If you want to enhance your business management skills, then this quiz is for you. You can play this "Most Advanced Business Management MCQ Test" and check your knowledge. Your score will decide how well you are aware of the terms and skills of Advanced Business Management. You can get the perfect score just by answering the quiz questions. All the best for the best scores.
The Security Officer is responsible for ensuring that recommendations to executive management are full, accurate, and complete.
The Security Officer accepts the risk of system failures
The Security Officer reports to the Privacy Officer.
The Security Officer is responsible for protection of business information assets.
Rate this question:
Copyright Law
Lanham Act
Glass-Steagall Act
Economic Espionage Act
Rate this question:
Banks
Defense contractors
School districts
Hospitals
Rate this question:
Integrity
Availability
Confidentiality
Denial
Rate this question:
Digital signatures
Virtual private network
Virtual LAN
Digital content management
Rate this question:
Risk mitigation
Risk acceptance
Risk transference
Risk avoidance
Rate this question:
Chief information officer
Chief executive officer
Chief information security officer
Chief operating officer
Rate this question:
FERPA
GLBA
HIPAA
HITECH
Rate this question:
Purchasing insurance
Encrypting the database contents
Removing the data
Objecting to the exception
Rate this question:
Identifying vital records
Locating vital records
Archiving vital records
Preserving vital records
Rate this question:
Training
Education
Indoctrination
Awareness
Rate this question:
0.0025
0.005
0.01
0.015
Rate this question:
A control put in place when another control is suspended or disabled
A control put in place to overcome the shortcomings of another control
A control put in place that automatically continues to protect the system when the primary control fails
A control that compensates for law enforcement or management's lack of technical skills
Rate this question:
Statement of accounts
Statement of importance
Statement of priorities
Statement of organizational responsibility
Rate this question:
Business impact assessment
Emergency response guidelines
Electronic vaulting
Vital records program
Rate this question:
Purchase cost
Depreciated cost
Replacement cost
Opportunity cost
Rate this question:
It must be new.
It must be invented by an American citizen.
It must be nonobvious.
It must be useful.
Rate this question:
Password
Retinal scan
Username
Token
Rate this question:
Monitor only during off hours
Obtain a search warrant prior to any monitoring
Not capture any network traffic related to monitoring employee's activity
Apply for a waiver from Interpol before monitoring
Rate this question:
Privacy
Secrecy
Availability
Reliability
Rate this question:
Identify the organization's key business functions
Identify the computer systems critical to the survival of the organization.
Estimate the financial impact a loss would have on the business based on how long an outage would last.
Acquire information from government agencies about the likelihood of a natural disaster occurring.
Rate this question:
It is the process of analyzing all business functions to determine the impact of an outage.
It is the process of analyzing corporate functions, such as accounting, personnel, and legal to determine which functions must operate immediately following an outage.
It is the process of documenting procedures and capabilities to sustain organizational essential functions at an alternate site.
It is the process of documenting viable recovery options for each business unit in the event of an outage.
Rate this question:
The regulations that affect a company within a state or country
The risk management processes and procedures within a company
The organizational structure that includes standards, procedures and policies
The organizational chart that describes who reports to whom as defined for a company
Rate this question:
A non-disclosure agreement
Their passwords
His or her badge
Any clothing items with the company logo
Rate this question:
Storage of information by a customer on a provider’s server
Caching of information by the provider
Transmission of information over the provider’s network by a customer
Caching of information in a provider search engine
Rate this question:
Focused on assets
Focused on attackers
Focused on software
Focused on social engineering
Rate this question:
Student identification number
Social Security number
Driver’s license number
Credit card number
Rate this question:
Implement new security controls to reduce the risk level.
Design a disaster recovery plan.
Repeat the business impact assessment.
Document your decision-making process.
Rate this question:
Quantitative risk assessment
Qualitative risk assessment
Qualitative risk assessment
Combination of quantitative and qualitative risk assessment
Rate this question:
Due diligence
Separation of duties
Due care
Least privilege
Rate this question:
Identify vulnerabilities in each asset.
Determine the risks facing the asset.
Develop a value for each asset.
Identify threats facing each asset.
Rate this question:
Risk acceptance
Risk avoidance
Risk mitigation
Risk transference
Rate this question:
Copyright
Patent
Trade secret
Trademark
Rate this question:
USPTO
Library of Congress
TVA
NIST
Rate this question:
Data custodian
Data owner
User
Auditor
Rate this question:
United States Code
Supreme Court rulings
Code of Federal Regulations
Compendium of Laws
Rate this question:
Assess security controls.
Determine control gaps.
Remediate control gaps.
Evaluate user activity.
Rate this question:
ITIL
ISO 27002
CMM
PMBOK Guide
Rate this question:
Core business function leaders
Information technology staff
CEO
Support departments
Rate this question:
I
II
III
IV
Rate this question:
Risk avoidance
Risk mitigation
Risk transference
Risk acceptance
Rate this question:
13
15
17
18
Rate this question:
Option 1
Option 2
Option 3
Option 4
Awareness
Training
Education
Indoctrination
Rate this question:
Spoofing
Repudiation
Information disclosure
Elevation of privilege
Rate this question:
Encryption
Nondisclosure agreement
Firewall
Fault tolerance
Rate this question:
Risk assessment methodologies
Control matrices
Threat modeling methodologies
Awareness campaign tools
Rate this question:
Permit losses that aren't very important.
Be 100% effective in preventing loss.
Reduce losses to a pre-defined level that management can tolerate.
Reduce losses to within 10% of a pre-defined level
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.