points   

QUESTION 4
  1. ________________ is an approach to security that uses multiple layers of security mechanisms to protect information assets and reduce the likelihood that rogue attacks can succeed.

A.

Missile defense

B.

Defense in depth

C.

Objective Defensive identity defense

D.

All A, B and C would achieve the same objective

E.

None of the above

2 points   

QUESTION 5
  1. _____ can be described as a huge dump of email to mass storage, where the data is stored sequentially and is not compressed or indexed.  Searching is difficult. 

A.

Email backups

B.

Email archiving

C.

Data scrubbing

D.

Both A and B

E.

All A, B and C fall within the definition generally

2 points   

QUESTION 6
  1. E-mail communications created using the business email system may be declared a formal business record, depending on its content.

 True

 False

2 points   

QUESTION 7
  1. The first step in SharePoint deployment is _________________________

A.

Drafting the project schedule

B.

Drafting the project charter

C.

Drafting the formal SharePoint governance document

D.

Employee training

E.

Develop strategies and guidelines and put them on paper

2 points   

QUESTION 8
  1. Which of the following are included among the reasons that continuous improvement is needed in the IG program once it has been implemented?

A.

New technological capabilities that can streamline or reduce costs of IG

B.

Because laws and regulations will not change as they relate to IG

C.

Because the business plan or strategy or target market will change over time 

D.

A and C only are included among the reasons for continuously improving or changing the IG program once implemented

E.

All A, B and C are included among the reasons for continuously improving or changing the IG program once implemented

2 points   

QUESTION 9
  1. You, a U.S. citizen wish to request a copy of Hillary Clinton's emails that have been disclosed to the U.S. Government, which were stored on her private server in her basement.  You would most likely use which federal law to try to get access to these documents?

A.

The Federal Wiretapping Act

B.

The Federal Criminal Abuse Act

C.

The Freedom of Information Act

D.

The Whitewater Act

E.

The Monica Lewenski Act

2 points   

QUESTION 10
  1. The core of OAIS is a functional model that consists of ___ entitles.  One of those included entities is the :

A.

2; API's and PDI

B.

6; Ingest process

C.

4; ISO 13720

D.

3; Migration refreshment

E.

None of the above is a correct answer

2 points   

QUESTION 11
  1. Which of the following is not an approach to data modeling?

A.

CobiT

B.

CobiT5

C.

ValIT

D.

All of the above are approaches to data modeling

E.

None of the above are approaches to data modeling

2 points   

QUESTION 12
  1. Which of the following ins not a characteristic of long term digital preservation?

A.

Applies only to content that was originated in digital form

B.

Must have a means of retrieval of the content

C.

Must be error free

D.

None of th above applies to long term digital preservation

E.

None of the above is a correct answer since all A, B, and C are characteristics of long term digital preservation

2 points   

QUESTION 13
  1. In planning for the deployment of SharePoint, the ____ should be created before the _________ and then used to define the______ for the SharePoint governance model.

A.

Business Objectives, Business Strategies, Guiding principles

B.

Guiding Principles, Business Objectives, Business Objectives

C.

Business Objectives, Guiding Principles, Guiding Principles

D.

Business Strategies, Guiding Principles, Guiding Objectives

E.

Cope of deployment, Business Strategies, Guiding Objectives

2 points   

QUESTION 14
  1. Example:  John Doe has moved to a different department in the organization. In this department, he has a different level of clearance. He has clearance in an entirely different department from which he previously worked, which was research and development. His current clearance should be for shipping and receiving.  Six months after his transfer, he logs into his computer in his new office using his old user name and password.  To his surprise he is able to review the new trade secrets from research and development. He downloads and sells them.  This situation can best be described as ____

A.

Data Modeling

B.

Data Scrubbing

C.

Identity Drag

D.

AIM

E.

Social Engineering

2 points   

QUESTION 15
  1. The idea of using a hash digit algorithm to validate the integrity of electronic content after execution of media renewal activities that do not alter the underlying bit streams of electronic content is for the purpose of ________, as described in ________

A.

insuring security of data; ISO 18492

B.

Purposes of authenticity; ISO 18492

C.

Security and Authenticity; both ISO 18492 and ISO 16363

D.

Purposes of media retrieval; ISO 18492

2 points   

QUESTION 16
  1. The PREMIS data model include ___ semantic models.  Included among them is the "Right" which involves ____:

A.

3, discrete units of information in digital for m that may exist as a bit stream, a file or a representation. 

B.

5, actors in digital preservation that can be individuals, organizations, or software applications.

C.

4, the assertion of access rights and access privileges that relate to intellectual property, privacy or other related items.

D.

5, actions that involve at least one digital object and or agent known to the repository.  Used to support the chain of custody of digital objects

E.

None of the above

2 points   

QUESTION 17
  1. Which of the following would NOT be included among the recommendations that you would make to your company to improve security on its mobile devices?

A.

Always encrypt sensitive data stored on the mobile device

B.

Assess the security around your mobile application server

C.

Require your user to re-enter his or her credential after a period of time even though it can be annoying and time consuming

D.

Make sure your application developer has training on secure-coding training

E.

None of the above is a correct answer since all are among the guidelines or tips or best practices for improving security for mobile devices

2 points   

QUESTION 18
  1.  Microsoft Search Server's enterprise Search engine portion of SharePoint that can be integrated into the ___ to provide advanced indexing and searching capabilities 

A.

MOSS

B.

WSS

C.

ITIL

D.

Firewall

E.

WWE

2 points   

QUESTION 19
  1. Sharepoint and Drupal can both be classified as a type of: _________

A.

Content management application

B.

File Storage/File sharing platform

C.

Social Media category

D.

A, B and C above are all correct answers

E.

None of the above is a correct answer

2 points   

QUESTION 20
  1. For some unexplained reason, it appears that the popularity of mobile computing has appeared to decline over the past couple of years.

 True

 False

2 points   

QUESTION 21
  1. E-mail policies as part of your IG program can never be too restrictive. The more restrictive the better.

 True

 False

2 points   

QUESTION 22
  1. Which of th ISO standards is the audit and certification standard recommended by the ISO?

A.

ISO 14721

B.

ISO 18492

C.

ISO 16363

D.

ISO/IEEE 1000 (2005)

E.

None of the above since there is no actual standard that has been recommended for audit and certification

2 points   

QUESTION 23
  1. You have been commissioned by a major health care provider who has a concern related to privacy and security but they still want to use some form of cloud computing. Which would you recommend?

A.

Private Cloud

B.

Community Cloud

C.

Public Cloud

D.

Hybrid Cloud

E.

None of the above

2 points   

QUESTION 24
  1. Which of the following are among the most serious concerns regarding using cloud computing?

A.

Security risks

B.

Loss of direct IT control

C.

Privacy concerns

D.

Records management issues

E.

All of the above are among the limitations or concerns related to cloud computing

2 points   

QUESTION 25
  1. Federal Law that prohibits the unauthorized interception and disclosure of wire, oral or electronic communications.

A.

Federal Wiretap Act

B.

Stored Communications and Transactional Records Act

C.

Electronic Communications Privacy Act

D.

Children's Internet Protection Act

E.

Children's Online Protection Act

2 points   

QUESTION 26
  1. ______ is a type of public social media solution for archiving social media. Uses a file system approach to social media in order to be able to search and sort contents of such things as facebook, Instagram and twitter content.

A.

SharePoint

B.

MicroSoft Outlook

C.

Cloud Computing

D.

Jolicloud

E.

Rocket-Launch Cloud Computing

2 points   

QUESTION 27
  1. With mobile applications, if the app is developed in a secure environment, it can be entirely self-contained and the opportunity to keep the device secure is greater  when using the app as opposed to a browser-based platform.  This is true because:

A.

The mobile app provides a direct connection between the user's device and the business, where the PC based interface relies on browser access which requires additional layers of software

B.

The web brower connects directly and does not use other software

C.

The general preface of the statement or question is incorrect. The mobile app cannot be more secure

D.

B and C above are both true and accurate statements

E.

None of the above is a true statement to explain why the mobile device can be more secure than a traditional pc-based interface that relies on browser access

2 points   

QUESTION 28
  1. _______ can be defined as the "application of management techniques to collect information, communicate it within and outside teh organization and process it to enable managers to make quicker and better decisions".

A.

Data Governance

B.

Information Governance

C.

Records Management

D.

Detailed Management Lifecycle Analysis (DMLA)

E.

Information Management

2 points   

QUESTION 29
  1. Which of the following is true regarding business email and e-record retention policies?

A.

Email sent in the regular course of business for legitimate reasons which contains no personal information is NOT considered a record and therefore is not subject to e-record retention policies

B.

All Email sent in the regular course of business for legitimate reasons which contains no personal information is ALWAYS considered a record and therefore all is subject to e-record retention policies

C.

Most Email sent in the regular course of business for legitimate reasons which contains no personal information is generally NOT considered a record.  However, many do rise to the level of being a formal business record and those are subject to e-record retention policies

D.

If the business email contains even a hint of personal information it can never be subject to legal requirements for retention and production as a business record

E.

None of the above is a correct answer

2 points   

QUESTION 30
  1. Which of the following is/are true statement(s) concerning SharePoint?

A.

The best way to deploy it is just through trial and error. Get used to it and familiarize yourself with it as part of deployment

B.

Simply deploying SharePoint will resolve business issues such as compliance.

C.

There is no need to "tailor" SharePoint to your organization. It is designed to work seamlessly with every organization right out of the box

D.

A, B and C are all true of SharePoint

E.

None of the above is a correct answer

2 points   

QUESTION 31
  1. THE ISO ______ recommends protecting security of electronic records by ___________

A.

ISO 16363; creating a network monitoring system and implementing numerous routers

B.

ISO 16363; creating a firewall between the electronic content outside the repository and the external users

C.

ISO 18492; by creating a firewall between the electronic content in a repository and the network router

D.

ISO 18492; by creating a firewall between the electronic content outside the repository and the external users

E.

None of the above is the correct answer

2 points   

QUESTION 32
  1. A perimeter security approach to securing access to information has certain limitations or flaws. Which is NOT among those limitations?

A.

Unlimited Effectiveness since it can penetrate firewalls

B.

Haphazard protection since workers store copies of the same information on their own devices

C.

Too many perimeters to manage

D.

No direct protection for e-documents and data when stakeholders such as partners, suppliers and shareholders can share information

E.

None of the above is a correct answer since all of the above are restrictions or limitations on perimeter security

2 points   

QUESTION 33
  1. Legal concept where emails are improperly destroyed and for that reason cannot be produced during discovery. The business that destroyed the email is punished by the Court. This is referred to as ___

A.

Data scrubbing

B.

Data de-redundancy

C.

Spoilation

D.

.Social Engineering

E.

Phishing

2 points   

QUESTION 34
  1. Which are among the key foundational programs that should support the IG effort in IT?

A.

MDM

B.

Data Governance

C.

IT Standards and Best Practices

D.

Only A and B above

E.

A, B and C above

2 points   

QUESTION 35
  1. Lotus Sametime, Unified Presence, Jabber XCP are all examples of ______

A.

E-mail systems

B.

Anti-virus software

C.

Firewalls

D.

Instant Messaging systems used in business

E.

Spyware

2 points   

QUESTION 36
  1. Which of the following is a true statement regarding email created using the company e-mail system?

A.

If created by an employee on his own time, then it is never discoverable

B.

E-mail communications may contain discoverable information during legal discovery in litigation

C.

A portion of e-mail will be declared a formal business record

D.

A and C above are true

E.

B and C above are true

2 points   

QUESTION 37
  1. Which of the following could NOT be considered a true statement as it relates to mobile devices used for business

A.

Most mobile devices were not designed with security in mind

B.

It is particularly difficult to detect viruses on smart phones

C.

The most common approach to criminal hacking of mobile devices is social engineering

D.

MDM is critical to secure confidential information assess and manage the use of mobile devices

E.

None of the above could be considered a true statement. Therefore, none of the above is a correct answer to the question

2 points   

QUESTION 38
  1. Which of the following would be considered the most basic fundamental level of implementation for Information Governance?

A.

Master Data Management

B.

Data Governance

C.

Records Management

D.

Legal Governance

E.

Information Technology

2 points   

QUESTION 39
  1. In Japan, the word "Kaizen" is similar to CPI in the maintenance of the IG program effectiveness.  It reflects the gradual and constant process of eliminating _____

A.

Problems 

B.

The main causes of problems

C.

Overhead costs

D.

Unnecessary time related to IG

E.

Wasted time

2 points   

QUESTION 40
  1. A shared resource that provides dynamic access to computing services that may range from raw computing power to basic infrastructure to fully operational and supported applications, is a definition or description of ___________________

A.

Mobile computing

B.

Cloud computing

C.

data modeling

D.

Conceptual modeling

E.

Data Modeling frameworks

2 points   

QUESTION 41
  1. When planning for the deployment of SharePoint, your project charter should include each of the following EXCEPT:

A.

Problem Statement

B.

Measurable, time-constrained business objectives 

C.

Time line for deployment and implementation

D.

Project budget

E.

None of the above is the correct answer since all A, B, C and D should be included in your project charter

2 points   

QUESTION 42
  1. The ISO defines "long term" in which of the following standards?

A.

ISO 23434

B.

ISO 14721

C.

ISO/IEEE 803

D.

ISO 9999

E.

None of the above is a correct answer since the ISO stated that long term is not capable fo being defined.

2 points   

QUESTION 43
  1. ___ is a type of cloud computing service that utilizes a more combined approach. The infrastructure is considered a a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology.

A.

Private Cloud

B.

Community Cloud

C.

Public Cloud

D.

Hybrid Cloud

E.

None of the above

2 points   

QUESTION 44
  1. Using together firewall protection, antivirus protection, spyware software, IAM, hierarchial passwords, intrusion detection and biometric verification together is an example of _______________________

A.

Identity dragging

B.

Data Srubbing

C.

Conceptual modeling

D.

Data Modeling

E.

Defense in depth

2 points   

QUESTION 45
  1. ___ is a type of cloud computing service where the cloud infrastructure is shared by several organizations. It can be managed by the organizations or by a third party and may exist on or off premises

A.

Private Cloud

B.

Community Cloud

C.

Public Cloud

D.

Hybrid Cloud

E.

None of the above

2 points   

QUESTION 46
  1. It is impossible to apply IG policies to mobile computing.

 True

 False

2 points   

QUESTION 47
  1. Which of the following is not included among the key functions of ValIT?

A.

Define the relationship between IT and the business and those functions in the organization with governance responsibilities

B.

Manage the Organization's portfolio of IT enabled business investments

C.

Establish responsibilities and plan to best support the organization

D.

Maximize teh quality of business cases for IT enabled business investments

E.

None of the above is the correct answer since all of the above are included in the key functions of the ValIT governance plan

2 points   

QUESTION 48
  1. In order to be considered "cloud-computing" certain essential characteristic(s) must exist.  Which of the following is NOT among the essential characteristics?

A.

An on-demand self-service feature

B.

Capabilities must be available over the network and accessed through standard mechanisms that promote use by mobile devices

C.

The host provider's computing resources are pooled to serve multiple consumers using multi-tenant models with different physical and virtual resources dynamically assigned and reassigned  based on consumer demand

D.

The ability to monitor, control and report  resource usage

E.

None of the above is the correct answer since all of the above are essential characteristics

2 points   

QUESTION 49
  1. Which of the following are Examples of content included on Web 2.0?

A.

Blogs

B.

Podcasts

C.

Wikis

D.

RSS

E.

.All of the above are examples

2 points   

QUESTION 50
  1. "Information Management" is composed of:

A.

Data Architecture

B.

Data Modeling

C.

Information Lifecycle Management

D.

Master Data Management

E.

All of the above

2 points   

Click Save and Submit to save and submit. Click Save All Answers to save all answers.

 

Bottom of Form