1.
Select from the following choices the objectives of IT Governance:
a. To reduce risk
b. To ensure investments in IT resources
c. To add value to the corporation
d. To make IT big
ANSWER: A, B, AND C
2. Which of the following disaster recovery techniques may be least optimal in the case of a
disaster?
a. empty shell
b. mutual aid pact
c. recovery operation center
d. they are all equally beneficial
ANS: B
3. Which of the following is a feature of fault tolerance control?
a. interruptible power supplies
b. DDP
c. RAID
d. MDP
ANS: C
4. Which of the following is not true?
a. Large-scale IT outsourcing involves transferring specific assets to a vendor
b. Specific assets, while valuable to the client, are of little value to the vendor
c. Once an organization outsources its specific assets, it may not be able to return to its
pre-outsource state.
d. Specific assets are of value to vendors because, once acquired, vendors can achieve
economies of scale by employing them with other clients
ANS: D
5. Which of the following is not true?
a. When management outsources their organization's IT functions, they also outsource
responsibility for internal control.
b. Once a client firm has outsourced specific IT assets, its performance becomes linked to
the vendor's performance.
c. IT outsourcing may affect incongruence between a firm's IT strategic planning and its
business planning functions.
d. The financial justification for IT outsourcing depends upon the vendor achieving
economies of scale.
ANS:A
6. Which of the following is not an essential feature of a disaster recovery plan?
a. computer services function
b. off-site storage of backups
c. second site backup
d. critical applications identified
ANS: A
7. A cold site backup approach is also known as
a. internally provided backup
b. recovery operations center
c. empty shell
d. mutual aid pact
ANS: C
8. The major disadvantage of an empty shell solution as a second site backup is
a. the host site may be unwilling to disrupt its processing needs to process the critical
applications of the disaster stricken company
b. the control of the shell site is an administrative drain on the company
c. maintenance of excess hardware capacity
d. recovery depends on the availability of necessary computer hardware
ANS: D
9. An advantage of a recovery operations center is that
a. the initial recovery period is very quick
b. this is an inexpensive solution
c. the company has sole control over the administration of the center
d. none of the above are advantages of the recovery operations center
ANS: A
10. A disaster recovery plan is a comprehensive income statement of all actions to be taken
after a disaster.
a. True
b. False
ANS: F
11. Commodity IT assets are easily acquired in the marketplace and should be outsourced
under the core competency theory.
a. True
b. False
ANS: F
12. Fault tolerance is the ability of the system to continue operation when part of the system
fails due to hardware failure, application program error, or operator error.
a. True
b. False
ANS: T
13. A disadvantage of distributed data processing is
a. the increased time between job request and job completion.
b. the disruption caused when the mainframe goes down.
c. the potential for hardware and software incompatibility among users.
d. that users are not likely to be involved.
ANS: C
14. Participation in svstem development activities includes:
a. System analysis, database desioners and programmers
b. Managers and operating personnel who work directly with the system
c. Accountants and Auditors
d. All of the above
Ans: D
15. Adequate backups will protect against all of the following except;
a: Natural disasters such as fires
b. Unauthorized access
c. Data corruption caused by program errors
d. System crashes
ANS: B
16. cloud computing
a. Pools resources to meet the needs of multiple client firms
b. Allows clients to expand and contract services almost instantly
c. Both a and b
d. Neither a not b
Ans: C
17. Virtualization is the technology that unleashed cloud computing
ANS: T
18-19. Statement 1: specific IT assets support an organization’s strategic objectives
Statement 2: A database administrator is responsible for the receipt, storage, retrieval, and
custody of data files.
a. Only statement 1 is correct
b. Both statements are correct
c. Only statement 2 is correct
d. Both statements are incorrect
ANS: A
20. Which organizational structure is most likely to result in good documentation procedures?
a. Separate systems development from systems maintenance
b. Separate systems analysis from application programming
c. Separate systems development from data processing
d. System database administrator from data processing
ANS: A