Business Management Quiz Questions

26 Questions | Total Attempts: 42

SettingsSettingsSettings
Please wait...
Business Management Quizzes & Trivia

This is a specifically fabricated test designed to assess how good your knowledge is about business management. It might not be as easy as you think but there is only one way to find out. All the best!


Questions and Answers
  • 1. 
    A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
    • A. 

      True

    • B. 

      False

  • 2. 
    System availability is often expressed as a percentage of uptime in a year.
    • A. 

      True

    • B. 

      False

  • 3. 
    Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
    • A. 

      True

    • B. 

      False

  • 4. 
    RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
    • A. 

      True

    • B. 

      False

  • 5. 
    Most metadata about a file is generated and recorded automatically without the user’s knowledge.
    • A. 

      True

    • B. 

      False

  • 6. 
    Is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.
    • A. 

      Business continuity planning and testing

    • B. 

      Disaster planning

    • C. 

      Business management planning and testing

    • D. 

      Enterprise disaster planning

  • 7. 
    A ____ typically begins by identifying threats through a risk assessment.
    • A. 

      BRA

    • B. 

      BAA

    • C. 

      BPA

    • D. 

      BIA

  • 8. 
    Plans typically include procedures to address redundancy and fault tolerance as well as data backups.
    • A. 

      Enterprise recovery

    • B. 

      Disaster recovery

    • C. 

      Business recovery

    • D. 

      Emergency recovery

  • 9. 
    A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.
    • A. 

      Recovery site

    • B. 

      Recovery point

    • C. 

      Single point of failure

    • D. 

      Cascade point of failure

  • 10. 
    A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.
    • A. 

      Service level agreement

    • B. 

      Recovery point objective

    • C. 

      Recovery time objective

    • D. 

      Service point agreement

  • 11. 
    In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.
    • A. 

      Symmetric network

    • B. 

      Symmetric server

    • C. 

      Asymmetric network

    • D. 

      Asymmetric server

  • 12. 
    In a(n) ____ cluster, every server in the cluster performs useful work.
    • A. 

      Symmetric network

    • B. 

      Asymmetric network

    • C. 

      Symmetric server

    • D. 

      Symmetric network

  • 13. 
    A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.
    • A. 

      Uninterruptible power supply

    • B. 

      Redundant power supply

    • C. 

      Uninterruptible system supply

    • D. 

      Replica power supply

  • 14. 
    A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.
    • A. 

      Cold site

    • B. 

      Hot site

    • C. 

      Spare site

    • D. 

      Warm site

  • 15. 
    Is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.
    • A. 

      Newton phreaking

    • B. 

      Van Eck phreaking

    • C. 

      Van Zek hacking

    • D. 

      EMF phreaking

  • 16. 
    A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.
    • A. 

      Bollard

    • B. 

      Mantrap

    • C. 

      Faraday cage

    • D. 

      Newton cage

  • 17. 
    Uses technology to search for computer evidence of a crime, can attempt to retrieve information—even if it has been altered or erased—that can be used in the pursuit of the attacker or criminal.
    • A. 

      Computer forensics

    • B. 

      Penetration testing

    • C. 

      Vulnerability testing

    • D. 

      Risk management

  • 18. 
    According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.
    • A. 

      65

    • B. 

      75

    • C. 

      85

    • D. 

      95

  • 19. 
    The ____ response team serves as first responders whenever digital evidence needs to be preserved.
    • A. 

      Incident

    • B. 

      Computer forensics

    • C. 

      Risk

    • D. 

      Emergency

  • 20. 
     data is the most difficult type of data to capture.
    • A. 

      Volatile

    • B. 

      Static

    • C. 

      Non-volatile

    • D. 

      Persistent

  • 21. 
    A ____ is a snapshot of the current state of the computer that contains all current settings and data.
    • A. 

      System standard

    • B. 

      System view

    • C. 

      System image

    • D. 

      System baseline

  • 22. 
    A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.
    • A. 

      Baseline

    • B. 

      Mirror image

    • C. 

      Logical image

    • D. 

      Thin image

  • 23. 
    The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.
    • A. 

      Chain of value

    • B. 

      Chain of use

    • C. 

      Chain of property

    • D. 

      Chain of custody

  • 24. 
    Multiple sectors are used to make up a ____.
    • A. 

      Cluster

    • B. 

      Track

    • C. 

      Slice

    • D. 

      Platter

  • 25. 
    Pertains only to the last sector of a file.
    • A. 

      Disk slack

    • B. 

      RAM slack

    • C. 

      ROM slack

    • D. 

      Edge slack

Back to Top Back to top