Which of the following best categorizes the analytical model applied?
An analytical model determined that on Friday and Saturday nights the luxury brands stores should be open for extended hours and with a doubled number of employees present; while on Mondays and Tuesdays costs can be minimized by reducing the number of employees to a minimum and opening only for...
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?
Which of the following IT disaster recovery plans includes a remote site dessgnated for recovery with available space for basic services, such as internet and telecommunications, but does not have servers or infrastructure equipment?A . Frozen siteB . Cold siteC . Warm siteD . Hot siteView AnswerAnswer: B
Which of the following would be the best method to collect information about employees' job satisfaction?
Which of the following would be the best method to collect information about employees' job satisfaction?A . Online surveys sent randomly to employees.B . Direct onsite observations of employees.C . Town hall meetings with employees.D . Face-to-face interviews with employees.View AnswerAnswer: D
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?
With increased cybersecurity threats, which of the following should management consider to ensure that there is strong security governance in place?A . Inventory of information assetsB . Limited sharing of data files with external parties.C . Vulnerability assessmentD . Clearly defined policiesView AnswerAnswer: C
Which of the following would be a concern related to the authorization controls utilized for a system?
Which of the following would be a concern related to the authorization controls utilized for a system?A . Users can only see certain screens in the system.B . Users are making frequent password change requests.C . Users Input Incorrect passwords and get denied system accessD . Users are all permitted...
Which of the following data security policies is most likely to be the result of a data privacy law?
Which of the following data security policies is most likely to be the result of a data privacy law?A . Access to personally identifiable information is limited to those who need It to perform their job.B . Confidential data must be backed up and recoverable within a 24-hour period.C ....
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?A . An extranetB . A local area networkC . An IntranetD . The internetView AnswerAnswer: B
Which of the following is true of matrix organizations?
Which of the following is true of matrix organizations?A . A unity-of-command concept requires employees to report technically, functionally, and administratively to the same manager.B . A combination of product and functional departments allows management to utilize personnel from various Junctions.C . Authority, responsibility and accountability of the units Involved...
Which of the following is a disadvantage in a centralized organizational structure?
Which of the following is a disadvantage in a centralized organizational structure?A . Communication conflictsB . Slower decision making.C . Loss of economies of scaleD . Vulnerabilities in sharing knowledgeView AnswerAnswer: B
How should the expense be reported on that year's financial statements?
On the last day of the year, a total cost of S 150.000 was incurred in indirect labor related to one of the key products an organization makes. How should the expense be reported on that year's financial statements?A . It should be reported as an administrative expense on the...