ExamGecko
Home Home / GAQM / CITM-001

GAQM CITM-001 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Which of the following virus is a script that attaches itself to a file or template?

A.

E-mail virus

A.

E-mail virus

Answers
B.

Boot sector

B.

Boot sector

Answers
C.

Macro virus

C.

Macro virus

Answers
D.

Trojan horse

D.

Trojan horse

Answers
Suggested answer: C

Explanation:

A macro virus is a virus that is written in a macro language, which is a programming language embedded inside a software application, such as word processors and spreadsheet applications. A macro virus can attach itself to a file or template and run automatically when the file is opened or closed, without the user's knowledge. A macro virus can infect any system that supports macros, regardless of the operating system.A macro virus can spread quickly by infecting other documents and templates, and may cause damage to the computer and its applications123Reference:

1: What is a Macro Virus? | Macro Virus Definition - Kaspersky

2: Macro virus - Wikipedia

3: What is a macro virus and how to help prevent them - Norton

Choose the malicious code which can distribute itself without using having to attach to a host file.

A.

A virus.

A.

A virus.

Answers
B.

A logic bomb.

B.

A logic bomb.

Answers
C.

A worm.

C.

A worm.

Answers
D.

A Trojan horse.

D.

A Trojan horse.

Answers
Suggested answer: C

Explanation:

A worm is a type of malicious code that can distribute itself without using having to attach to a host file. Unlike a virus, which needs to infect an existing program or file to spread, a worm can create copies of itself and send them to other devices through a network. A worm can consume network bandwidth, slow down the system performance, or deliver a payload that can damage or compromise the security of the infected device. According to the CITM study guide, a worm is ''a self-replicating program that does not alter files but resides in active memory and duplicates itself'' (p. 70). Some examples of worms are Stuxnet, Conficker, and Blaster.Reference:

CITM Study Guide, Chapter 5: Information Security, pp. 69-71

12 Types of Malware + Examples That You Should Know1

What is Malicious code?2

Cyber Awareness Challenge 2022 Malicious Code3

Malicious Code---What is it and How to Prevent it?4

A malicious program that records a user's keystrokes is an example of:

A.

a Trojan horse.

A.

a Trojan horse.

Answers
B.

adware.

B.

adware.

Answers
C.

an anti-virus program.

C.

an anti-virus program.

Answers
D.

a performance monitor.

D.

a performance monitor.

Answers
Suggested answer: A

Explanation:

A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.

The other options are not correct because:

Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.

An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.

A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.

CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132

What Is a keylogger and how to detect keystroke logging - Norton

Keylogger: how to recover the infected pc? - Panda Security

_______________ interdependence occurs when two organizations depend on each other.

A.

Pooled

A.

Pooled

Answers
B.

Reciprocal

B.

Reciprocal

Answers
C.

Peer

C.

Peer

Answers
D.

Sequential

D.

Sequential

Answers
Suggested answer: B

Explanation:

Reciprocal interdependence occurs when two organizations depend on each other in a cyclical manner, such that the output of one becomes the input of the other and vice versa. This type of interdependence is the most complex and difficult to manage, as it requires constant coordination and communication between the organizations. An example of reciprocal interdependence is the relationship between a software development company and a software testing company, where each one relies on the feedback and quality of the other's work.Reference:Three Types of Interdependence in an Organizational Structure,Interdependence in International Organization and Global Governance

________________ interdependence occurs when the output of one unit is the input to another.

A.

Sequential

A.

Sequential

Answers
B.

Random

B.

Random

Answers
C.

Dynamic

C.

Dynamic

Answers
D.

Reciprocal

D.

Reciprocal

Answers
Suggested answer: A

Explanation:

Sequential interdependence occurs when the output of one unit or group becomes the input for another. This type of interdependence requires coordination and communication among the units or groups involved, as any delay or error in one unit can affect the performance of the next unit.An example of sequential interdependence is an assembly line, where each stage of production depends on the previous one12Reference:

1: 9.4 Intergroup Behavior and Performance - OpenStax

2: Three Types of Interdependence in an Organizational Structure | Small Business - Chron.com

Which of the following best suits the statement below? It's the main memory of the computer system and is volatile

A.

Ram

A.

Ram

Answers
B.

Rom

B.

Rom

Answers
C.

Prom

C.

Prom

Answers
D.

Hard disk

D.

Hard disk

Answers
Suggested answer: A

Explanation:

RAM, or Random Access Memory, is the best fit for the statement because it is the main memory of the computer system and is volatile. RAM is a type of computer memory that is used to store data that is currently being used by the computer's operating system and applications. RAM is volatile because it loses its contents when the power supply to the computer is turned off or interrupted. RAM is also faster and more expensive than other types of memory, such as ROM, PROM, or hard disk, which are non-volatile and can retain data without power. RAM is divided into two types: static RAM (SRAM) and dynamic RAM (DRAM), which differ in their speed, power consumption, and design.Reference

https://en.wikipedia.org/wiki/Volatile_memory

https://www.bbc.co.uk/bitesize/guides/zfyyb82/revision/1

https://www.proprofs.com/quiz-school/story.php?title=information-technology-quiz_7

All of the following are processing modes except:

A.

Batch processing

A.

Batch processing

Answers
B.

Time-sharing

B.

Time-sharing

Answers
C.

Process

C.

Process

Answers
D.

Online

D.

Online

Answers
Suggested answer: C

Explanation:

Processing modes are the ways of organizing data and operations in a computer system. Batch processing, time-sharing, and online are all examples of processing modes, but process is not. A process is a program or a set of instructions that is executed by the CPU. A process can run in different processing modes, depending on the system design and the user requirements. For example, a process can run in batch mode, which means that it is executed without user interaction and with a set of input data. Alternatively, a process can run in time-sharing mode, which means that it is executed in a shared environment with multiple users and with interactive input and output. Finally, a process can run in online mode, which means that it is executed with continuous connection to a network and with real-time input and output.Reference:EPI-USA, CITM Course Outline, Module 2: IT Infrastructure, Slide 9.GAQM, CITM Exam Objectives, Domain 2: IT Infrastructure, Objective 2.1: Understand the basic concepts of IT infrastructure.Includehelp, MCQ | Modes of Operations in Block Cipher.


_____________ occurs because the data we want may not be directly under the read-write heads.

A.

Sequential delay

A.

Sequential delay

Answers
B.

Rotational delay

B.

Rotational delay

Answers
C.

Seek time

C.

Seek time

Answers
D.

Collision time

D.

Collision time

Answers
Suggested answer: B

Explanation:

Rotational delay is the time it takes for the desired sector of the disk to rotate under the read-write head after the head has been positioned at the correct track. It depends on the rotational speed of the disk and the position of the sector relative to the head. It is one of the components of data access delay, along with seek time, transmission delay, and processing delay.Reference:Delays in Computer Network - GeeksforGeeks,Access time - Wikipedia

DBMS stands for

A.

Data Base Marginal System

A.

Data Base Marginal System

Answers
B.

Directory Based Management System

B.

Directory Based Management System

Answers
C.

Data Base Management System

C.

Data Base Management System

Answers
D.

Dual Base Management System

D.

Dual Base Management System

Answers
Suggested answer: C

Explanation:

A DBMS is software that monitors and maintains accurate, quality data in a data structure. It helps organizations optimize, store, retrieve and manage data in a database. A DBMS consists of a group of programs that manipulate the database and accept requests for data from an application or user. A DBMS can also provide security, redundancy, abstraction, and multiple views of the data. A DBMS that stores data in tables and uses relationships between them is called a relational DBMS or RDBMS. Some examples of popular DBMS software are PostgreSQL, Oracle Database, Microsoft SQL Server, MySQL, SQLite, IBM Db2, etc.Reference:What is DBMS? Database Management Systems, Explained,What Is a DBMS? - LearnSQL.com,Database management system (DBMS) | Definition & Facts.

In a database, each row is called a

A.

record

A.

record

Answers
B.

column

B.

column

Answers
C.

information

C.

information

Answers
Suggested answer: A

Explanation:

In a database, each row represents a single, implicitly structured data item in a table. A row is also called a record or a tuple. A record contains multiple fields, each one defined in a different column. A field is the intersection of a row and a column, and it holds a single value.A column is also called an attribute or a field name, and it defines the type and constraints of the data in that column.Reference:

https://stackoverflow.com/questions/13774547/in-databases-whats-the-difference-between-the-words-row-and-record

https://database.guide/what-is-a-row/

Total 80 questions
Go to page: of 8