Business Management

Only available on StudyMode
  • Download(s) : 98
  • Published : December 3, 2012
Open Document
Text Preview
21) What is the best strategy for designing a PowerPoint presentation for the first time for your organization? A. Ask around to see if there is a standard template for the organization. B. Choose the template that you used for the class that you did the best in at college. C. Use the Blank Presentation template just to be safe.

D. Use the Microsoft.com 5-star rating to find the most well-liked template.

22) When creating a presentation, it is most important to consider making the text A. readable
B. decorative
C. colorful
D. beautiful

23) Mark recently received an e-mail from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of A. hacking

B. phishing
C. pretexting
D. sniffing

24) The broadest definition of ________ includes viruses, worms, Trojan horses, spyware, and adware. A. malware
B. metadata
C. software
D. widgets

25) Which of the following statements is true regarding position sensitivity? A. It is a type of data safeguard.
B. It enables security personnel to prioritize their activities in accordance with the possible risk and loss. C. It is documented only for high-sensitivity positions.
D. It applies to new employees only.

26) Which of the following is true regarding an incident-response plan? A. The plan should provide decentralized reporting of all security incidents. B. The plan should require minimal training on the part of employees. C. The plan should identify critical personnel and their off-hours contact information. D. The plan should be simple enough to ensure a fast response with limited practice.

27) Projects that spend so much time ________ are sometimes said to be in analysis paralysis. A. in the system definition phase of the SDLC
B. on...
tracking img