Professional Documents
Culture Documents
EIS-SM 400 MCQs For Nov 19 Exams
EIS-SM 400 MCQs For Nov 19 Exams
(Q-1). Most businesses and Web sites that collect (Q-7). Today many automobile and technology related
personal information should have a ___________ that companies are developing the self-driving autonomous
discloses how the personal information provided by vehicles, unmanned drones etc. According to you,
the person will be used. which of the following two technologies have made it
possible?
(a) Piracy Policy
(b) Identity Policy (a) Cloud Computing, Grid Computing
(c) Privacy Policy (b) Data Mining, Data Warehousing
(d) Security Policy (c) Artificial Intelligence, Machine Learning
(d) Internet of Things (IoT), Mobile Computing
(Q-2). ______________ is the use of video cameras to
monitor activities of individuals, such as employees or (Q-8). ______________ focuses on the development of
individuals in public locations, for work-related or computer programs that can change when exposed to
crime-prevention purposes. new data.
(Q-3). The data on the _________ USB flash drive (Q-9). A huge oil spill from an oil well run by British
cannot be accessed until the user enters the Petroleum, one of largest oil companies in world,
appropriate PIN or password. resulted in an assessed environmental damage of
about USD 20 Billion. The company expanded an
(a) Encrypted amount of USD 2 Billion on promotional ads informing
(b) Registered the world that it is an environmentally friendly
(c) Controlled company. The promotional ads were done to prevent
(d) Indexed company from which damage?
(Q-4). Users who want their desktop computers to (a) Strategic
remain powered up when the electricity goes off (b) Operational
should use ___________. (c) Financial
(a) Voltage controller (d) Reputational
(b) Surge suppressor (Q-10). A store supplies goods only on receipt of
(c) Voltage meter advance payment. Once payment is received, an
(d) UPS intimation to customer is sent for receipt of payment.
(Q-5). ____________ are small programs that take care This is a good example of ____________.
of software-specific problems, or bugs, such as security (a) Supply Chain Management
holes. (b) Customer Relationship Management
(a) Backups (c) Order to Cash Cycle
(b) Coding (d) Enterprise Management System
(c) Beta release (Q-11). An amount of ₹100 is to be written off as same
(d) Patches is not recovered from customer since last three years.
(Q-6). ____________ is a generic term that refers to Which voucher is best suited for this?
any type of malicious software. (a) Journal
(a) Spamware (b) Sales
(b) Spyware (c) Purchases
(c) Malware (d) Contra
(Q-12). Enterprise Resource Planning (ERP) systems (c) Resilience
shall have the following controls, except __________. (d) Contention
(a) Routing
(b) Bandwidth
(Q-22). Which is not a common services model (a) AS - 2
Network as a Service (NaaS)? (b) AS - 1
(c) AS - 9
(a) Virtual Private Network (VPN)
(d) AS - 28
(b) Bandwidth on Demand (BOD)
(c) Mobile Virtual Network (MVN) (Q-29). Under which IT Offence, punishment is given
(d) VoIP for statement given below: "Whoever fraudulently or
dishonestly make use of electronic signature, password
(Q-23). For an organisation that is subject to changing
or any other unique identification feature of any other
business needs, which network architecture would be
person."
preferred?
(a) Section 66- B
(a) Two Tier
(b) Section 66- C
(b) Three Tier
(c) Section 66- D
(c) Any of Two
(d) Section 66- E
(d) None of the Two
(Q-30). Inadequate Security leads to __________.
(Q-24). Which of the following is a modern method of
Digital payment? (a) Vulnerability
(b) Threats
(a) Mobile Wallet
(c) Risk
(b) E-Wallet
(d) Impact
(c) Net Banking
(d) Cards (Q-31). Where in a CBS architecture does ATM / POS
switch reside?
(Q-25). Which technology solution is provided by the
banks to a company that is paying dividend to its (a) Client
shareholders? (b) Channel Server
(c) Application Server
(a) ECS Credit
(d) Host Database Server
(b) ECS Debit
(c) MICR (Q-32). You have recently taken on a Travel agency as
(d) CBS your client. You are familiarizing yourself with the
agency & its operations. You are told that they use
(Q-26). Which server offers a computer network
network of computers which are designed as per Bus
services to allow clients to make indirect network
topology. You realize then that the agency's computer
connections to another network connection?
system involves ____________.
(a) Web Server
(a) A single hub connecting all nodes
(b) Database Server
(b) Connection of computers in a way where two
(c) Application Server
immediate nodes connected with each other
(d) Proxy server
(c) Connection of all the computers on a single
(Q-27). While defining Risk, the person is not likely to backbone cable
refer to which terms in its definition. (d) Connection of every node to every other node
(Q-51). There are various types of memories used in (a) Section 13, Rule 4
the computer system some of which are permanent in (b) Section 12, Rule 3
nature while some of them are temporary or (c) Section 12, Rule 4
fluctuating. There is also a memory known as cache (d) Section 12, Section 18
memory which is very expensive but found in most of
(Q-55). In computer network, a vulnerability is best
the modern computing devices like desktop, laptop
defined as _______________.
computers etc. Secondary memory ____________.
(a) Risk to system
(a) Is a large, slow memory which is no longer used
(b) Weakness of controls
in computers
(c) Value of risk
(b) Random Access Memory (RAM) is an example
(d) Possible Threat
of Secondary Storage device
(c) Is a greater capacity memory which is volatile (Q-56). You have signed on for an audit of an Internet
in nature service provider (ISP) which advertises itself as the
(d) Is a greater capacity memory which is non- most reliable service provider. What kind of network
volatile in nature topology do you think the ISP have?
(Q-52). Indian fertilizer industry depends on subsidies. (a) Ring topology
The Government has evolved a complicated (b) Star topology
mechanism for deciding the subsidy level for each type (c) Mesh topology
of fertilizer depending upon various factors like price of (d) Bus topology
the raw material, exchange rate, conversion costs, etc.
The industry association are considering some kind of (Q-57). A new system has been developed that ensures
cloud computing facility but as the cost involved is very that as soon as inventory level goes below re-order
high, they have finally decided to establish a cloud level in Inventory System, a purchase requisition is
where each participant can share the computing generated from Purchase System. Which testing
resources. Such a cloud facility would be most likely to method shall be best suited to check whether the two
be a ___________ and it would be safer than systems are working properly?
_____________. (a) Unit Testing
(a) Public Cloud, Private Cloud (b) Program Testing
(b) Private Cloud, Public Cloud (c) Integration Testing
(c) Community Cloud, Public Cloud (d) Whole-of-Program Testing
(d) Hybrid Cloud, Public Cloud (Q-58). Which of the following given combination is not
(Q-53). As per _________, if any person, dishonestly, a violation of maker - Checker Rule for the Internal
or fraudulently, does any act referred to in ________, Control in the organisation?
he shall be punishable with imprisonment for a term (a) Cashier is also a Ledger Writer
which may extend to _____________ or with fine (b) Auditor acting as Implementation Consultant
which may extend to ₹5 Lakh or with both. (c) System Developer acting as a System Quality
(a) Section 43, Section 66, 2 Years Control Personnel
(b) Section 66, Section 18, 5 Years (d) Auditor Suggesting Controls
(c) Section 66, Section 43, 3 Years (Q-59). Pick the odd one out.
(d) Section 65, Section 43, 5 Years
(a) Amazon Alexa
(Q-54). Under __________ & _____________ of (b) Boss Speakers
Prevention of Money Laundering Act, every banking (c) Apple Siri
(d) Google Talk (c) Law is not able to meet the requirements of
technology
(Q-60). Which objective of the Business Process
(d) No one is responsible
Automation (BPA) is achieved using Passwords in
Information Systems? (Q-65). Pick the ODD one out.
(Q-64). Driverless cars are the future of personal (a) Issuing letter of Guarantee
transportation. Many companies have been testing (b) Issuing letter of Comfort
these cars on roads across the world. Few fatalities (c) Issuing letter of Credit
have been caused by these driverless cars. The culprits (d) Issuing letter of Understanding
are not yet booked. This reflects which risk of AI as a
(Q-70). Which among the following is not a feature of
technology being used in driverless cars.
secondary memory?
(a) The police investigations are poor
(a) Non-volatile in nature
(b) AI is not human
(b) Slowest memory compared to others
(c) Has the largest storage capacity (d) Secondary Memory
(d) Costs more compared to others
(Q-78). Which of the following is in-correct?
(Q-71). Which of the following memory is usually
(a) Hardware is tangible portion of the computer
measured in Tera Bytes?
systems
(a) Random Access Memory (b) Input devices are devices through which we
(b) Cache Memory interact with the systems
(c) Register (c) CPU consists of two functional units
(d) Secondary Memory (d) Registers are high speed memory within CPU
(Q-72). Which among the following is not a type of (Q-79). Which of following statement is incorrect?
Read Only Memory?
(a) Storage Registers temporarily stores data
(a) PROM being sent to or coming from system memory
(b) EPROM (b) Internal memory includes Processer Registers
(c) EEPROM and Cache Memory
(d) EROM (c) RAM is volatile in nature where Information is
lost as soon as power is turned off
(Q-73). ____________ provides capabilities required
(d) Modifying the contents of RAM is difficult
to support enterprise software systems.
(Q-80). Which of the following is incorrect?
(a) Information Worker Software
(b) Enterprise Infrastructure Software (a) Each computer system must have a system
(c) Content Access Software software to function
(d) Media Development Software (b) Application software are optional & user might
need them as per his requirements
(Q-74). ________ is the application software where
(c) ROM is volatile in nature where Information is
multiple applications are bundled together and sold.
lost as soon as power is turned off
(a) Application Suits (d) Modifying the contents of RAM is not difficult
(b) Enterprise Infrastructure Software
(Q-81). ________ can function without _________.
(c) Content Access Software
(d) Media Development Software (a) Application software, System software
(b) System software, Application software
(Q-75). Enterprise Resource Planning software is most
(c) Operating system, System software
likely to be classified into:
(d) Application software, operating system
(a) Application Suits
(Q-82). __________ needs _________ to operate.
(b) Enterprise Infrastructure Software
(c) Enterprise Software (a) Application software, System software
(d) Media Development Software (b) System software, Application software
(c) Operating system, Application software
(Q-76). Video editing software is most likely to be
(d) System software, operating system
classified into:
(Q-83). EPROM stands for ____________________.
(a) Application Suits
(b) Enterprise Infrastructure Software (a) Erasable Programmable Read-Only Memory
(c) Enterprise Software (b) Electronically Programed Read-Only Memory
(d) Media Development Software (c) Erasable Programmed Read-Only Memory
(d) Easily Programmable Read-Only Memory
(Q-77). A memory of the size of 4 Mega Byte is most
likely to be a _____________. (Q-84). _______ is independent of ____________.
(Q-117). Mr. X entered into a contract with Mr. Y for (a) Application Layer
purchase of house hold products via online stores on (b) Database Layer
Cash on Delivery (CoD). As per the terms, it was to be (c) Operating System Layer
delivered within 3 days of the order placed. Due to (d) Network Layer
delivery on the fourth day, Mr. X denied for the
(Q-123). Which feature of Operating Systems helps in
performance of the contract. This can be said to be a
allocating resources to make optimum utilization of
____________.
resources?
(a) Risk associated with controls
(a) User Interface
(b) Risk associated with security
(b) Memory Management
(c) Risk associated with transaction
(c) File Management
(d) Risk associated with e-Commerce
(d) Task Management
(Q-118). Under Data Resource Management Controls,
(Q-124). Installation of the Firewalls by a company in
__________ controls are designed to prevent
the telecommunication network is a classic example of
unauthorized individual from viewing, retrieving,
_______________ controls under Information
computing or destroying the entity's data in any
Systems' Controls.
organization.
(a) Managerial
(a) Access
(b) Application
(b) Backup
(c) Preventive
(c) Concurrency
(d) Corrective
(d) Quality
(Q-125). Provide the correct sequence of phases of
(Q-119). Name the Module in ERP - Business Process
Program Development Life Cycle. (1) Operations and
Modules that includes the software designed
Maintenance, (2) Coding, (3) Control, (4) Design, (5)
specifically for production planning & management.
Testing and (6) Planning
(a) Production Planning
(a) (4)-(6)-(2)-(3)-(1)-(5)
(b) Material Management
(b) (6)-(3)-(4)-(2)-(5)-(1)
(c) Sales and Distribution Module
(c) (1)-(6)-(3)-(5)-(4)-(2)
(d) Supply Chain Module
(d) (3)-(5)-(2)-(1)-(6)-(4)
(Q-120). Which of the following does not form part of
(Q-126). In ABC, financial institution, the authorised
Human Resource (HR) Management?
officials identified existence of numerous accounts
(a) Training and Development numbers of inactive accounts in their usage data of
(b) Career Development active customers. Complaint was reported to their IT
(c) Leadership Management team. Which type of controls can be exercised by the
(d) Invoicing IT Team in the given case?
(Q-121). In his work place, an employee Mr. X wants to (a) Corrective Controls
maintain a record of physical receipts of goods (b) Preventive Controls
purchased from a vendor Mr. G in his Accounting (c) Detective Controls
System. Which Voucher type shall he use? (d) Compensatory Controls
(Q-127). An organisation ABC used to make payment of (c) Assists compliance with applicable laws and
the salaries to its employees by transferring of funds to regulations
their saving accounts. This mode of transfer made by (d) Ensure reliability of only Internal Financial
an ABC is ___________. Reporting & not External Financial Reporting
(Q-137). Which of the following does not fit into best (Q-143). Mr. A visited an e-commerce website and
practices while dealing with passwords in order to placed an order for a pair of shoes. He made his
avoid system failures? payment of ₹2,000 through credit card and received a
confirmation mail on his registered email-id. With
(a) Periodic change of passwords
respect to e-commerce architecture, which layer of the
(b) Unlimited number of entry attempts
software is he working on?
(c) Minimum password length
(d) Hashing of passwords (a) Database Layer
(b) Application Layer
(Q-138). Under emerging BYOD (Bring your Own
(c) Presentation Layer
Device) Threats, _______________ risk refers to the
(d) Client Layer
data lost from stolen or lost devices.
(Q-144). Identify the incorrect statement.
(a) Network
(b) Application (a) A Proxy Server is a computer that offers a
(c) Device computer network service to allow clients to
(d) Implementation make indirect network connections to other
network services
(Q-139). Which activity is not incorporated during audit
(b) Information Security implies Confidentiality,
of Environmental Controls?
Integrity and Availability of information
(a) Backup Power (c) Any Application Software has primarily four
(b) Water Detection gateways through which enterprise can
(c) Fire detection and Suppression control functioning, access and use various
(d) Guards and Dogs menus & function of software. Configuration,
Masters, Transactions, Reports
(Q-140). As an Information Systems Auditor, mention (d) Section 66-C of Information Technology Act,
the activity that does not form part of audit of Logical 2000 provides for punishment for cheating by
Access Controls? personation by using computer resource
(a) Access Violations (Q-145). An amount of ₹650 is to be written off as same
(b) Intrusion Detection and Prevention is not recovered from customer since last so many
(c) Backup Power years. Which voucher is best suited for the transaction?
(d) Shared Accounts
(a) Journal
(Q-141). During an audit of financial transactions in an (b) Sales
enterprise XYZ, it was found that simple errors of data (c) Purchase
entry were occurring when two digits that were either (d) Contra
individual or part of larger sequence of numbers were
reversed when posting a transaction. Which type of (Q-146). When the risk for procure to pay (P2P) process
error is this? flow is the inaccurate changes to the supplier master
file, what should be the most appropriate control
(a) Addition Error objective?
(b) Truncation Error
(c) Substitution Error (a) All valid changes to the supplier master file are
(d) Transposition Error input and processed
(b) Changes to supplier master file are accurate
(Q-142). While Auditing the Input Controls in an (c) Changes to the supplier master file are
enterprise ABC, which of the following controls will not processed in a timely manner
fall under the purview of Input Controls? (d) Supplier master file data remain up to date
(a) Source Document Controls (Q-147). Orange Ltd. has developed a mobile phone
(b) Data Coding Controls which is unique for its simplicity and ease of use.
(c) Boundary Controls
During tests, it finds that the product is really robust (Q-149). Which of the following statement is most
and rarely fails. The industry norm is that mobile phone closely relates to XBRL?
manufacturers offer customers the reliable after sales
(a) A technology tool that is becoming outdated
service and including repair. After a lot of
(b) An international standard business reporting
introspection, the company decides that the
language that has streamlined the business
probability of failure of their product was so low and it
reporting task both across the organisation
would not be worthwhile to invest in a network of
and across the globe
servicing facilities. They decided, instead to offer a free
(c) An international standard business reporting
replacement in the event of failure of their product and
language with a vast taxonomy but limited
they used this as a marketing strategy for their product
corporate usages
and it turned out to be a roaring success. What type of
(d) An international standard business reporting
risk management strategy has the company adopted in
language having cross-currency constraints
this case?
(Q-150). Consider the following statements about
(a) Avoid the risk
General Compliances:
(b) Share the risk
(c) Accept the risk (i) These are the compliances applicable across
(d) Reduce the risk entities
(ii) Tax related laws are most likely to be general
(Q-148). Agro India Ltd. markets agro chemicals which
compliances in nature
is used by farmers when they perceive a pest attack
(iii) Non-compliance with general compliances
and would like to act immediately to save their crop.
doesn’t involve any monetary penalties
Hence, prompt and speedy availability is the main
(iv) Over the years, the number of general
driver for sales of this product. The company, which
compliances is either stagnant or falling
had its manufacturing facility located in South India,
found that it is unable to meet the demand from the Which of the above statements are correct?
Northern States owing to their inability to reach their
(a) (i), (ii) & (iii) Only
product in time. Since the market size being lost out
(b) (i) & (ii) Only
was substantial as compared to the cost of setting up a
(c) (ii), (iii) & (iv) Only
new plant, they ultimately decide to set up a new
(d) (ii) & (iv) Only
manufacturing facility in Punjab which could ensure
timely availability of product so to meet some of the (Q-151). Consider the following statements about
demand. What type of risk management strategy has Specific Compliances:
the company adopted in this case?
(i) These are not applicable across all entities but
(a) Avoid the risk applicable to specific entities only
(b) Share the risk (ii) Direct Tax related laws are most likely to be
(c) Accept the risk specific compliances in nature
(d) Reduce the risk (iii) Non-compliance with specific compliances is
usually less serious concern than the non-
compliance with the general compliances
(iv) Usually the same department of the entity
handles the matter of general and specific
compliances
(a) It shall be displayed in profit and loss account (Q-159). Consider the following statements about the
(b) It shall still be considered in balance sheet as it Asynchronous Attacks:
is a cash ledger
(i) Wiretapping is one of asynchronous attack
(c) Software shall show error message
which involves following an authorized person
(d) None of above
through a secured door
(Q-153). Identify the ODD among the following? (ii) Trap door is not a type of asynchronous attacks
(iii) Subversive attacks can provide intruders with
(a) Spoofing
important information about messages being
(b) Logic Bomb
transmitted
(c) Trap doors
(iv) Data that is waiting to be transmitted are liable
(d) Data leakage
to the unauthorized access called Synchronous
(Q-154). ___________ occur in the environment where Attack
data can be moved asynchronously across the
Which of the above statements are correct?
telecommunication line.
(a) (i), (ii) & (iii) Only
(a) Asynchronous attack
(b) (i) & (iv) Only
(b) Synchronous attack
(c) (ii), (iii) & (iv) Only
(c) Malware attack
(d) (ii) & (iii) Only
(d) Data feeding attack
(Q-160). Under Application Controls, __________
(Q-155). Which of the following attack involves leaking
maintains chronology of events that occur when a user
of information from computers by dumping files to
attempts to gain access to and employ systems
paper or stealing information?
resources.
(a) Data leakage
(a) Boundary Controls
(b) Subversive attacks
(b) Input Controls
(c) Wire tapping
(c) Communication Controls
(d) Piggybacking
(d) Processing Controls
(Q-156). ___________ can provide intruders with the
(Q-161). Under Application Controls, __________
important information about the messages being
maintains the chronology of events that occur either to
transmitted.
the database definition or the database itself.
(a) Data leakage
(a) Output Controls
(b) Subversive attacks
(b) Input Controls
(c) Wire tapping
(c) Database Controls
(d) Piggybacking
(d) Processing Controls
(Q-157). __________ involves spying on information
(Q-162). Under the Application Controls, __________
being transmitted over communication network.
maintains the chronology of events that occur from the
(a) Data leakage time the content of the output is determined until the
(b) Subversive attacks time users complete their disposal of the output.
(c) Wire tapping
(a) Output Controls
(d) Piggybacking
(b) Input Controls
(Q-158). Which of the following is not a type of logical (c) Database Controls
access control? (d) Processing Controls
(Q-165). Organisational structure once established (Q-171). In the context of organisational structure,
may have to be changed due to several factors. Which CISO stands for ______________.
of the following is not a factor that may cause the (a) Chief Information System Officer
organisational structure to get changed? (b) Chief Intelligence Security Officer
(a) Short- and long-term objectives (c) Chief Information Security Officer
(b) Market conditions (d) Chief Information Software Officer
(c) Regulation (Q-172). Which of the following job position is not
(d) Career advancement covered under the Executive Management team of
(Q-166). Which of the following statement is incorrect organisational IT structure?
about the organisational structure? (a) Chief Information Officer
(a) To function properly, organisation needs a (b) Chief Technical Officer
proper organisational structure (c) Chief Security Officer
(b) Organisational structure is a living structure (d) Chief Media Librarian
that is established once in the lifetime (Q-173). Positions in the _____________ in the
(c) Available talent is one of the reasons that may organisational IT structure are involved in design,
cause the changes in the organisational development, and testing of the software applications
structure of the entity of the organisation.
(d) New regulations may cause the entity to make
changes in its organisational structure (a) Network Management
(b) Data Management
(Q-167). In the context of organisational structure, CPO (c) Software Development
stands for ______________. (d) Systems Management
(a) Chief Policy Officer (Q-174). Positions in the ___________ in the
(b) Chief Protection Officer organisational IT structure are involved in developing
(c) Chief Privacy Officer & implementing database design and databases
(d) Chief Programming Officer maintenance.
(Q-168). In the context of organisational structure, CIO (a) Network Management
stands for ______________. (b) Data Management
(a) Chief Intelligence Officer (c) Software Development
(b) Chief Investigation Officer (d) Systems Management
(Q-175). Positions in the ___________ in the (b) Security Engineer
organisational IT structure are involved in designing, (c) Security Auditor
building, monitoring, and maintaining voice and data (d) Systems Operator
communications networks.
(Q-181). Which of the following job position is not
(a) Network Management covered under the Systems Management team of
(b) General Operations organisational IT structure?
(c) Software Development
(a) Systems Architect
(d) Systems Management
(b) Systems Engineer
(Q-176). Positions in the ___________ in the (c) Systems Operator
organisational IT structure are responsible for (d) Storage Engineer
architecture, design, building, and maintenance of
(Q-182). Which of the following job position is not
servers and operating systems.
covered under the Network Management team of
(a) General Operations organisational IT structure?
(b) Data Management
(a) Network Architect
(c) Software Development
(b) Network Engineer
(d) Systems Management
(c) Network Administrator
(Q-177). Positions in the ___________ in the (d) Network Auditor
organisational IT structure are responsible for day-to-
(Q-183). Positions in the ____________ in the
day operational tasks related to networks, servers,
organisational IT structure are responsible for
databases, and applications.
providing front line support services.
(a) General Operations
(a) Security Desk
(b) Security Operations
(b) Help Desk
(c) Software Development
(c) Service Desk
(d) Systems Management
(d) Systems Desk
(Q-178). Positions in the ___________ in the
(Q-184). ___________ position is responsible for
organisational IT structure are responsible for
providing front line user support services to personnel
designing, building, and monitoring security systems
in the organization.
and security controls, to ensure the confidentiality,
integrity, and availability of information systems. (a) Security Desk Analyst
(b) Help Desk Analyst
(a) General Operations
(c) Technical Support Analyst
(b) Security Operations
(d) Systems Desk Analyst
(c) Software Development
(d) Systems Management (Q-185). ___________ position is responsible for
providing technical support services to other IT
(Q-179). Which of the following job position is not
personnel and customers.
covered under the General Operations team of
organisational IT structure? (a) Security Desk Analyst
(b) Help Desk Analyst
(a) Operations Manager
(c) Technical Support Analyst
(b) Media Librarian
(d) Systems Desk Analyst
(c) Systems Operator
(d) Systems Administrator (Q-186). ___________ position is responsible for
performing internal audits of IT controls to ensure that
(Q-180). Which of the following job position is not
they are operating properly.
covered under the Security Operations team of
organisational IT structure? (a) Security Auditor
(b) System Auditor
(a) Security Architect
(c) Support Auditor
(d) Information Systems Auditor (Q-193). ______________ position is responsible for
designing, building & maintaining the storage
(Q-187). ___________ position is responsible for the
subsystems.
design of security controls and systems such as
authentication, audit logging, intrusion detection (a) Storage Engineer
systems, intrusion prevention systems, and firewalls. (b) Data Engineer
(c) System Engineer
(a) Security Architect
(d) Database Engineer
(b) Systems Architect
(c) Network Architect (Q-194). ___________ position works with different
(d) Database Architect telecommunications technologies such as data circuits,
phone systems etc.
(Q-188). ___________ position is responsible for the
overall architecture of systems (servers) both in terms (a) Network Engineer
of the internal architecture of a system, as well as the (b) Telecom Engineer
relationship between systems. (c) System Engineer
(d) Database Engineer
(a) Security Architect
(b) Systems Architect (Q-195). ___________ position performs tasks that are
(c) Network Architect junior to the database administrator like carrying out
(d) Database Architect routine data maintenance and monitoring tasks.
(Q-189). ___________ position designs data and voice (a) Database Architect
networks and designs changes and upgrades to the (b) Database Analyst
network as needed. (c) Database Administrator
(d) Database Engineer
(a) Security Architect
(b) Systems Architect (Q-196). ___________ builds and maintains databases
(c) Network Architect designed by database architect. They also monitors
(d) Database Architect databases performance & troubleshoots problems.
(Q-191). Job titles in the IT field should be consistent (a) Control Architect
across the organizations. Which of the following is not (b) Control Analyst
a reason for the same? (c) Control Administrator
(d) Control Engineer
(a) Recruiting
(b) Compensation baselining (Q-198). ___________ position may be responsible for
(c) System Analysis examining the health of networks, systems, and
(d) Career advancement databases and for this, he develops operational
procedures, sets and monitors the operations schedule
(Q-192). ___________ position is responsible for
and maintains operations records.
maintaining & tracking backup tape and other media.
(a) Operations Architect
(a) Data Librarian
(b) Operations Analyst
(b) Media Librarian
(c) Operations Administrator
(c) System Librarian
(d) Operations Engineer
(d) Database Librarian
(Q-199). ___________ conduct tests to ensure the (a) Users Management
software created by developers is fit for purpose. (b) Segregation of Duty
(c) Identity Separation
(a) Data Tester
(d) Reduce access privileges
(b) Software Tester
(c) System Tester (Q-206). Which of the following is not a SOD control?
(d) Operations Tester
(a) Transaction Authorization
(Q-200). ___________ position is responsible for the (b) Split custody of high-value assets
protection and use of personal information and mostly (c) Periodic reviews
found in the companies that collect & store sensitive (d) Reduce access privileges
information for large numbers of persons.
(Q-207). Segregation of Duties helps to reduce the
(a) Chief Security Officer possibility of a person being both the __________ and
(b) Chief Protection Officer the ___________ of the frauds committed.
(c) Chief Privacy Officer
(a) Creator, Originator
(d) Chief Publication Officer
(b) Preparator, Manager
(Q-201). ___________ is responsible for all aspects of (c) Preparator, Identifier
security, including information security, physical (d) Preparator, Concealer
security etc.
(Q-208). For mitigating SOD issue, management can:
(a) Chief Security Officer
(a) Reduce access privileges:
(b) Chief Technical Officer
(b) Introduce a new mitigating control
(c) Chief Privacy Officer
(c) Have periodic reviews
(d) Chief Information Security Officer
(d) Both (a) & (b)
(Q-202). ___________ is position is responsible for all
(Q-209). Consider the following statements about the
aspects of data-related security. It includes incident
segregation of duties:
management, disaster recovery, vulnerability
management etc. (i) Segregation of duty plays an important role in
the internal control mechanism
(a) Chief Security Officer
(ii) Having the split custody of high-value assets
(b) Chief Technical Officer
has no role in segregation of duties
(c) Chief Privacy Officer
(iii) Transaction authorization is an important
(d) Chief Information Security Officer
segregation of duty control
(Q-203). ___________ is position is responsible for an (iv) When segregation of duties issue arises in the
organization‘s overall technology strategy. company, management can introduce a new
mitigating control
(a) Chief Security Officer
(b) Chief Technical Officer Which of the above statements are correct?
(c) Chief Privacy Officer
(a) (i), (ii) & (iii) Only
(d) Chief Information Security Officer
(b) (ii) & (iv) Only
(Q-204). SOD stands for ________________. (c) (i), (iii) & (iv) Only
(d) (i) & (iii) Only
(a) Seclusion of Duty
(b) Segregation of Duty (Q-210). __________ is a form of banking that can be
(c) Selection of Duties done with the help of normal feature phone even
(d) System of Duty without internet connection.
(a) Structured Query Language Which of the above statements are correct?
(b) Mobile Computing
(a) (i), (ii) & (iv) Only
(c) Artificial Intelligence
(b) (ii) & (iv) Only
(d) Internet of Things (IoT)
(c) (ii), (iii) & (iv) Only
(Q-213). In the large organisations, AI generally means (d) (i) & (iii) Only
_________ & BI means ________________.
(Q-218). Consumer Protection Act, ___________.
(a) Advanced Intelligence, Basic Intelligence
(a) 2000
(b) Advanced Intelligence, Business Intelligence (b) 1999
(c) Artificial Intelligence, Business Intelligence (c) 1986
(d) Artificial Intelligence, Basic Intelligence (d) 1992
(Q-214). Today many automobile and technology (Q-219). Foreign Trade (Development and Regulation)
related companies are developing the self-driving Act, ___________.
autonomous vehicles, unmanned drones etc.
According to you, which of the following two (a) 1993
technologies have made it possible? (b) 1994
(c) 1986
(e) Cloud Computing, Grid Computing (d) 1992
(f) Data Mining, Data Warehousing
(g) Artificial Intelligence, Machine Learning (Q-220). The Competition Act, ___________.
(h) Internet of Things (IoT), Mobile Computing
(a) 2000
(Q-215). ______________ focuses on the development (b) 2005
of computer programs that can change itself when (c) 2002
exposed to new data or circumstances without being (d) 1992
explicitly programmed.
(Q-221). Web 3.0 is also known as _____________.
(e)
(a) Machine Learning (a) The social web
(f)
(b) Mobile Computing (b) The systematic web
(g)
(c) Internet of Things (IoT) (c) The semantic web
(h)
(d) Machine Computing (d) The sensitive web
(Q-216). Which of the following is the closest (Q-222). __________ is considered as next logical
description of Artificial intelligence? evolution of internet and web technologies.
(a) Web 2.0 (i) It is the second generation of web which works
(b) Web 3.0 on read, write and execute concept
(c) Web Next (ii) Two of the components of web 3.0 are
(d) Web 2.1 semantic web and web services
(iii) It is considered as next logical evolution of
(Q-223). CRT stands for ___________ & LCD stands for
internet and web technologies
____________.
(iv) It works on user behaviour and providing web
(a) Crystal Ray Tube, Liquid Crystal Display content depending upon the interest of
(b) Cathode Ray Tube, Liquid Crystal Display individual users
(c) Cathode Ray Tube, Light Crystal Display
Which of the above statements are correct?
(d) Cathode Ray Tube, Liquid Cathode Display
(a) (i), (ii) & (iv) Only
(Q-224). Web 3.0 is a ____________________.
(b) (ii) & (iv) Only
(a) Read only web (c) (ii), (iii) & (iv) Only
(b) Read and write web (d) (i) & (iii) Only
(c) Read and execute web
(Q-230). There is one-to-one marketing in case of
(d) Read, write and execute web
____________.
(Q-225). The component of Web 3.0 are ___________
(a) Traditional commerce
and _____________.
(b) Physical commerce
(a) Semantic web, Systematic web (c) E-commerce
(b) Semantic web, Context web (d) Retail commerce
(c) Semantic web, Web services
(d) Context web, Web services
(a) Turnaround (Q-17). All of the following falls under the scope of joint
(b) Divestment venture or strategic alliances except:
(c) Diversification
(a) R&D partnerships
(d) Liquidation
(b) Cross-branding agreements
(Q-13). According to Michael Porter, which strategy (c) Cross-manufacturing agreements
offers products or services to a small range of (d) Developing proprietary patents
customers at the lowest possible price available on the
(Q-18). Which of the following is not a reason of the
market?
failure of joint ventures?
(a) Broad Low-Cost
(a) Managers who must collaborate in operating the
(b) Low-Cost Focus
venture successfully are not involved in
(c) Best-Value Focus
managing the venture
(d) Focused Differentiation
(b) The venture may not be supported equally by
(Q-14). Under which of the following situation would a both the partners
cost leadership strategy be effective? (c) The venture may benefit the partnering
companies but not benefiting the customers who
(a) When there are many ways to differentiate the
then complain about poor service or criticize the
product or service and many buyers perceive
companies in social media
these differences as having value
(d) Stakeholders of both the partner companies are
(b) When buyer needs and uses are diverse
equally satisfied
(c) When technological change is fast paced and
market competition revolves around the (Q-19). When two organizations of about equal size
rapidly evolving product features unite to form one enterprise, which of these occurs?
(d) When the products of rival sellers are
(a) Takeover
essentially identical and supplies are readily
(b) Merger
available from any sellers
(c) Acquisition
(Q-15). Under which of the following situation would a (d) Leveraged Buyout
differentiation strategy be especially effective?
(Q-20). Mergers and acquisitions are created for all of
(a) When the target market is composed of buyers the following reasons except to __________.
who do not consider differentiating features as
(a) Gain new technology
of much value
(b) Reduce overall tax obligations
(b) When the products of rival sellers are
(c) Gain economies of scale
essentially identical and supplies are readily
(d) Increase the total number of employees
available from any available seller
(c) When technological change is fast paced and (Q-21). Which of the following statement best
competition in the market revolves around describes a company's competitive strategy?
rapidly evolving product features
(d) When industry do not offer much scope for the (a) What its strategy should be in the functional
differentiating features and attributes areas as R&D, production, sales, human
resource, finance etc.
(Q-16). When two or more companies enters into a (b) Its efforts to change its position on the industry's
temporary partnership or consortium for the purpose strategic group map
of capitalizing some opportunity, it is known as (c) .Become cost leader in the market by offering the
_______________. low-cost products to a broad range of customers
(d) Management's game plan for competing
(a) Retrenchment
successfully in the competitive marketplace
(b) Joint venture
(Q-22). Which of the following is the situation that (Q-27). B Ltd., a large FMCG group is considering to
leads to competitive advantage to the entity? diversify in the fast food and beverages industry. This
industry is already having many large players with
(a) It is the acknowledged leader in the industry in
thousands of fast food and beverages outlets. B Ltd. is
terms of market share
considering to acquire a local coffee-shop chain with 25
(b) It has more financial resources than its rivals
outlets in the city. B Ltd. don’t see the growing very
(c) It has a strong balance sheet and low debt
much, but the deal could be obtained at a very
(d) It has some type of edge over rivals in terms of
attractive price. As per BCG matrix, the coffee chain will
attracting customers
be labelled as a _____________.
(Q-23). Which of the following is not one of the generic
(a) Cash Cow
competitive strategies recommended by Michael
(b) Star
Porter?
(c) Question Mark
(a) Low-cost provider strategy (d) Dog
(b) Broad differentiation strategy
(Q-28). You are the owner of InstaRock Ltd. that
(c) Focused low-cost provider strategy
manufactures and sells consumer electronics items.
(d) Market share dominator strategy
Your oldest supplier, Apple Co. is a family-owned firm.
(Q-24). Which one of the following strategy is typically Recently, the firm’s president, Mohan Das made the
the best strategy for a company to employ? decision to retire. To his disappointment, none of his
two children stepped forward to take his place in the
(a) Low-cost leadership strategy company. Mr. Mohan is concerned that if he sells his
(b) Broad differentiation strategy company to a larger entity, many of his employees will
(c) Focused low-cost provider strategy lose their jobs. You approach him to buy Apple Co. and
(d) There is no such thing as a best strategy and it continue its current operations. Should your offer be
will depend upon competitive conditions and accepted, InstaRock Ltd. would be undertaking a
company's own strength & weaknesses ___________ strategy.
(Q-25). You are considering to acquire a company (a) Concentric Diversification
named Ben Ltd. It has not grown much in recent years (b) Horizontally Integration
probably because the industry it operates in is flat for (c) Forward vertical integration
a quite long time. However due to very low debt and a (d) Backward vertical integration
strong market share, it generates a huge amount of
cash. According to BCG Matrix, Ben Ltd. would be (Q-29). You are the owner of KKC Restaurants, a large
considered a ____________. fast food chain having nation-wide operations. You’ve
decided to purchase the controlling interest in the
(a) Cash Cow Oriental fast-food restaurants having a restaurant
(b) Star chain of over 500 restaurants. This move by KKC
(c) Question Mark Restaurants represents _________ strategy.
(d) Dog
(a) Unrelated Diversification
(Q-26). Recently, you acquired a company that (b) Horizontally Integration
manufactures transmission satellites used in the cable (c) Forward vertical integration
television market. The transmission satellites industry (d) Backward vertical integration
is profitable and growing at a rapid pace, however
currently the company you acquired has a very limited (Q-30). You are the owner of Delicious Food Plaza, a
market share. As per the BGC Matrix, the company you large fast food chain having nation-wide operations.
purchased will be considered as a ___________. You decide to purchase a small hardware company as
it represents a good investment opportunity due to the
(a) Cash Cow growing real-estate development activities. This is an
(b) Star example of _____________.
(c) Question Mark
(d) Dog (a) Unrelated Diversification
(b) Horizontally Integration (Q-35). Which of the following statement best refers
(c) Forward vertical integration the Strategic mission?
(d) Backward vertical integration
(a) is a statement of a firm's unique purpose and
(Q-31). Akashay Kumar runs a successful company that scope of operations
sells home gardening tools and equipment’s. He is (b) is an internally focused statement of the
approached by a competitor who is nearing retirement organization's societal and ethical goals
age. The competitor is interested in selling his business (c) specifies the industry in which the firm intends to
to Akashay. For Akashay, this would be a __________ compete
strategy. (d) is developed by a firm before the firm develops
its strategic intent
(a) Unrelated diversification
(b) Horizontal integration (Q-36). Switching costs refer to the ___________.
(c) Vertical integration
(a) Cost to a producer to exchange equipment in a
(d) Concentric diversification
facility when a new technologies emerge
(Q-32). Mukesh Kumar runs a successful company that (b) Cost of changing the firm's strategic group
sells home gardening tools and equipment’s. He is (c) Costs suppliers incur when selling to a different
approached by a company that sells the seeds and customer
fertilizers for the home garden plants and flowers. If (d) Readjustments related costs customers incur
Akashay acquires that company, this would be a when buying from a different supplier
__________ strategy.
(Q-37). Suppliers are powerful when:
(a) Unrelated diversification
(a) Substitutes are readily available
(b) Horizontal integration
(b) Nature of product sold is not crucial to the
(c) Vertical integration
buyer’s needs
(d) Concentric diversification
(c) They represents a credible threat of forward
(Q-33). Once a company has assessed all the five forces integration
of competitive pressure and determined the threats (d) They are highly fragmented in nature
and opportunities that exist in the current
(Q-38). Buyers are powerful when:
environment, then it should select an appropriate
competitive strategy. Porter outlines three “generic” (a) There is not a threat of backward integration
strategies namely cost leadership, differentiation, and (b) They are not a significant purchaser of the
____________. supplier's output
(c) There are no switching costs
(a) Niche
(d) The buyers are fragmented in nature
(b) Differentiation
(c) Focus (Q-39). Upper limits on the prices a firm can charge are
(d) Stuck in the middle impacted by _____________
(Q-34). The strategic management process is a: (a) Total costs of production
(b) The cost of related substitute products
(a) Set of activities, steps, plans, procedures and
(c) Variable costs of production
methods that guarantees to prevent the
(d) Customer’s switching costs
organizational failure
(b) Process concerned with a firm's resources, (Q-40). Tangible resources of organisation include:
capabilities, and competencies, but not the
conditions in its external environment (a) Assets such as know-how
(c) Set of activities that to date have not been used (b) Assets that can be seen and quantified
successfully in the not-for-profit sector (c) Organizational culture
(d) Dynamic process involving set of planning, (d) Firm's reputation
commitments, decisions, and actions related to (Q-41). Firm adopting cost leadership strategy should
the firm provide the goods or services with features that are:
(a) Acceptable to customers (Q-45). The differentiation strategy can be effective in
(b) Unique in the market dealing with the existing competitors in an industry
(c) Highly valued by the customer because ___________.
(d) Able to meet unique needs of the customer
(a) Customers will seek out the lowest price
(Q-42). When the costs of supplies increase in the product available in the market
industry, the low-cost leader may __________. (b) Customers of differentiated products are
sensitive to price increases
(a) Continue competing with rivals on the basis of
(c) Customers are loyal to the brands that are
product’s unique features and attributes
differentiated in meaningful ways
(b) Lose customers as a result of price increases
(d) Differentiation strategy may be copied by the
(c) Make find it difficult to survive in the market
competitors if it proves successful
(d) Be able to bear the higher input prices and
continue to earn the average returns (Q-46). When implementing a focus strategy, the firm
seeks ______________.
(Q-43). The risks of a cost leadership strategy includes
____________. (a) To be the lowest cost producer in an industry
(b) To offer products with unique features or
(a) Competitors may imitate the successful cost
attributes for which customers will be willing
leadership strategy
to pay a premium price
(b) Technology breakthroughs may make cost-
(c) To undercut the competitor in terms of price
leadership strategy ineffective
(d) To serve the specialized needs of a specific
(c) Customers may not value the differentiating
market segment
features and pay the premium prices
(d) Both (a) and (b) (Q-47). Which of the following statement is best
associated with the nine-cell matrix?
(Q-44). A differentiation strategy provides products
that customers perceive as having ___________. (a) Indicates which businesses are the cash cows
or dogs
(a) Acceptable features
(b) Indicates what strategic alternative entity
(b) Features of little value relative
should opt based on industry life cycle and
(c) Features for which customer will pay low price
firms competitive position in the market
(d) Features that are unique for the customers
(c) Useful for deciding which businesses should
and for which they are willing to pay a
have high, medium or low priorities in
premium price
allocating the corporate resources
(d) Indicates what should be growth strategy
based on the product market combination of
the entity
(a) When divestment strategy adopted but (Q-57). The essential ingredients of Business Process
proved to unsuccessful Re-engineering are:
(b) When organization's only remaining feasible
(a) Continuous improvements of products,
alternative is bankruptcy
processes and technologies
(c) When stockholders of the firm can minimize
(b) Planning in the areas of technologies, research
their losses by selling the firm's assets
and development etc.
(d) When the organization has successfully
(c) Fundamental rethinking and radical redesign
implemented retrenchment strategy
of processes to achieve dramatic results
(Q-53). A strategy that occurs when two or more (d) Adopting industries best practices that lead to
companies form a temporary partnership or superior performance
association for capitalizing on some opportunity is
(Q-58). A company’s actual strategy is _________.
called ____________.
(a) Mostly hidden to outside view and is known
(a) Merger
.only to the corporate-level managers
(b) Joint Venture
(b) Planned well in advance and deviates little
(c) Acquisition
.from the planned set of actions
(d) Takeover
(c) Mostly a function of the strategies being used
(Q-54). _________ includes increasing the number of by rival companies particularly those
salespersons, increasing advertising expenditures, companies that are industry leaders
offering extensive sales promotion items or increasing (d) Partly proactive and partly reactive to the
publicity efforts so to increase the market share of the .changing circumstances
organisation’s products or services.
(Q-59). The strategy of the TATA Group in India could
(a) Market Development be viewed as a good example of ____________.
(b) Product development
(a) Conglomerate Diversification
(c) Horizontal integration
(b) Market Development
(d) Market penetration
(c) Cost Leadership
(d) Concentric Diversification (Q-66). Which of the following cannot be the treated
as a strength of an organization?
(Q-60). The Product Market matrix comprising of
Strategies of Penetration, Market Development, (a) Good Industrial relations
Product Development and Diversification was first (b) Incentives from State Government
formulated by _____________. (c) Financially very sound
(d) Raw materials source at a distance
(a) Igor Ansoff
(b) Peter Drucker (Q-67). Amul Ltd. produces a popular flavored milk
(c) Michael Porter called Amul Cool Milk. Amul has launched new
(d) Ramen Andrews advertisement campaign that says, ‘Have Amul Cool
Milk with tea and coffee too’. Amul Ltd. is most
(Q-61). If an organisation acquires its supplier to get
probably pursuing _______________ strategy.
the better control over its supply chain, it is an example
of ____________. (a) Market Development
(b) Product Development
(a) Horizontal integration
(c) Market Penetration
(b) Forwards vertical integration
(d) Diversification
(c) Backwards vertical integration
(d) Concentric integration (Q-68). Consider the following statements:
(Q-62). In product life cycle, ‘cash cows’ indicates: (i) Competitive strategy is designed to help firms
achieve competitive advantage
(a) High share, high growth, negative cash flow
(ii) Growth share matrix is popularly used for
(b) Low share, low growth, negative cash flow
resource allocation
(c) High share, low growth, positive cash flow
(iii) Core competence is a unique strength of
(c) Low share, high growth, positive cash flow
organization which is also shared by others
(Q-63). The ADL Portfolio Matrix suggested by Arthur (iv) Liquidation is the last resort option for a
D. Little consists of __________ cells. business
(Q-99). Which of the following statement is not true Which of the above statements are true?
about strategic decisions? (a) (i) & (ii)
(a) They need top-management involvement (b) (ii) & (iii)
(b) Involve commitment of large amount of (c) (i) & (iii)
organisational resources (d) (i), (ii) and (iii)
(c) They are based on external environment
(d) They have insignificant impact on the long-
term prosperity
(a) Adaptation
(b) Consistency
(Q-106). Acquisition of a company producing (b) Industry Attractiveness
readymade garments by a company manufacturing (c) Business strength
yarn is an example of ___________. (d) Market Growth Rate
(a) Horizontal integration (Q-113). In GE 9 cell matrix, what is the label of the
(b) Horizontal Diversification vertical axis?
(c) Forward integration
(a) Relative Market share
(d) Backward integration
(b) Market Attractiveness
(Q-107). Which of the following can be used in (c) Business strength
retrenchment strategy? (d) Market Growth Rate
(a) Reducing assets (Q-114). As per 9 cell matrix, which of the following
(b) Operational improvement factor is not associated with market attractiveness?
(c) Cutting cost
(a) Size of the market
(d) All of the above
(b) Brand image
(Q-108). Decisions with regards to marketing mix are (c) Market growth rate
related to _______________. (d) Competitive intensity
(a) Growth Strategy (Q-115). As per GE 9 cell matrix, which of the following
(b) Business level strategy factor is not associated with business strength of the
(c) Functional strategy organisation?
(d) Corporate decisions
(a) Customer loyalty
(Q-109). The purpose of logistics management is (b) Brand image
(c) Production capacity
(a) Provide customer satisfaction
(d) Competitive intensity
(b) Create automation
(c) Procure better quality raw material (Q-116). Which of the following representative color is
(d) Manage inward and outward movement . . not used in the GE 9 cell matrix?
of goods
(a) Green
(Q-110). Who is a transformational leader? (b) Yellow
(a) Who brings organizational change (c) While
(b) A leader, who provides new ways of (d) Red
carrying out management (Q-117). As per the GE 9 cell matrix, retrenchment,
(c) A leader who inspires workers to new divestment or liquidation are the best strategic options
levels by offering them a vision of a better for a company to consider if the product falls in the
future ________ section?
(d) A leader who tries to transform their staff
by giving them rewards for what they do (a) Green
(b) Yellow
(Q-111). Which of the following is not a feature of the (c) While
government undertakings and departments? (d) Red
(a) Stakeholder issues are often conflicting (Q-118). As per GE 9 cell matrix, holding the position
(b) Job security is relatively high i.e. neither invest nor divest are the strategic options if
(c) The culture is highly political the product falls in the ________ section?
(d) Performance related rewards are common
(a) Green
(Q-112). In GE 9 cell matrix, what is the label of the (b) Yellow
horizontal axis? (c) While
(a) Relative Market share (d) Red
(Q-119). As per GE 9 cell matrix, expand, invest, grow (i) It can be single business or collection of related
etc. are the strategic options if the product falls in the businesses
________ section? (ii) It has its own set of competitors
(iii) It has a manager who is responsible for
(a) Green
strategic planning and profit
(b) Yellow
(iv) It can be planned for separately than the rest
(c) While
of the business
(d) Red
Which of the above statements are correct?
(Q-120). The GE 9 cell model is based on:
(a) Point (ii), (iii) & (iv) only
(a) Industry attractiveness & Business Strength
(b) Point (i), (iii) & (iv) only
(b) Industry Growth rate & Business strength
(c) Point (i), (ii) & (iii) only
(c) Industry attractiveness & market share
(d) Point (i), (ii), (iii), (iv)
(d) Industry growth & Relative market share
(Q-126). ___________ can be defined as a set of
(Q-121). GE 9 cell matrix is developed by __________
techniques that help strategists in taking strategic
with the help of _____________.
decisions with regard to individual products or
(a) General Electric, PWC businesses in a firm’s portfolio.
(b) General Electric, McKinsey & Company
(a) Product Analysis
(c) General Electric, Boston Consulting Group
(b) Portfolio Analysis
(d) German Electric, McKinsey & Company
(c) Product Life Cycle Analysis
(Q-122). Which of the following portfolio analysis (d) SBU Analysis
method uses business strength and market
(Q-127). Consider the following statements about the
attractiveness as factors to decide about the strategic
portfolio and portfolio analysis:
options to be taken?
(i) Portfolio is combination of businesses and
(a) ADL Matrix
products that makes up the company
(b) General Electric Model
(ii) Strategic Business Unit is one of the methods
(c) Ansoff’s Product Market Growth Matrix
of portfolio analysis
(d) BCG Growth-Share Matrix
(iii) Through portfolio analysis, resources could be
(Q-123). Which of the following portfolio analysis channelized to those businesses or products
method uses the market growth rate and the relative that possess the greatest potential
market share of the organisation in the industry as its (iv) Through portfolio analysis, strategic decisions
determining factors? with regard to individual products or
businesses can be taken
(a) ADL Matrix
(b) General Electric Model Which of the above statements are correct?
(c) Ansoff’s Product Market Growth Matrix
(a) Point (ii), (iii) & (iv) only
(d) BCG Growth-Share Matrix
(b) Point (i), (iii) & (iv) only
(Q-124). ___________ portfolio analysis method (c) Point (i), (ii) & (iii) only
identifies five competitive positions an organisation (d) Point (i), (ii), (iii), (iv)
can have in the marketplace.
(Q-128). Unless the organisation is in deep financial
(a) ADL Matrix crisis, it should focus on both strategic as well as
(b) General Electric Model financial objective. This has been stated by ________
(c) Ansoff’s Product Market Growth Matrix mechanism.
(d) BCG Growth-Share Matrix
(a) Balanced Scorecard Analysis
(Q-125). Consider the following statements about the (b) Portfolio Analysis
Strategic Business Unit: (c) Product Life Cycle Analysis
(d) SBU Analysis
(Q-129). Product Life Cycle is an _________ curve. (d) Production long cycle
(a) Introduction Stage (Q-138). In which of the following stages of the product
(b) Growth Stage life cycle do profits peak?
(c) Maturity Stage
(a) Introduction
(d) Decline Stage
(b) Growth
(Q-133). Consider the following statements about the (c) Maturity
experience curve: (d) Decline
(i) Being very technical area, experience curve is (Q-139). In the Boston Consulting Group matrix, stars
not relevant in the strategic management do which of the following?
(ii) It is also known as learning curve
(a) Achieve high market growth in the future but
(iii) It is based on the phenomenon that unit costs
currently have low market share
increases as cumulative volume of production
(b) Hold a sizeable portion of a growing market
increases due to learning effect
(c) Hold high market share in a mature market
(iv) Experience curve is considered a barrier for
(d) Hold a low market share in a mature market
new firms contemplating entry in an industry
(Q-140). A tool by which management identifies and
Which of the above statements are correct?
evaluates the various businesses that make up a
(a) Point (ii), (iii) & (iv) only company is termed as ___________.
(b) Point (ii) & (iv) only
(a) Value Chain Analysis
(c) Point (i), (ii) & (iii) only
(b) Portfolio Analysis
(d) Point (i), (ii), (iii), (iv)
(c) Competition Analysis
(Q-134). What does the term PLC stand for? (d) Strategic Analysis
(a) Product life cycle (Q-141). ‘Build,’ ‘Hold,’ ‘Harvest,’ and ‘Divest’ are the
(b) Production life cycle strategies explained by:
(c) Product long cycle
(a) Boston Consulting Group Matrix
(b) Value chain Analysis (iii) Capital requirement is a important economic
(c) Managerial Grid Matrix feature to be considered in industry analysis
(d) Ansoff’s Product Matrix Growth Matrix (iv) It is important to have proper understanding of
the competitive pressure in the industry
(Q-142). Which of the following given statement is
incorrect? Which of the above statements are correct?
(a) Growth share matrix is popularly used for (a) Point (ii), (iii) & (iv) only
resource allocation (b) Point (i), (iii) & (iv) only
(b) A core competence is a unique strength of an (c) Point (i), (ii) & (iii) only
entity which may not be shared by others (d) Point (ii) & (iii) only
(c) Strength is inherent capacity of an entity
(Q-148). Strategic group is a group that consists of:
(d) 'B" in BCG Matrix stands for balance
(a) Top executives make strategies for company
(Q-143). In India, there is increasing trend towards IPL
(b) Firms within an industry that follows similar
like cricket tournaments. Which of the following
competitive strategies
industry is usually not affected by this development?
(c) CEO’s from different companies of industry
(a) Real Estate Industry makes decisions on industry standards
(b) Sports Industry (d) Firms within an industry decides to co-operate
(c) Sports Channels, Advertisement Industry than compete with each other
(d) Hotel industry
(Q-149). Strategic groups are clusters of firms that
(Q-144). ___________ enterprise is a substantially share __________ competitive strategies.
non-political worldwide enterprise such as WTO, IMF,
(a) Different
World Bank etc.
(b) Similar
(a) International (c) Same
(b) Transnational (d) Competitive
(c) Super national
(Q-150). Given below is the steps involved in the
(d) Multi-national
strategic group mapping process:
(Q-145). In long run, when the growth rate slows down
(i) Assign firms that fall in about the same
stars become ___________.
strategy to same strategic group
(a) Cash Cows (ii) Draw circles around each strategic group
(b) Tortoise (iii) Identify the competitive characteristics that
(c) Dogs differentiate firms in the industry
(d) Question Marks (iv) Plot the firms on a two-variable map using
pairs of these differentiating characteristics
(Q-146). There are three important concepts to be
understood before beginning the portfolio analysis. Arrange the steps involved in the correct order.
These are ________, _________ & __________.
(a) (i)-(ii)-(iii)-(iv)
(a) PLC, SBU, Experience curve (b) (ii)-(i)-(iii)-(iv)
(b) SBU, KSF, PLC (c) (iii)-(ii)-(i)-(iv)
(c) SBU, KSF, GE Model (d) (iii)-(iv)-(i)-(ii)
(d) BCG, SBU, ADL Matrix
(Q-151). Consider the following statements about
(Q-147). Consider the following statements about the strategic group mapping:
Industry and Competitive Analysis:
(i) A strategic group consists of those rival firms
(i) Different industries usually have more or less with similar competitive approaches and
similar competitive nature positions in the market
(ii) Industry is a group of firms operating in the (ii) There can be only one strategic group in the
same business line industry
(iii) At least two competitive characteristics are (b) Identifying weakest rival companies
needed to draw the strategic group (c) Identifying the weakest and strongest rival
(iv) Companies like Audi, Mercedes, BMW etc. can companies
fall in the same strategic group of an (d) None of the above
automobile industry
(Q-157). ‘Attractiveness of firms’ while conducting
Which of the above statements are correct? industry analysis should be seen in ________.
(a) Point (ii), (iii) & (iv) only (a) Relative terms
(b) Point (i), (iii) & (iv) only (b) Absolute terms
(c) Point (i), (ii) & (iii) only (c) Comparative terms
(d) Point (ii) & (iii) only (d) All of the above
(Q-152). The last step involved in the Industry & (Q-158). Which of the following is not a question to be
Competitive Analysis is: considered in the determination of industry key
success factor?
(a) Identifying Companies in the Strongest or
Weakest Positions (a) On what basis do customers choose between
(b) Likely Strategic Moves of Rivals the sellers?
(c) Prospects and Financial Attractiveness of (b) What resources & competitive capabilities
Industry seller need to be competitively successful?
(d) Key Factors for Competitive Success (c) What does it take for sellers to achieve a
sustainable competitive advantage?
(Q-153). Given below is the first four steps involved in
(d) Technological structure of the industry
the industry and competitive analysis:
(Q-159). Audi introduced the Q3 SUV at a price of
(i) Nature & Strength of Competition
$32,500 and BMW, with its 1-series, is another well-
(ii) Triggers of Change
known example. Such cars, priced around $30,000s
(iii) Dominant Economic Features of the Industry
and compete directly with Ford, Toyota etc. Which of
(iv) Identifying Companies in Strongest/Weakest
the following statement is correct in this regard?
Positions
(a) Members belonging to one strategic group will
Arrange the steps involved in the correct order?
always remain in that strategic group
(a) (i)-(ii)-(iii)-(iv) (b) There can be only one strategic group in the
(b) (ii)-(i)-(iii)-(iv) industry
(c) (iii)-(i)-(ii)-(iv) (c) Member of one strategic group can migrate to
(d) (iii)-(iv)-(i)-(ii) different strategic group
(d) Members belonging to one strategic group will
(Q-154). Which of the following is not a driving force always be same
which can trigger a change in the industry?
(Q-160). According to strategic management model,
(a) Internet and e-commerce which step needs to be completed immediately
(b) Globalization following the establishment of long-term objectives?
(c) Mobilization of resources
(d) Strategic Group Mapping (a) Developing vision and mission statements
(b) Generating, evaluating & selecting strategies
(Q-155). KSFs stand for:
(c) Measuring and evaluating performance
(a) Key strategic factors (d) Implementation of strategies
(b) Key supervisory factors
(Q-161). Diversification primarily helps to:
(c) Key success factors
(d) Key sufficient factors (a) Reduce competition
(b) Reduce risk
(Q-156). ‘Strategic group mapping’ helps in:
(c) Reduce taxes
(a) Identifying the strongest rival companies (d) Reduce costs
(Q-162). If suppliers are unreliable or too costly, which (a) (i) and (ii)
of these strategies may be appropriate? (b) (i) and (iii)
(c) (ii), (iii) and (iv)
(a) Horizontal integration
(d) (i), (ii) and (iii)
(b) Backward integration
(c) Market penetration (Q-167). A campaign advocating the message of ‘SAVE
(d) Forward integration WATER’ is:
(Q-163). Which of the following is not the major reason (a) Services Marketing
for expansion strategy? (b) Holistic marketing
(c) Social Marketing
(a) Environment is relatively stable with decrease
(d) Direct Marketing
in the economic activities
(b) Greater control over the market is required to (Q-168). The Niche strategy is the best way to enter a
get competitive advantage ____________.
(c) Environment is dynamic and economic
(a) New market
activities are growing at rapid pace
(b) Growing market
(d) Greater control over the market is required to
(c) Matured market
get competitive advantage
(d) None of the above
(e) Huge benefits may occur from increased scale
of operation and experience curve (Q-169). Supply chain refers to the linkages between:
(Q-164). When firm is entering in business lines that (a) Suppliers
use existing products & also when firm enters into (b) Customers
business of distribution channels. (c) Manufacturers
(d) All the above
(a) Forward Integration
(b) Backward Integration (Q-170). The process of creating, maintaining, and
(c) Concentric enhancing strong, value- laden relationships with
(d) Conglomerate customers and other stakeholder is _________.
(Q-165). Which of these is a type of merger? (a) Social marketing
(b) Augmented marketing
(a) Co-generic
(c) Direct marketing
(b) Co-operational
(d) Relationship marketing
(c) Concentric
(d) Co-genetic