Professional Documents
Culture Documents
Icmap Mock Exam Nov 2018 : Question No: 1
Icmap Mock Exam Nov 2018 : Question No: 1
Icmap Mock Exam Nov 2018 : Question No: 1
Question No: 1
Backup procedures
Contingency planning
Question No: 2
Steering committee
Board of directors
Audit executives
Executive management
Question No: 3
___________ is one of the element of E-commerce risk, where data (both in transit
and in storage) could be susceptible to un-authorized alteration or deletion.
Confidentiality
Integrity
Non-repudiation
Availability
Question No: 4
______________ is the time that the helpdesk or vendor takes to fix a problem from
the moment it is logged in.
Response time
Throughput
Turnaround time
Question No: 5
_________ server typically host the software program that provide application
access to client computers, including the processing of the applications, business
logic and communication with application’s database.
Application
Web
Proxy
File
Question No: 6
Cypher text
Plain text
Hypertext
Bold text
Question No: 7
Question No: 8
Fuzzy logic
Case-based reasoning
Expert systems
Simulation
Question No: 9
_____________ provides many types of information for consumers and the general
public, thereby encouraging web users to visit the site each time they use the web.
E-retailer
E-marketplace
Web hosting
Content aggregator
Question No: 10
________________ Committee approves project plans and budgets, setting
priorities and milestones of IT projects.
IT Strategy
IT Steering
IT Security
IT Governing
Question No: 11
Service Desk
Problem Management
Release Management
Service-Level Management
Question No: 12
____________ cloud may available to the general public or a large industry group.
Private
Public
Hybrid
Community
Question No: 13
E-auction
E-retailer
E-shop
E-marketplace
Question No: 14
UNI Tech is a software house which developed new web based software for
examination system of an IT institute. Online training of staff is under scope of
software project development. This training process lies in ___________ phase of
Software Development Life Cycle (SDLC).
Initiation
development
implementation
operations & maintenance
Question No: 15
Threat
Vulnerability
Risk
Non compliance
Question No: 16
Question No: 17
_________ provide detailed procedures to facilitate recovery of capabilities at an
alternate site.
Question No: 18
Question No: 19
Portfolio
Program
Scope
Question No: 20
_____________ is similar to bridge and switch that link two or more physically
separate network segments of different IP address scheme.
Firewall
Hub
Repeater
Router
Question No: 21
A ___________ is a small text file that a web browser such as Internet explorer
stores in a folder on a web user’s PC which consist of name-value pairs information.
History
Cookie
Add-ons
Bookmark
Question No: 22
__________ sites are facilities with space and basic infrastructure; and some or all
of the required IT and communication equipment installed. The equipment may be
less capable than the normal production equipment yet still be adequate to sustain
critical applications on an interim basis.
Cold
Hot
Warm
Mirrored
Question No: 23
In a ____________ topology, the nodes are linked directly without a central server,
which means that message between nodes must be re-transmitted by all nodes
between the source and destination.
Ring
Bus
Star
Tree
Question No: 24
Computerized Assisted Audit techniques (CAATs) are import tools for the IS auditor
in gathering information from different environments but _____________ is not
included in CAATs tools and techniques suite.
utility software
system software
scanning software
Question No: 25
information admissibility
information availability
information format
completeness
Question No: 26
Availability management
Configuration management
IT financial management
Question No: 27
Question No: 28
Question No: 29
Switch
Router
Gateways
Hub
Question No: 30
Question No: 31
____________ is a software application that pretends to be a vulnerable server on
the Internet and is not set up to actively protect against break-ins. It acts as a decoy
system that lures/ traps hackers.
Honeypots
Malware
Antivirus
Question No: 32
Halon
Water based
Dry pipe
Carbon dioxide
Question No: 33
Accuracy
Precision
Format
Completeness
Question No: 34
Enterprise System
Question No: 35
Executive management
Steering committee
Board of directors
Crisis communication
Occupant emergency
Disaster recovery
Question No: 37
HTML
VB/JAVA Script
COBOL
PROLOG
Question No: 38
For mission critical system, like stock exchange online system with a low tolerance
to interruption and a high cost of recovery, which of the following is BEST recovery
option?
Mirrored site
Cold site
Warm site
Mobile site
Question No: 39
HTTP
Question No: 40
Fire
Electromagnetic interference (EMI)
Spikes
Water
Question No: 41
_________________ is the audit risk that a material error exists which will not be
prevented or detected on a timely basis by the system of internal controls.
Inherent risk
Detection risk
Business risk
Control risk
Question No: 42
A project team with participation by technical support staff and key users should be
created to write a request for proposal (RFP) content or invitation to tender (ITT)
which cannot include:
Vendor support
Business impact analysis
Question No: 43
System documentation
Physical Schema
Selection process
Question No: 44
Data Mining
Data Mart
Aggregation
Question No: 45
____________ test substantiates the integrity of actual processing .It provides
evidence of the validity and integrity of the balances in the financial statements.
Compliance
Sampling
Substantive
Analytical
Question No: 46
In sourced
Outsourced
Hybrid
Offshore
Question No: 47
Testing
Requirement
Configuration
Question No: 48
Network
Data link
Physical
Presentation
Question No: 49
White box
Parallel
Functional
Pilot
Question No: 50
Executive Management
Question No: 51
Option (i) is correct Option (ii) is correct Option (iii) is correct Option (iv) is correct
Question No: 52
In database, _____________ is used to eliminate redundancies or duplication in
records.
normalization
filter
sorting
updating
Question No: 53
Digital envelope
Digital signature
Question No: 54
RAID 0
RAID 1
RAID 3
RAID 5
Question No: 55
Gantt Chart
Bar Chart
Question No: 56
Question No: 57
A ___________ view of data expresses the way the user or the programmer thinks
about the data.
physical
logical
open
closed
Question No: 58
DOS
Botnets
Brute-Force
Spamming
Question No: 59
Which one of the following is the best preventive measure for reducing the risks of
an IT system associated with possible natural disasters?
Question No: 60
Financial
Information systems
Compliance
Operational
Question No: 61
Question No: 62
Ad Hoc Networks
Question No: 63
pilot testing
Question No: 64
tuning
monitoring
modeling
development
Question No: 65
one-to-one
one-to-many
many-to-many
optional one-to-many
Question No: 66
Question No: 67
Question No: 68
Which one of the followings would allow a company to extends its enterprise intranet
across the internet to its business partners?
Dial up access
Client-server
Question No: 69
COBIT
ITIL
ISMS
ISO-9000
Question No: 70
Security as a Service
Question No: 71
Question No: 72
Firewalls
Routers
Intrusion detection systems
Asymmetric encryption
Question No: 73
Expert systems
Fuzzy logic
OLAP
Intelligent agents
Question No: 74
_________ addresses the some what broader topic of planning, controlling and
scheduling pre-sales and post-sales activities.
CRM
SCM
CIM
OAS
Question No: 75
________ are used when the precise requirements are difficult to visualize and
define because an existing business process must be changed substantially, or
because a proposed business process in a new situation has never been used, as
happens in new e-commerce applications.
Prototypes
System Analysis
Implementation
System design
Question No: 76
UML
XML
PHP
WML
Question No: 77
Which one of the following software risk based development model allow for the
need to return to previous work to allow review and rework?
Spiral
Prototyping
Waterfall
Question No: 78
If a problem has occurred in the system, the organization must find out what has
happened so that its effects are minimized. In this case _________________ are
implemented.
corrective measures
administrative measures
detective measures
preventative measures
Question No: 79
Data architect
Web developer
Application developer
System analyst
Question No: 80
Firewall
Honey net
Question No: 81
Hot
Cold
Mirrored
Warm
Question No: 82
Logic
Syntax
Program
Coding
Question No: 83
What is considered the MOST critical element for the successful implementation of
an Information Security program?
Question No: 84
Question No: 85
Which one of the following level provides a higher degree of protection in applying
access control software to avoid unauthorized access risks?
Application level
Database level
Question No: 86
Question No: 87
format
encryption
availability
quality
Question No: 88
System administrator
Security administrator
Question No: 89
_______________ method was proposed by Visa, Master card and other leading
credit card companies for secure web based transactions over internet.
E-money
Question No: 90
Structured language
Procedural language
Question No: 91
_______________ testing is the process of feeding test data into two systems: the
modified system and an alternative system and comparing the results.
Pilot
White box
Validation
Parallel
Question No: 92
When reviewing a network used for internet communication, an IS auditor will first
examine the:
firewall protection.
Question No: 93
Which one of the following is not included in IT delivery service related to IT Service
management?
Capacity management
Availability management
Problem management
Question No: 94
Which of the following type of fire suppression system is best suited for IT Data
centers.
Water-based
Carbon di oxide
Novec
Dry Powder
Question No: 95
Question No: 96
Question No: 97
Question No: 98
Project Go-live takes longer than usual due to lengthy development process
High risk of project failure due to ineffective problem analysis and requirements
Project Go-live will be earlier than scheduled timeline due to ignoring of SDLC
Question No: 99
Performance Management
Resource Management
ANSWER BOX
1. D
2. C
3. B
4. C
5. A
6. C
7. A
8. A
9. D
10. B
11. D
12. B
13. D
14. C
15. C
16. B
17. D
18. A
19. B
20. D
21. B
22. C
23. A
24. C
25. A
26. C
27. D
28. A
29. C
30. D
31. A
32. A
33. C
34. D
35. C
36. A
37. B
38. A
39. A
40. B
41. D
42. D
43. C
44. B
45. C
46. C
47. A
48. B
49. D
50. A
51. A
52. A
53. A
54. B
55. A
56. D
57. B
58. C
59. A
60. C
61. B
62. A
63. B
64. A
65. D
66. B
67. A
68. C
69. C
70. B
71. A
72. C
73. A
74. A
75. A
76. B
77. A
78. C
79. D
80. C
81. B
82. A
83. C
84. C
85. A
86. A
87. D
88. B
89. D
90. A
91. D
92. C
93. D
94. C
95. D
96. B
97. D
98. B
99. C
100. C