Digital Ecosystem

These are the basic Question you need to have a proper understanding form the Study material for your reference and understanding . Credit for this goes to Ajay Mohan M.


CHAPTER 1
Governance Basics

  1. What does governance primarily focus on?
    a) Executing day-to-day tasks
    b) Decision-making and accountability frameworks
    c) Marketing strategies
    d) IT system upgrades
    Answer: b
  2. Governance is distinct from management because governance:
    a) Focuses on execution
    b) Is limited to IT operations
    c) Defines decision rights and accountability
    d) Deals only with financial audits
    Answer: c
  3. Which principle is NOT part of a governance framework?
    a) Based on a conceptual model
    b) Aligning to major standards
    c) Providing rigid, unchangeable structures
    d) Remaining open and flexible
    Answer: c
  4. The key benefits of governance include:
    a) Reducing the role of stakeholders
    b) Improving customer relationships and satisfaction
    c) Eliminating IT investments
    d) Decreasing transparency
    Answer: b
    Enterprise and Corporate Governance
  5. Enterprise governance integrates:
    a) Compliance and IT audits
    b) Corporate and business governance
    c) Stakeholder analysis and IT management
    d) Strategic and operational planning
    Answer: b
  6. Corporate governance focuses on:
    a) Internal IT controls exclusively
    b) Ensuring compliance and shareholder value
    c) Day-to-day operations management
    d) IT project approval processes
    Answer: b
  7. Business governance emphasizes:
    a) Historical financial reporting
    b) Proactive strategy and value creation
    c) Reactive compliance management
    d) Vendor management
    Answer: b
  8. Which is NOT a characteristic of good corporate governance?
    a) Sustainable economic development
    b) Sound internal control practices
    c) Disregard for shareholder interests
    d) Transparency and accountability
    Answer: c
    IT Governance
  9. IT governance aligns IT activities with:
    a) Employee goals
    b) Industry benchmarks
    c) Enterprise objectives
    d) Vendor requirements
    Answer: c
  10. A primary goal of IT governance is to:
    a) Reduce IT costs
    b) Increase stakeholder satisfaction
    c) Monitor enterprise IT investments
    d) Define IT-related roles and responsibilities
    Answer: d
  11. Benefits of IT governance include all EXCEPT:
    a) Improved cost performance of IT
    b) Increased user satisfaction
    c) Decentralized decision-making
    d) Enhanced IT transparency
    Answer: c
    Frameworks and Standards
  12. COBIT stands for:
    a) Control Objectives for Information and Related Technology
    b) Comprehensive Oversight of Business and IT
    c) Centralized Objectives for IT Governance
    d) Corporate Oversight and IT Tools
    Answer: a
  13. COBIT primarily helps with:
    a) Designing IT systems
    b) IT service operations
    c) Governance and management of IT
    d) Compliance audits
    Answer: c
  14. ISO 27001 is a standard for:
    a) Financial risk management
    b) Information security management systems
    c) Vendor collaboration
    d) IT project management
    Answer: b
  15. ITIL focuses on:
    a) Aligning IT services with business needs
    b) Risk assessments and audits
    c) Stakeholder exclusion strategies
    d) IT system automation
    Answer: a
    Governance Practices
  16. IT governance requires active participation from:
    a) IT vendors only
    b) Board members and senior management
    c) IT staff exclusively
    d) External auditors
    Answer: b
  17. The IT steering committee ensures:
    a) Compliance with legal standards only
    b) Alignment of IT projects with enterprise goals
    c) Creation of new IT departments
    d) Outsourcing IT functions
    Answer: b
  18. A critical governance practice is:
    a) Delegating decision-making to vendors
    b) Monitoring IT-related decisions and their outcomes
    c) Limiting stakeholder involvement
    d) Ignoring compliance standards
    Answer: b
    Strategic Alignment
  19. Strategic IT planning aims to:
    a) Automate all enterprise processes
    b) Align IT strategy with business objectives
    c) Eliminate manual processes
    d) Increase IT infrastructure costs
    Answer: b
  20. A gap analysis identifies:
    a) Inefficient IT vendors
    b) Misalignment between current and desired states
    c) Budget overruns in IT projects
    d) Redundant IT systems
    Answer: b
  21. The success of IT-business alignment is measured by:
    a) Stakeholder satisfaction and value realization
    b) Reduction in IT staff
    c) Increase in manual workflows
    d) IT infrastructure expansion
    Answer: a
    COBIT Framework
  22. COBIT separates governance and management because:
    a) They require different organizational structures
    b) Governance is a subset of management
    c) Management is only IT-specific
    d) Governance involves operational activities
    Answer: a
  23. COBIT’s “Evaluate, Direct, Monitor” (EDM) domain focuses on:
    a) Operational IT service delivery
    b) Strategic decision-making and monitoring
    c) Vendor compliance
    d) Employee training
    Answer: b
  24. COBIT emphasizes:
    a) IT architecture design
    b) Financial auditing
    c) Enterprise I&T goals alignment
    d) Vendor management tools
    Answer: c
  25. A major component of COBIT includes:
    a) Information flows
    b) Industry-specific compliance mandates
    c) Legacy system reviews
    d) Marketing strategies
    Answer: a
    ITIL Framework
  26. The four ITIL dimensions are:
    a) Processes, platforms, tools, and strategies
    b) Organizations and people, technology, partners, and value streams
    c) Compliance, risk, IT, and operations
    d) Vendors, policies, stakeholders, and finances
    Answer: b
  27. ITIL practices are categorized into:
    a) General, technical, and service management practices
    b) Strategic, operational, and financial practices
    c) Vendor, compliance, and performance practices
    d) IT-only processes
    Answer: a
  28. ITIL’s primary goal is to:
    a) Define IT frameworks
    b) Improve IT service delivery
    c) Automate compliance processes
    d) Eliminate manual processes
    Answer: b
    ISO 27001 Standard
  29. ISO 27001 focuses on:
    a) Governance structure implementation
    b) Defining security policies and controls
    c) Increasing IT infrastructure investments
    d) Automating risk assessments
    Answer: b
  30. A key benefit of ISO 27001 is:
    a) Eliminating all IT risks
    b) Improved trust and credibility with stakeholders
    c) Reduced vendor dependence
    d) Increased focus on IT infrastructure
    Answer: b
    Governance Integration
  31. IT governance integrates with corporate governance by:
    a) Managing IT audits
    b) Aligning IT investments with business strategies
    c) Isolating IT from enterprise strategies
    d) Outsourcing decision-making processes
    Answer: b
  32. GEIT (Governance of Enterprise IT) ensures:
    a) IT processes align with governance goals
    b) IT compliance replaces business goals
    c) IT functions operate independently of governance
    d) Financial audits focus solely on IT assets
    Answer: a
    IT and Business Strategy
  33. Effective IT governance:
    a) Delegates IT decisions to vendors
    b) Ensures IT enhances business value
    c) Eliminates IT staff involvement
    d) Focuses only on cost-cutting measures
    Answer: b
  34. IT strategy planning involves:
    a) Defining IT-specific goals independent of business needs
    b) Aligning IT goals with enterprise strategies
    c) Delegating decisions to middle management
    d) Increasing IT complexity
    Answer: b
    CHAPTER 2
    Governance, Risk, and Compliance (GRC)
  35. What does GRC stand for?
    a) Governance, Regulation, and Compliance
    b) Governance, Risk, and Compliance
    c) General Risk Control
    d) Governance and Regulatory Control
    Answer: b
  36. Which of the following is NOT a component of GRC?
    a) Risk management
    b) Data science
    c) Compliance
    d) Governance
    Answer: b
  37. Governance in GRC refers to:
    a) The process of enforcing internal audits
    b) Setting strategic direction and monitoring outcomes
    c) Mitigating operational risks
    d) Conducting compliance assessments
    Answer: b
    Risk Fundamentals
  38. Assets in risk management are defined as:
    a) Only physical properties
    b) Items with substantial value to the organization
    c) Threat agents targeting the system
    d) Only software and network infrastructure
    Answer: b
  39. The tenets of information security include:
    a) Confidentiality, Integrity, and Accuracy
    b) Availability, Confidentiality, and Integrity
    c) Availability, Integrity, and Accuracy
    d) Reliability, Security, and Scalability
    Answer: b
  40. A vulnerability is:
    a) An inherent risk in operations
    b) A weakness that could be exploited by a threat
    c) A deliberate action causing harm to assets
    d) A system upgrade process
    Answer: b
  41. A threat is defined as:
    a) A weakness in internal controls
    b) An entity or event with the potential to harm assets
    c) The probability of a loss occurring
    d) A compliance failure
    Answer: b
    Risk Classification and Management
  42. What is inherent risk?
    a) Risk after implementing controls
    b) Risk before any control measures are applied
    c) Risk mitigated by compliance measures
    d) Risk assessed by external audits
    Answer: b
  43. Which is NOT a risk mitigation strategy?
    a) Transfer
    b) Tolerate
    c) Terminate
    d) Suspend
    Answer: d
  44. What does residual risk refer to?
    a) Risks that arise after external audits
    b) Risks that remain after applying controls
    c) Risks related to compliance failure
    d) Risks identified during risk classification
    Answer: b
    Malicious Attacks
  45. Which of the following is an example of an active attack?
    a) Eavesdropping
    b) Dictionary password attack
    c) IP spoofing
    d) Both b and c
    Answer: d
  46. A man-in-the-middle attack is characterized by:
    a) Infecting software with a virus
    b) Intercepting and altering communications between two parties
    c) Performing unauthorized access through eavesdropping
    d) Crashing a system through brute force
    Answer: b
  47. Phishing primarily aims to:
    a) Modify software without authorization
    b) Trick victims into providing sensitive personal information
    c) Overload network traffic
    d) Install malware on systems
    Answer: b
    Malicious Software
  48. A worm differs from a virus because:
    a) It replicates without user intervention
    b) It requires a host program to function
    c) It cannot spread across networks
    d) It does not harm the host system
    Answer: a
  49. Spyware is mainly designed to:
    a) Create backups of user data
    b) Gather information without user knowledge
    c) Encrypt user files
    d) Replace system files
    Answer: b
    Compliance
  50. Regulatory compliance refers to:
    a) Adhering to internal company policies
    b) Meeting external laws and industry standards
    c) Avoiding risks entirely
    d) Implementing internal audits
    Answer: b
  51. Non-compliance with regulations can result in:
    a) Loss of data integrity
    b) Financial penalties and reputational damage
    c) Employee attrition
    d) Increased infrastructure costs
    Answer: b
  52. Internal compliance focuses on:
    a) External audits only
    b) Adherence to internal rules and controls
    c) Preventing malicious software attacks
    d) Eliminating external threats
    Answer: b
    Internal Controls
  53. Internal controls are designed to:
    a) Detect only external risks
    b) Ensure operational and financial reporting effectiveness
    c) Remove residual risks entirely
    d) Replace internal audits
    Answer: b
  54. Limitations of internal controls include:
    a) Complete elimination of fraud
    b) Management override of controls
    c) Higher audit complexity
    d) Untraceable compliance errors
    Answer: b
    GRC Tools and Features
  55. GRC tools primarily help organizations to:
    a) Eliminate all risks
    b) Manage policies, assess risks, and streamline compliance
    c) Replace governance frameworks
    d) Automate financial audits only
    Answer: b
  56. Which of the following is NOT a feature of GRC tools?
    a) Risk data management and analytics
    b) Workflow management
    c) Marketing automation
    d) Document and content management
    Answer: c
  57. A dashboard in GRC tools is used for:
    a) Identifying external audit requirements
    b) Monitoring key performance indicators in real-time
    c) Designing new governance frameworks
    d) Encrypting sensitive data
    Answer: b
    Risk Mitigation Strategies
  58. Which strategy involves transferring risk to another party?
    a) Treat
    b) Terminate
    c) Tolerate
    d) Transfer
    Answer: d
  59. Tolerating risk implies:
    a) Ignoring the risk completely
    b) Taking no action while monitoring the risk
    c) Reducing the likelihood of a threat exploiting a vulnerability
    d) Eliminating the threat entirely
    Answer: b
  60. Which risk mitigation strategy focuses on reducing the likelihood or impact of a risk?
    a) Treat
    b) Transfer
    c) Terminate
    d) Tolerate
    Answer: a
    Types of Risks
  61. Compliance risks arise due to:
    a) Natural disasters
    b) Failure to adhere to legal and regulatory requirements
    c) Employee behavior
    d) Vendor partnerships
    Answer: b
  62. Hazard risks include:
    a) Risks with potential positive outcomes
    b) Situations that may cause harm to objectives
    c) Strategic changes affecting the organization
    d) Variability in financial performance
    Answer: b
  63. Opportunity risks are:
    a) Always guaranteed to result in benefits
    b) Risks with potential negative effects only
    c) Risks associated with taking or missing chances for gains
    d) Risks from natural disasters
    Answer: c
    Internal Controls
  64. The primary objective of internal controls is to:
    a) Ensure full compliance with global regulations
    b) Provide reasonable assurance for operational and reporting objectives
    c) Prevent any occurrence of risks
    d) Reduce the need for compliance audits
    Answer: b
  65. Which of the following is a limitation of internal control systems?
    a) They can completely eliminate fraud
    b) Collusion among employees can override controls
    c) They eliminate the need for external audits
    d) They focus only on operational risks
    Answer: b
    Cyber Threats
  66. What is a brute-force password attack?
    a) Using social engineering techniques to guess passwords
    b) Using software to try all possible combinations of a password
    c) Spoofing user credentials
    d) Monitoring network traffic for passwords
    Answer: b
  67. What does IP address spoofing involve?
    a) Modifying software vulnerabilities
    b) Disguising a device to appear as another
    c) Encrypting transmitted data
    d) Blocking unauthorized users
    Answer: b
  68. A passive attack:
    a) Eavesdrops on communications without altering them
    b) Modifies transmitted data maliciously
    c) Disrupts network availability
    d) Steals user credentials actively
    Answer: a
    Malware Categories
  69. A Trojan horse:
    a) Replicates itself across networks without a host
    b) Masquerades as legitimate software while executing malicious code
    c) Encrypts all files on a system
    d) Only disrupts network availability
    Answer: b
  70. A rootkit is primarily used to:
    a) Protect operating systems from malware
    b) Conceal malicious activities from users
    c) Enhance network traffic monitoring
    d) Encrypt stored data
    Answer: b
    Compliance and Regulatory Frameworks
  71. Compliance ensures organizations:
    a) Develop new governance frameworks
    b) Adhere to external laws, regulations, and internal policies
    c) Avoid developing risk mitigation strategies
    d) Focus only on operational efficiency
    Answer: b
  72. Breaking compliance can result in:
    a) Improved efficiency
    b) Legal and reputational consequences
    c) Increased internal audit frequency
    d) Reduced dependency on governance frameworks
    Answer: b
    GRC Framework Benefits
  73. An effective GRC framework helps organizations:
    a) Automate only operational tasks
    b) Align business objectives with risk and compliance requirements
    c) Eliminate all vulnerabilities entirely
    d) Replace external regulations with internal standards
    Answer: b
  74. Key benefits of GRC tools include:
    a) Real-time monitoring and risk analytics
    b) Replacement of all manual processes
    c) Avoidance of compliance reporting
    d) Ignoring regulatory changes
    Answer: a
    Risk Levels and Classification
  75. Current risk refers to:
    a) Risk that is completely eliminated
    b) Risk after applying initial controls
    c) Risk arising from new threats
    d) Risk with no potential impact
    Answer: b
  76. Strategic risks often arise from:
    a) Operational inefficiencies
    b) Changes in macroeconomic or political conditions
    c) Employee fraud
    d) IT infrastructure failure
    Answer: b
  77. Marketplace risks are associated with:
    a) Customer trade or expenditure
    b) Vendor compliance
    c) Mismanagement of internal processes
    d) Leadership risks
    Answer: a
    Countermeasures
  78. The primary function of a firewall is to:
    a) Replace anti-malware software
    b) Regulate traffic between trusted and untrusted networks
    c) Prevent data loss from storage devices
    d) Detect vulnerabilities in software
    Answer: b
  79. Anti-malware software is designed to:
    a) Encrypt all network traffic
    b) Detect and remove malicious software
    c) Monitor user activity for suspicious behavior
    d) Replace compliance measures
    Answer: b
    Final Review
  80. Governance focuses on:
    a) Implementing IT tools
    b) Setting strategic goals and monitoring their achievement
    c) Managing malicious software threats
    d) Increasing employee engagement
    Answer: b
  81. The 4Ts of risk management include all EXCEPT:
    a) Treat
    b) Terminate
    c) Transfer
    d) Trust
    Answer: d
  82. Compliance is considered a:
    a) One-time activity
    b) Continuous process of adhering to standards
    c) Substitute for risk management
    d) Component of IT governance only
    Answer: b
  83. Risk assessment helps organizations:
    a) Eliminate external audits
    b) Identify threats, vulnerabilities, and potential impacts
    c) Avoid operational risks entirely
    d) Focus solely on compliance activities
    Answer: b
  84. Integrated GRC frameworks help by:
    a) Centralizing risk, governance, and compliance functions
    b) Eliminating internal control requirements
    c) Reducing operational complexity
    d) Ignoring emerging regulatory challenges
    Answer: a
    CHAPTER 3
    Introduction to ERM
  85. What is the primary goal of Enterprise Risk Management (ERM)?
    a) Eliminate all risks
    b) Align risk with strategy and objectives
    c) Enhance operational speed
    d) Increase regulatory compliance only
    Answer: b
  86. Which of the following best defines ERM?
    a) A set of static rules for compliance
    b) A dynamic process to identify, assess, and mitigate risks
    c) A technology framework for IT management
    d) A risk avoidance mechanism
    Answer: b
  87. ERM provides reasonable assurance regarding:
    a) Absolute elimination of risks
    b) Achievement of organizational objectives
    c) Maximizing profit in all ventures
    d) Ensuring zero errors in operations
    Answer: b
  88. What does “risk appetite” in ERM refer to?
    a) The extent of risk an enterprise is willing to accept
    b) The risks an enterprise has fully mitigated
    c) The probability of risk occurrence
    d) The organization’s response to crises
    Answer: a
    COSO ERM Framework
  89. The COSO ERM framework consists of how many interrelated components?
    a) 6
    b) 8
    c) 5
    d) 4
    Answer: b
  90. Which of the following is NOT a component of the COSO ERM framework?
    a) Control Environment
    b) Organizational Chart
    c) Event Identification
    d) Risk Response
    Answer: b
  91. The COSO ERM cube includes how many categories of management objectives?
    a) 2
    b) 3
    c) 4
    d) 5
    Answer: c
  92. What does the “Control Environment” component focus on?
    a) Establishing operational benchmarks
    b) Defining the tone and ethical culture of an organization
    c) Ensuring complete elimination of risks
    d) Automating control systems
    Answer: b
    Risk Identification and Assessment
  93. Risk identification includes which of the following activities?
    a) Establishing risk control systems
    b) Identifying events with potential impact on objectives
    c) Monitoring operational efficiency
    d) Reducing risk likelihood
    Answer: b
  94. What are the two bases for assessing risks in ERM?
    a) Financial impact and operational impact
    b) Risk likelihood and risk impact
    c) Organizational culture and resource allocation
    d) Stakeholder expectations and compliance requirements
    Answer: b
  95. Residual risk is defined as:
    a) The risk remaining after controls are implemented
    b) Risks that cannot be identified
    c) Risks outside the scope of ERM
    d) Risks eliminated through compliance programs
    Answer: a
    Risk Response
  96. Which of the following is NOT a risk response strategy?
    a) Avoidance
    b) Acceptance
    c) Suspension
    d) Sharing
    Answer: c
  97. Risk mitigation primarily involves:
    a) Eliminating risk entirely
    b) Reducing the likelihood or impact of risks
    c) Transferring risk responsibility to external parties
    d) Ignoring risks with low likelihood
    Answer: b
  98. Sharing risk often involves:
    a) Delegating risk to middle management
    b) Establishing partnerships with external entities like insurers
    c) Discontinuing high-risk activities
    d) Increasing stakeholder involvement
    Answer: b
    ERM Principles
  99. One principle of governance and culture is:
    a) Developing independent operating units
    b) Defining risk appetite and ethical standards
    c) Avoiding high-risk ventures
    d) Decentralizing risk management
    Answer: b
  100. What does “formulating business objectives” in ERM involve?
    a) Defining objectives that align with strategy and risk appetite
    b) Establishing control environments for risk assessment
    c) Monitoring operational units
    d) Developing new compliance rules
    Answer: a
  101. Portfolio view in ERM helps organizations:
    a) Evaluate individual risks in isolation
    b) View collective risks in relation to objectives
    c) Increase operational independence
    d) Avoid high-risk strategies
    Answer: b
    Performance and Monitoring
  102. What is a key principle under the “Performance” component of ERM?
    a) Implementing rigid compliance rules
    b) Monitoring stakeholder activities
    c) Identifying and prioritizing risks
    d) Reducing all operational controls
    Answer: c
  103. Effective monitoring ensures:
    a) ERM processes remain static
    b) Risks are reviewed periodically and updated as needed
    c) Control activities are applied universally
    d) Compliance with outdated frameworks
    Answer: b
    Strategic Objectives
  104. Strategic objectives in COSO ERM are aligned with:
    a) Operational efficiency goals
    b) The entity’s mission and vision
    c) Risk appetite exclusively
    d) Reporting frameworks
    Answer: b
  105. Which of the following is an example of a reporting objective?
    a) Complying with environmental regulations
    b) Ensuring reliable financial reporting
    c) Streamlining operational workflows
    d) Increasing resource allocation
    Answer: b
    ERM Implementation
  106. What does the PIML framework in ERM stand for?
    a) Plan, Innovate, Measure, Learn
    b) Plan, Implement, Measure, Learn
    c) Prepare, Investigate, Monitor, Lead
    d) Perform, Initiate, Mitigate, Launch
    Answer: b
  107. A key step in the “Plan” phase of PIML is:
    a) Evaluating risk performance
    b) Identifying intended benefits of ERM initiatives
    c) Monitoring stakeholder responses
    d) Establishing compliance frameworks
    Answer: b
    ERM Framework
  108. The COSO ERM framework uses a multidirectional process to:
    a) Focus on external regulatory changes only
    b) Influence and integrate all its components across the organization
    c) Align operational controls with financial statements
    d) Eliminate low-impact risks automatically
    Answer: b
  109. Which COSO ERM component is responsible for aligning risk management with the
    organization’s culture?
    a) Governance and Culture
    b) Risk Response
    c) Information and Communication
    d) Monitoring
    Answer: a
  110. In ERM, risk tolerance refers to:
    a) The broad level of risk an organization accepts
    b) The specific amount of risk acceptable in decision-making
    c) The process of identifying low-priority risks
    d) The likelihood of risk occurrence
    Answer: b
  111. Risk tolerance and risk appetite are:
    a) Independent concepts without overlap
    b) Two sides of the same coin in decision-making
    c) Mutually exclusive strategies in ERM
    d) Focused solely on financial risks
    Answer: b
    Risk and Performance
  112. What is a significant benefit of ERM in minimizing operational surprises?
    a) Eliminating risks from all processes
    b) Identifying potential events and preparing responses
    c) Standardizing global regulations
    d) Avoiding high-risk strategies
    Answer: b
  113. Risk response strategies include which of the following?
    a) Avoidance, reduction, sharing, and acceptance
    b) Reduction, elimination, monitoring, and standardization
    c) Transfer, escalation, review, and response
    d) Suppression, avoidance, review, and compliance
    Answer: a
  114. The component “Monitoring” in the ERM framework is designed to:
    a) Create new risk categories
    b) Ensure the ERM system adapts dynamically to changing conditions
    c) Identify outdated operational risks
    d) Eliminate compliance redundancies
    Answer: b
    COSO ERM Enhancements
  115. The 2017 COSO ERM update emphasizes:
    a) Static strategies for addressing risks
    b) The alignment of risk management with strategy and performance
    c) Reducing the scope of risk evaluation to internal controls
    d) Removing risk appetite considerations
    Answer: b
  116. The COSO ERM “Rainbow Double Helix” highlights:
    a) The role of culture and governance in achieving objectives
    b) A static structure for monitoring risk performance
    c) A linear process for risk response implementation
    d) Exclusively quantitative risk assessments
    Answer: a
    Governance and Culture
  117. Attracting and retaining capable individuals is a principle of which component?
    a) Performance
    b) Governance and Culture
    c) Risk Response
    d) Review and Revision
    Answer: b
  118. A risk-aware culture in an organization focuses on:
    a) Avoiding all potential risks
    b) Developing proactive risk management behaviors
    c) Increasing operational complexity
    d) Shifting risk responsibility to external parties
    Answer: b
    Performance Objectives
  119. The principle of “Develops Portfolio View” in ERM helps organizations:
    a) Focus on specific high-risk activities
    b) Evaluate risk interdependencies and their collective impact
    c) Eliminate unrelated risks
    d) Develop financial reporting frameworks
    Answer: b
  120. Prioritizing risks involves criteria such as:
    a) Recovery time and adaptability
    b) Historical relevance
    c) Elimination of compliance challenges
    d) Redundancy of risk factors
    Answer: a
    Review and Revision
  121. The “Review and Revision” component focuses on:
    a) Static compliance frameworks
    b) Monitoring substantial changes in risk factors
    c) Isolating risk assessment from strategy
    d) Avoiding iterative processes in risk management
    Answer: b
  122. Continuous improvement in ERM aims to:
    a) Develop static strategies for compliance
    b) Increase organizational resilience and adaptability
    c) Replace risk assessments with automation
    d) Focus exclusively on regulatory changes
    Answer: b
    Information, Communication, and Reporting
  123. Effective communication in ERM should flow:
    a) Only from the top down
    b) Across, up, and down the organization
    c) Exclusively through external stakeholders
    d) Between regulatory bodies and top management
    Answer: b
  124. Risk reporting in ERM is intended to:
    a) Increase organizational complexity
    b) Support decision-making and enable effective oversight
    c) Focus only on internal communication channels
    d) Ignore stakeholder inputs
    Answer: b
    Benefits of ERM
  125. ERM increases resource deployment efficiency by:
    a) Reducing all resource-related risks
    b) Prioritizing and aligning resources with objectives
    c) Eliminating low-risk activities
    d) Ignoring emerging risks in resource allocation
    Answer: b
  126. Enhanced enterprise resilience through ERM allows organizations to:
    a) React to changes without evolving
    b) Adapt and thrive in changing conditions
    c) Minimize risks by avoiding innovation
    d) Focus solely on internal risk factors
    Answer: b
    ERM Implementation
  127. A key step in “Implementing” ERM through PIML includes:
    a) Establishing common risk language
    b) Measuring risk performance
    c) Embedding risk-aware culture
    d) Reviewing substantial organizational changes
    Answer: a
  128. The “Measuring” phase of PIML focuses on:
    a) Defining the scope of ERM initiatives
    b) Evaluating control effectiveness and introducing improvements
    c) Identifying external risk benchmarks
    d) Reducing risk occurrence by avoiding innovation
    Answer: b
  129. The “Learning” phase involves:
    a) Establishing initial risk benchmarks
    b) Monitoring risk performance and ensuring compliance
    c) Avoiding unnecessary risk reviews
    d) Focusing on operational controls only
    Answer: b
    Miscellaneous
  130. Which principle under “Performance” involves addressing risks arising from external
    changes?
    a) Assesses Substantial Change
    b) Identifies Risk
    c) Develops Portfolio View
    d) Reviews Risk and Performance
    Answer: b
  131. The COSO framework addresses compliance objectives related to:
    a) Operational goals exclusively
    b) Adhering to laws, regulations, and contracts
    c) Reporting financial inconsistencies
    d) Reducing strategic risks
    Answer: b
  132. Which is NOT a primary benefit of integrating ERM?
    a) Identifying and managing entity-wide risks
    b) Increasing positive outcomes
    c) Eliminating performance variability
    d) Reducing negative surprises
    Answer: c
  133. Governance in ERM includes:
    a) Establishing oversight responsibilities
    b) Automating reporting systems
    c) Avoiding stakeholder inputs
    d) Eliminating ethical considerations
    Answer: a
  134. Effective ERM implementation is characterized by:
    a) Static methodologies
    b) A continuous and iterative process
    c) Isolated compliance activities
    d) Exclusive reliance on internal assessments
    Answer: b
    CHAPTER 4
    Set 1: Principles of Information Security
  135. Which of the following is NOT a component of the CIA triad? A. Confidentiality
    B. Integrity
    C. Scalability
    D. Availability
    Answer: C
  136. What does “Confidentiality” in the CIA triad primarily ensure? A. Authorized users
    have access to accurate data.
    B. Information is free from unauthorized disclosure.
    C. Systems are protected from downtime.
    D. Backup copies of data are available.
    Answer: B
  137. In ISMS, “Integrity” is violated when: A. Data is modified without authorization.
    B. Data becomes inaccessible due to system failure.
    C. Data is encrypted with an outdated algorithm.
    D. Unauthorized users view sensitive information.
    Answer: A
  138. Which principle emphasizes that information should be accessible to authorized users
    when needed? A. Accountability
    B. Scalability
    C. Availability
    D. Confidentiality
    Answer: C
  139. Which of the following is the primary objective of an Information Security Policy? A.
    Increase profitability through IT controls.
    B. Ensure compliance with all global security laws.
    C. Protect organizational assets from security risks.
    D. Maximize IT resource allocation.
    Answer: C
    Set 2: Risk Management
  140. What is the first step in the risk management process? A. Risk mitigation
    B. Risk identification
    C. Risk monitoring
    D. Risk assessment
    Answer: B
  141. When conducting a risk assessment, which factor is considered most critical? A. The
    organization’s market position
    B. The probability and impact of risks
    C. The size of the IT department
    D. The complexity of encryption protocols
    Answer: B
  142. Which tool is most effective for assessing vulnerabilities in an IT system? A.
    Encryption software
    B. Network vulnerability scanners
    C. Audit checklists
    D. Firewall configuration guides
    Answer: B
  143. How should a company prioritize risks identified during a risk assessment? A.
    Alphabetically
    B. By the cost of mitigation
    C. By likelihood and potential impact
    D. By stakeholder preference
    Answer: C
  144. Which of the following is a preventive control in risk management? A. Incident
    logging system
    B. Antivirus software
    C. Regular audits
    D. Business continuity planning
    Answer: B
    Set 3: Compliance and Legal Frameworks
  145. What is the main objective of ISO 27001 certification? A. Guaranteeing zero
    cybersecurity breaches
    B. Demonstrating compliance with global information security standards
    C. Enhancing employee satisfaction
    D. Reducing IT expenditures
    Answer: B
  146. Which of these is NOT a core requirement under GDPR? A. Data encryption for all
    data transfers
    B. Right to data portability for users
    C. Appointment of a Data Protection Officer
    D. Mandatory data breach notification within 72 hours
    Answer: A
  147. The Indian Information Technology Act, 2000, primarily governs: A. IT infrastructure
    taxation
    B. Digital signatures and cybersecurity
    C. Intellectual property rights
    D. Import/export of IT hardware
    Answer: B
  148. Under which law are companies mandated to conduct periodic security awareness
    training? A. SOX Act
    B. GDPR
    C. HIPAA
    D. Both B and C
    Answer: D
  149. Which compliance framework focuses on payment card security? A. GDPR
    B. PCI DSS
    C. ISO 27001
    D. HIPAA
    Answer: B
    Set 4: Incident Management
  150. What is the first step in responding to a security incident? A. Isolate affected systems
    B. Notify stakeholders
    C. Identify the type and scope of the incident
    D. Analyze historical logs
    Answer: C
  151. A Distributed Denial of Service (DDoS) attack affects which aspect of the CIA triad?
    A. Confidentiality
    B. Integrity
    C. Availability
    D. Accountability
    Answer: C
  152. After a ransomware attack, which action should be avoided? A. Paying the ransom
    B. Restoring systems from backup
    C. Conducting a forensic investigation
    D. Informing law enforcement agencies
    Answer: A
  153. Which metric is most relevant in evaluating the success of an incident response plan?
    A. Time to detect and respond
    B. Employee satisfaction
    C. Budget utilization
    D. Number of training sessions conducted
    Answer: A
  154. The primary goal of incident logging is to: A. Identify the attacker’s location.
    B. Establish accountability.
    C. Create an audit trail for investigation.
    D. Inform employees about policy violations.
    Answer: C
    Case Scenario:
    ABC Technologies Pvt. Ltd., a global leader in fintech, provides end-to-end payment
    gateway solutions to over 3000 clients across multiple countries. Due to increasing
    cybersecurity threats, the organization implemented an Information Security Management
    System (ISMS) aligned with ISO 27001 standards.
    The company’s management faced several challenges:
  155. Risk Management: There was no established process for identifying vulnerabilities and
    threats to IT infrastructure.
  156. Compliance: Regulatory audits highlighted weak documentation of security policies.
  157. Training and Awareness: Employees frequently fell prey to phishing attacks.
  158. Incident Response: A ransomware attack crippled their systems for three days, causing
    significant financial losses.
    To address these issues, the company implemented the following measures:
     Information Security Policy: Established a robust policy focusing on Confidentiality,
    Integrity, and Availability.
     Risk Assessment: A third-party firm conducted vulnerability assessments every quarter.
     Training: Mandatory monthly training sessions on phishing awareness and incident
    reporting.
     Business Continuity Plan (BCP): Introduced periodic drills and documented disaster
    recovery plans.
    Despite these initiatives, a recent audit revealed inconsistencies:
     Senior management’s support was limited to initial stages, and follow-ups lacked rigor.
     Some critical systems did not comply with encryption standards.
     Employees often bypassed security protocols, citing productivity concerns.
    Questions
    Question 1:
    What was the most significant deficiency in ABC Technologies’ incident response approach
    before implementing ISMS?
    A. Lack of regulatory audits.
    B. Absence of a documented disaster recovery plan.
    C. Frequent phishing attacks on employees.
    D. Non-compliance with ISO standards.
    Answer: B
    Question 2:
    Which principle of the CIA triad was compromised when employees bypassed security
    protocols?
    A. Confidentiality.
    B. Integrity.
    C. Availability.
    D. Scalability.
    Answer: A
    Question 3:
    If the third-party risk assessment identifies unencrypted sensitive data on a payment gateway,
    which corrective action aligns best with compliance?
    A. Immediate encryption of the sensitive data and related systems.
    B. Dismissing the third-party firm for negligence.
    C. Disabling the payment gateway temporarily.
    D. Conducting an internal compliance survey.
    Answer: A
    Question 4:
    What training priority should ABC Technologies implement to mitigate phishing attacks?
    A. Technical encryption protocols.
    B. Social engineering awareness programs.
    C. Advanced software development methodologies.
    D. Legal consequences of breaches.
    Answer: B
    Question 5:
    Despite implementing the ISMS, ABC Technologies faced inconsistent management follow
    ups. What governance model could strengthen compliance?
    A. Delegating responsibility to mid-level managers.
    B. Establishing a Security Steering Committee with periodic reviews.
    C. Outsourcing all security operations to an external vendor.
    D. Limiting access to only technical staff.
    Answer: B
    CHAPTR 5
    Introduction to BCM
  159. Business Continuity Management (BCM) helps enterprises to:
    a) Eliminate all risks
    b) Manage disruptions and reduce potential losses
    c) Avoid regulatory compliance
    d) Improve branding only
    Answer: b
  160. Which of the following is a key objective of BCM?
    a) Maintain uninterrupted availability of all resources
    b) Develop marketing strategies
    c) Ensure compliance with customer grievances
    d) Focus exclusively on IT infrastructure
    Answer: a
  161. The BCM process includes:
    a) Employee retention strategies
    b) Planning, testing, and continuous improvement
    c) Budget allocation only
    d) Avoidance of all disruptions
    Answer: b
    BCP Policy
  162. What is the primary goal of a Business Continuity Plan (BCP)?
    a) Maximize operational downtime
    b) Minimize losses and reestablish normal business operations
    c) Ensure exclusivity in vendor contracts
    d) Automate all manual processes
    Answer: b
  163. A BCP policy document primarily provides:
    a) Marketing guidelines
    b) A structure for managing disaster recovery and continuity
    c) Methods to eliminate external audits
    d) Automation of all employee tasks
    Answer: b
    BCM Advantages
  164. One advantage of BCM is:
    a) Eliminating employee dependencies
    b) Proactive threat assessment and containment
    c) Reducing business obligations
    d) Avoiding all external audits
    Answer: b
  165. Regular testing and training in BCM help organizations:
    a) Increase operational redundancies
    b) Strengthen response and recovery mechanisms
    c) Focus solely on technological solutions
    d) Avoid budget planning
    Answer: b
    Types of Plans
  166. What does the Emergency Plan address?
    a) Routine operational tasks
    b) Immediate actions during a disaster
    c) Long-term business strategies
    d) Marketing failures
    Answer: b
  167. Which plan focuses on resuming full information system capabilities after a disaster?
    a) Recovery Plan
    b) Test Plan
    c) Emergency Plan
    d) Backup Plan
    Answer: a
  168. A Test Plan is designed to:
    a) Replace recovery plans
    b) Identify deficiencies in BCM procedures
    c) Develop marketing strategies
    d) Eliminate manual operations
    Answer: b
    Types of Backups
  169. Which backup captures all files on the disk, regardless of changes?
    a) Incremental Backup
    b) Full Backup
    c) Differential Backup
    d) Mirror Backup
    Answer: b
  170. Incremental backups:
    a) Capture all files every time
    b) Backup only changes since the last backup
    c) Focus on manual processes
    d) Require the most storage space
    Answer: b
  171. Differential backups store:
    a) Files changed since the last incremental backup
    b) All files, regardless of changes
    c) Changes since the last full backup
    d) A mirror image of the source
    Answer: c
  172. Mirror backups differ from full backups because:
    a) They do not compress files
    b) They include old and obsolete files
    c) They are always encrypted
    d) They backup only new files
    Answer: a
    BCP Development Phases
  173. What is the first phase in developing a BCP?
    a) Risk Assessment
    b) Pre-Planning Activities
    c) Business Impact Analysis
    d) Plan Development
    Answer: b
  174. The purpose of a Business Impact Analysis (BIA) is to:
    a) Automate backup procedures
    b) Assess the impact of disruptions on business functions
    c) Monitor external compliance
    d) Develop marketing strategies
    Answer: b
    BCM Process and Cycle
  175. What is the first stage of the BCM cycle?
    a) BCM Strategies
    b) Information Collection
    c) Training and Awareness
    d) Testing and Maintenance
    Answer: b
  176. The BCM cycle emphasizes:
    a) Training programs exclusively
    b) Continuous improvement and adaptation
    c) Avoiding external audits
    d) Cost-cutting measures
    Answer: b
  177. Testing and maintenance of a BCP ensure:
    a) Plans are up-to-date and effective
    b) Elimination of all manual processes
    c) Increased marketing budgets
    d) Compliance with customer feedback
    Answer: a
    Incident Management Plan (IMP)
  178. The Incident Management Plan focuses on:
    a) Managing long-term strategies
    b) Initial response to crises
    c) Automating backup processes
    d) Developing marketing campaigns
    Answer: b
  179. A key feature of an IMP is:
    a) Flexibility and relevance
    b) Exclusivity in vendor agreements
    c) Automation of manual tasks
    d) Elimination of risks entirely
    Answer: a
    Backup Facilities
  180. A cold site:
    a) Includes all hardware and operational facilities
    b) Contains minimal facilities for recovery
    c) Automates all recovery processes
    d) Includes all applications and data
    Answer: b
  181. A warm site:
    a) Provides an intermediate level of backup facilities
    b) Contains no hardware
    c) Focuses solely on customer satisfaction
    d) Automates marketing strategies
    Answer: a
  182. Reciprocal agreements involve:
    a) Contracts with insurance companies
    b) Mutual backup support between organizations
    c) Elimination of BCM requirements
    d) Vendor-specific automation
    Answer: b
    Disaster Recovery Procedural Plan
  183. Emergency procedures in a disaster recovery plan involve:
    a) Defining marketing goals
    b) Immediate actions after a disaster
    c) Long-term business strategies
    d) Training customer support teams
    Answer: b
  184. Maintenance schedules in recovery planning:
    a) Eliminate manual testing requirements
    b) Outline ongoing testing and updates
    c) Focus exclusively on IT compliance
    d) Avoid changes to operational strategies
    Answer: b
    Training and Awareness
  185. BCM training promotes:
    a) Awareness of BCM roles and responsibilities
    b) Focus on external audits exclusively
    c) Elimination of operational redundancies
    d) Exclusive reliance on IT systems
    Answer: a
  186. A BCM-aware culture is supported by:
    a) Marketing campaigns
    b) Leadership, training, and accountability
    c) Outsourcing BCM entirely
    d) Focusing solely on customer experience
    Answer: b
    BCM Documentation and Maintenance
  187. The BCM documentation process ensures:
    a) Adherence to document control and record management processes
    b) Focus on eliminating redundancies exclusively
    c) Automating compliance with no updates required
    d) Avoidance of all manual tasks
    Answer: a
  188. BCM maintenance requires organizations to:
    a) Establish regular reviews of plans and ensure updates after major changes
    b) Focus only on external compliance standards
    c) Avoid maintaining outdated records
    d) Eliminate backup requirements entirely
    Answer: a
  189. Records retained in BCM must:
    a) Include only critical disruptions
    b) Be kept for at least one year or per regulatory requirements
    c) Be automated with no manual interventions
    d) Include only operational data
    Answer: b
    Types of Backups
  190. Full backups:
    a) Capture only changed files
    b) Require significant storage space compared to other backup types
    c) Are faster than incremental backups
    d) Automatically delete old files
    Answer: b
  191. Incremental backups:
    a) Are slower than full backups
    b) Include only files changed since the last backup of any type
    c) Require the most storage space
    d) Avoid reliance on previous backups
    Answer: b
  192. Differential backups require:
    a) The last full backup and the most recent differential backup for recovery
    b) All incremental backups for restoration
    c) The least amount of storage compared to incremental backups
    d) No full backups for recovery
    Answer: a
  193. Mirror backups:
    a) Compress files for additional storage
    b) Keep an exact replica of the source
    c) Include multiple versions of old files
    d) Focus only on cloud-based storage
    Answer: b
  194. Cloud backups offer:
    a) Dependence on local storage
    b) Scalability and redundancy
    c) The least amount of security for critical data
    d) Exclusivity for smaller organizations
    Answer: b
    Alternate Processing Facilities
  195. A hot site is:
    a) A backup facility with all operational capabilities ready
    b) A facility with minimal resources for recovery
    c) A temporary storage facility
    d) Dependent entirely on external organizations
    Answer: a
  196. Reciprocal agreements for backup are:
    a) Difficult to enforce due to informal nature
    b) The most reliable backup solution
    c) Exclusively used by small organizations
    d) Focused on eliminating cold site requirements
    Answer: a
  197. The main difference between a warm site and a hot site is:
    a) A warm site includes all critical hardware and software
    b) A hot site is fully operational while a warm site provides limited functionality
    c) Warm sites are slower to set up than cold sites
    d) Warm sites require no additional agreements
    Answer: b
    Disaster Recovery Plan
  198. The disaster recovery plan must include:
    a) Maintenance schedules and contingency plan documents
    b) Marketing budgets for incident response
    c) Exclusive reliance on IT recovery
    d) Redundancies in employee roles only
    Answer: a
  199. Fallback procedures in a disaster recovery plan ensure:
    a) Essential services continue at an alternate location
    b) Exclusive recovery of hardware
    c) Avoidance of manual intervention
    d) Immediate restoration of all operations
    Answer: a
  200. Awareness activities in a disaster recovery plan focus on:
    a) Training personnel and ensuring readiness
    b) Reducing marketing efforts
    c) Avoiding manual updates to documentation
    d) Establishing marketing campaigns
    Answer: a
    BCM Testing
  201. A BCP test plan helps organizations:
    a) Validate recovery procedures and identify deficiencies
    b) Eliminate all potential risks
    c) Avoid reliance on backup systems
    d) Automate disaster recovery without testing
    Answer: a
  202. Regular testing of BCM ensures:
    a) Plans are current and meet organizational requirements
    b) Resources are always automated
    c) No changes to documentation are needed
    d) External audits are unnecessary
    Answer: a
  203. Which of the following is NOT a purpose of testing BCM plans?
    a) Evaluate recovery strategies
    b) Highlight assumptions that need review
    c) Eliminate all operational redundancies
    d) Practice incident recovery steps
    Answer: c
    BCM Training and Awareness
  204. BCM training should:
    a) Focus only on senior management
    b) Develop awareness and confidence in stakeholders
    c) Avoid operational level staff involvement
    d) Exclusively train IT professionals
    Answer: b
  205. Effective training programs for BCM lead to:
    a) Increased resilience over time
    b) Dependence on automated systems
    c) Avoidance of incident response exercises
    d) Elimination of organizational reviews
    Answer: a
    General BCM Knowledge
  206. The BIA helps organizations:
    a) Identify critical processes and assess potential disruptions
    b) Avoid documenting contingency plans
    c) Develop marketing frameworks
    d) Focus exclusively on IT risks
    Answer: a
  207. BCM strategies should include:
    a) Proactive measures to reduce incident impact
    b) Immediate elimination of manual systems
    c) Focus solely on cloud backups
    d) Reduction in organizational compliance
    Answer: a
  208. The overall goal of BCM is to:
    a) Protect brand value and reputation through proactive risk management
    b) Focus only on disaster recovery
    c) Eliminate risks through backup systems
    d) Avoid reliance on compliance frameworks
    Answer: a
    CHAPTER 6
    Introduction to SDLC
  209. The main purpose of the System Development Life Cycle (SDLC) is:
    a) To eliminate manual systems
    b) To provide a structured framework for developing or modifying systems
    c) To focus on IT compliance only
    d) To minimize documentation
    Answer: b
  210. SDLC phases are essential for:
    a) Managing business processes
    b) Defining phases and ensuring deliverables for system development
    c) Automating software testing
    d) Avoiding project documentation
    Answer: b
  211. What is a significant characteristic of SDLC?
    a) Lack of documentation
    b) Iterative process with clear deliverables at every stage
    c) Eliminating user input
    d) Exclusive focus on hardware systems
    Answer: b
  212. Barry Boehm’s W5HH principle includes which of the following questions?
    a) Why is the system being developed?
    b) What will be done?
    c) How will it be done?
    d) All of the above
    Answer: d
    Need for SDLC
  213. A new system may be developed if:
    a) Strategic management changes focus
    b) Existing technology becomes obsolete
    c) Competitors enhance service quality using automation
    d) All of the above
    Answer: d
  214. What is a primary advantage of using SDLC?
    a) Reduced planning and control efforts
    b) Better compliance with prescribed standards
    c) Elimination of documentation requirements
    d) Increased project flexibility without milestones
    Answer: b
  215. Which of the following is a potential limitation of SDLC?
    a) It is not suitable for small projects
    b) It emphasizes milestones and documentation
    c) It may involve prolonged project timelines
    d) All of the above
    Answer: d
    Phases of SDLC
  216. Which is the first phase of SDLC?
    a) System Development
    b) Preliminary Investigation
    c) Post-Implementation Review
    d) System Testing
    Answer: b
  217. The deliverable of the Preliminary Investigation phase is:
    a) System architecture design
    b) Feasibility study report
    c) User manuals
    d) Source code
    Answer: b
  218. System Requirement Analysis focuses on:
    a) Documenting user needs and analyzing the current system
    b) Designing database structures
    c) Writing program code
    d) Installing hardware
    Answer: a
  219. System Design phase includes:
    a) Logical and physical design of the system
    b) Debugging code
    c) Analyzing input/output
    d) System implementation
    Answer: a
  220. The purpose of System Development is to:
    a) Install hardware and network devices
    b) Convert design specifications into a functional system
    c) Train users on system functionality
    d) Conduct maintenance
    Answer: b
    Feasibility Study
  221. Economic feasibility assesses:
    a) The legal implications of the new system
    b) Return on investment and cost-benefit analysis
    c) Compatibility with existing systems
    d) Availability of technical resources
    Answer: b
  222. Which feasibility study evaluates whether the solution adheres to legal regulations?
    a) Operational feasibility
    b) Legal feasibility
    c) Financial feasibility
    d) Political feasibility
    Answer: b
    Testing Phases
  223. Unit testing focuses on:
    a) The entire system as a whole
    b) Individual components or functions of the software
    c) End-user requirements
    d) Integration of subsystems
    Answer: b
  224. Regression testing ensures:
    a) All modules are unit-tested
    b) Changes or corrections do not introduce new errors
    c) The system performs under expected load conditions
    d) Security of the system remains intact
    Answer: b
  225. The final testing phase before system implementation is:
    a) Unit testing
    b) Integration testing
    c) User Acceptance Testing (UAT)
    d) Performance testing
    Answer: c
    Implementation Phase
  226. System implementation involves:
    a) Conducting a feasibility study
    b) Deploying the system into the operational environment
    c) Debugging and writing new code
    d) Performing post-implementation reviews
    Answer: b
  227. Which is a method of system changeover?
    a) Direct implementation
    b) Parallel implementation
    c) Pilot implementation
    d) All of the above
    Answer: d
  228. What is a key risk of direct implementation?
    a) High costs
    b) Limited user training
    c) Complete dependency on the new system immediately
    d) Prolonged changeover duration
    Answer: c
    Post-Implementation Review
  229. Post-implementation reviews evaluate:
    a) Development costs only
    b) Whether the system meets business objectives
    c) The feasibility of the original design
    d) The user training process
    Answer: b
  230. A major activity during post-implementation is:
    a) Conducting UAT
    b) Reviewing system maintenance needs
    c) Debugging system modules
    d) Developing system specifications
    Answer: b
    Maintenance Phase
  231. Corrective maintenance refers to:
    a) Fixing defects and bugs found during execution
    b) Adding new features to the system
    c) Adapting software to new environments
    d) Updating documentation
    Answer: a
  232. Adaptive maintenance involves:
    a) Modifying systems for changes in external environments
    b) Fixing code errors
    c) Enhancing user experience
    d) None of the above
    Answer: a
  233. Preventive maintenance aims to:
    a) Improve system performance proactively
    b) Fix errors after they occur
    c) Adapt software for future hardware upgrades
    d) Eliminate redundancy in coding
    Answer: a
    General Knowledge
  234. An SRS document is created during:
    a) Preliminary Investigation
    b) System Requirement Analysis
    c) System Testing
    d) Implementation
    Answer: b
  235. The primary benefit of using SDLC is:
    a) Faster project completion without documentation
    b) Streamlined process ensuring high-quality system development
    c) Elimination of project timelines
    d) Avoidance of resource allocation
    Answer: b
    Design Phase
  236. The logical design of a system focuses on:
    a) The physical implementation of hardware
    b) The structure and relationships between system components
    c) Coding standards for the software
    d) Integration of modules
    Answer: b
  237. A blueprint for system design includes:
    a) Software code implementation
    b) Specifications for hardware, software, data, and user interfaces
    c) Training schedules for users
    d) Maintenance schedules
    Answer: b
  238. User interface design considerations include:
    a) Database indexing methods
    b) The layout of screens, reports, and input/output devices
    c) Data backup frequency
    d) Hardware compatibility
    Answer: b
    Development and Testing
  239. The primary purpose of coding standards is to:
    a) Eliminate the need for testing
    b) Ensure uniformity and simplify future maintenance
    c) Avoid project documentation
    d) Automate program debugging
    Answer: b
  240. Debugging involves:
    a) Testing user interfaces
    b) Fixing errors in source code identified during compilation
    c) Analyzing system design diagrams
    d) Deploying software into production
    Answer: b
  241. Which of the following is a feature of a well-coded application?
    a) Complexity and extensive user training
    b) Robustness, usability, and efficiency
    c) Exclusivity to a single programming language
    d) Lack of documentation requirements
    Answer: b
  242. Program documentation ensures:
    a) Automated system upgrades
    b) Clear understanding of software functions and usage by users
    c) Faster project completion timelines
    d) Elimination of testing phases
    Answer: b
    Testing Techniques
  243. Integration testing validates:
    a) Individual modules independently
    b) Communication and interaction between multiple modules
    c) The end-user experience
    d) The feasibility of the new system
    Answer: b
  244. System testing involves:
    a) Assessing system behavior under production conditions
    b) Isolating and testing individual code units
    c) Testing only the hardware components
    d) Avoiding regression issues in the system
    Answer: a
  245. What is the primary focus of Quality Assurance Testing (QAT)?
    a) Identifying design improvements
    b) Ensuring that quality standards are met
    c) Validating database structures
    d) Testing hardware specifications
    Answer: b
    Implementation Phase
  246. System changeover strategies include all EXCEPT:
    a) Phased changeover
    b) Pilot changeover
    c) Incremental changeover
    d) Parallel changeover
    Answer: c
  247. Pilot implementation involves:
    a) Replacing the old system at once
    b) Testing the new system in a smaller environment before full-scale implementation
    c) Running the old and new systems simultaneously
    d) Avoiding user training
    Answer: b
  248. Parallel changeover is considered secure because:
    a) The old system is decommissioned immediately
    b) Both old and new systems run together, ensuring data integrity
    c) It requires minimal user training
    d) It eliminates operational downtime
    Answer: b
    Post-Implementation and Maintenance
  249. Post-implementation review evaluates:
    a) User satisfaction and system effectiveness
    b) Code debugging efficiency
    c) Hardware testing results
    d) Database maintenance schedules
    Answer: a
  250. Perfective maintenance involves:
    a) Fixing system bugs
    b) Enhancing the system to meet new user requirements
    c) Adapting to external environmental changes
    d) Preventing risks through scheduled updates
    Answer: b
  251. Which maintenance type deals with unanticipated malfunctions?
    a) Preventive maintenance
    b) Rescue maintenance
    c) Adaptive maintenance
    d) Corrective maintenance
    Answer: b
    Documentation and Standards
  252. An SRS document includes:
    a) System architecture designs
    b) Functional descriptions, validation criteria, and user expectations
    c) Post-implementation review guidelines
    d) Maintenance schedules
    Answer: b
  253. A well-documented SRS ensures:
    a) Elimination of post-implementation reviews
    b) Clear understanding between the development team and users
    c) Faster debugging processes
    d) Simplified hardware testing
    Answer: b
    General Knowledge
  254. The main goal of regression testing is to:
    a) Ensure that new changes have not broken existing functionality
    b) Test user satisfaction with the interface
    c) Identify hardware compatibility issues
    d) Validate compliance with regulatory standards
    Answer: a
  255. SDLC ensures system quality through:
    a) Structured, well-defined development processes
    b) Elimination of feasibility studies
    c) Minimizing project timelines by skipping documentation
    d) Exclusive focus on technical feasibility
    Answer: a
  256. A phased implementation strategy is useful for:
    a) Gradually transitioning users to the new system
    b) Eliminating manual processes immediately
    c) Reducing the need for testing
    d) Avoiding parallel system operation
    Answer: a
  257. System testing is performed to:
    a) Validate the complete integration and functionality of the system
    b) Identify potential user interface issues
    c) Automate project documentation
    d) Replace regression testing
    Answer: a
  258. The SDLC ensures:
    a) High-quality systems that meet user expectations
    b) Automated testing throughout the project
    c) Elimination of operational reviews
    d) Avoidance of stakeholder involvement
    Answer: a
    CHAPTER 7
    Topic 1: Introduction to Information Systems
  259. Which of the following is a component of an Information System?
    (a) Hardware
    (b) Software
    (c) People
    (d) All of the above
    Answer: (d)
  260. What does the feedback component in an Information System do?
    (a) Collect data
    (b) Modify input or processing activities
    (c) Store information
    (d) Disseminate data
    Answer: (b)
  261. What is the primary need for Information Systems in organizations?
    (a) To replace manual work
    (b) To improve customer satisfaction and profits
    (c) To ensure complete automation
    (d) To reduce employee costs
    Answer: (b)
    Topic 2: Information System Acquisition
  262. What is the purpose of acquisition standards in system acquisition?
    (a) To speed up the process
    (b) To address security and reliability issues
    (c) To minimize costs
    (d) To hire a specific vendor
    Answer: (b)
  263. Which of the following is NOT part of acquisition standards?
    (a) Ensuring vendor reviews
    (b) Soliciting bids from vendors
    (c) Selecting programming techniques
    (d) Ensuring compatibility with existing systems
    Answer: (c)
  264. What is the primary purpose of a Request for Proposal (RFP)?
    (a) To evaluate user feedback
    (b) To solicit bids from vendors for requirements
    (c) To select a project manager
    (d) To approve project designs
    Answer: (b)
  265. Which of the following is part of the vendor selection process?
    (a) Benchmarking the problem
    (b) Evaluating user feedback
    (c) Technical validation of proposals
    (d) All of the above
    Answer: (d)
    Topic 3: System Development Methodologies
  266. Which development model is most suitable for a small and simple project?
    (a) Agile
    (b) Spiral
    (c) Waterfall
    (d) RAD
    Answer: (c)
  267. What is the key objective of the RAD model?
    (a) Cost efficiency
    (b) High-quality system development
    (c) Fast development and delivery
    (d) Risk minimization
    Answer: (c)
  268. Which system development methodology is based on iterative and incremental
    development?
    (a) Agile
    (b) Waterfall
    (c) Spiral
    (d) RAD
    Answer: (a)
    Topic 4: Waterfall Model
  269. Which of the following is NOT a characteristic of the Waterfall Model?
    (a) Sequential phases
    (b) Focus on iterative design
    (c) Extensive documentation
    (d) User approval before next phase
    Answer: (b)
  270. What is a major weakness of the Waterfall Model?
    (a) Too flexible
    (b) Encourages user participation
    (c) Little room for iteration
    (d) Lack of documentation
    Answer: (c)
    Topic 5: Prototyping Model
  271. The goal of prototyping is to:
    (a) Create a detailed and final system early
    (b) Develop a usable prototype to refine requirements
    (c) Minimize user involvement
    (d) Create extensive documentation
    Answer: (b)
  272. What is a major advantage of prototyping?
    (a) Encourages innovation
    (b) Reduces system testing
    (c) Eliminates the need for user feedback
    (d) Fully replaces the need for traditional methodologies
    Answer: (a)
    Topic 6: Incremental Model
  273. The incremental model:
    (a) Combines iterative and linear approaches
    (b) Avoids delivering partial systems
    (c) Has no user involvement
    (d) Is identical to the Waterfall Model
    Answer: (a)
  274. Which of the following is a strength of the incremental model?
    (a) Lack of clear milestones
    (b) Early delivery of partial solutions
    (c) No requirement for written documentation
    (d) No integration risks
    Answer: (b)
    Topic 7: Spiral Model
  275. What does the Spiral Model primarily focus on?
    (a) Risk analysis and iterative development
    (b) Rapid prototyping
    (c) Linear progress
    (d) Minimal documentation
    Answer: (a)
  276. The Spiral Model is best suited for:
    (a) Simple projects
    (b) Highly complex and risky projects
    (c) Projects with minimal user interaction
    (d) Cost-saving initiatives
    Answer: (b)
    Topic 8: RAD Model
  277. RAD emphasizes on:
    (a) Extensive pre-planning
    (b) Quick delivery and prototyping
    (c) Eliminating user involvement
    (d) Document-heavy processes
    Answer: (b)
  278. What is a disadvantage of RAD?
    (a) Quick reviews are impossible
    (b) Minimal customer feedback
    (c) Potential for inconsistent design
    (d) High development costs
    Answer: (c)
    CHAPTER 8
    1.What are the main objectives of Information System (IS) controls?
    a) Safeguarding assets, maintaining data integrity, ensuring resource efficiency
    b) Increasing operational expenses, reducing control measures, and boosting revenue
    c) Enhancing customer relationships, developing new software, reducing manual labor
    d) Training employees, outsourcing services, and increasing system complexity
    Answer: a) Safeguarding assets, maintaining data integrity, ensuring resource efficiency
  279. Which of the following is NOT a characteristic of Preventive Controls?
    a) Proactive in nature
    b) Cost-effective compared to detection and correction
    c) Reactively addressing errors after occurrence
    d) Requires understanding vulnerabilities and probable threats
    Answer: c) Reactively addressing errors after occurrence
  280. What does the term “Logical Access Controls” refer to?
    a) Controlling physical access to computers
    b) Managing environmental risks like fire and water damage
    c) Restricting use of information to authorized individuals or entities
    d) Planning emergency evacuation strategies
    Answer: c) Restricting use of information to authorized individuals or entities
  281. What kind of controls are smoke detectors and fire extinguishers classified as?
    a) Detective Controls
    b) Directive Controls
    c) Environmental Controls
    d) Logical Access Controls
    Answer: c) Environmental Controls
  282. Which type of control is responsible for ensuring compliance with organizational policies
    and legislation?
    a) Preventive Controls
    b) Detective Controls
    c) Corrective Controls
    d) Directive Controls
    Answer: d) Directive Controls
  283. Which approach is emphasized for efficient database management in an IT environment?
    a) Decentralized database planning and control
    b) Ignoring user input for database updates
    c) Ensuring data availability, integrity, and modifiability
    d) Eliminating database administrator roles
    Answer: c) Ensuring data availability, integrity, and modifiability
  284. What is the key feature of Disaster Recovery Planning (DRP)?
    a) Preventing minor operational losses
    b) Recovering operations after catastrophic events
    c) Developing new system software
    d) Designing application software interfaces
    Answer: b) Recovering operations after catastrophic events
  285. Which of these is an example of Detective Control?
    a) Firewalls
    b) Regular budget reviews
    c) Staff training programs
    d) Intrusion prevention systems
    Answer: b) Regular budget reviews
  286. What is a common characteristic of Directive Controls?
    a) They are reactive and minimize threats after incidents occur.
    b) They are the first response to risk and ensure compliance.
    c) They are costlier than corrective controls.
    d) They replace preventive and detective controls.
    Answer: b) They are the first response to risk and ensure compliance.
  287. What is the primary role of Top Management Controls?
    a) Implementing system utilities
    b) Determining organizational goals and ensuring IS compliance
    c) Conducting employee training programs
    d) Preparing technical support manuals
    Answer: b) Determining organizational goals and ensuring IS compliance
  288. Which of the following is NOT a component of environmental controls?
    a) Smoke detectors
    b) Access tokens
    c) Uninterrupted Power Supply (UPS)
    d) Fire extinguishers
    Answer: b) Access tokens
  289. What is the primary purpose of Detective Controls?
    a) Preventing errors before they occur
    b) Correcting errors after they are detected
    c) Reporting errors or incidents after they occur
    d) Directing employees to follow compliance procedures
    Answer: c) Reporting errors or incidents after they occur
  290. What is the focus of Programming Management Controls?
    a) Managing data repositories
    b) Ensuring high-quality programs are developed and implemented
    c) Setting up disaster recovery plans
    d) Reviewing vendor contracts
    Answer: b) Ensuring high-quality programs are developed and implemented
  291. Which of the following are examples of Logical Access Controls?
    a) Password protection, encryption, and firewalls
    b) Fire alarms, CCTV, and physical locks
    c) Smoke detectors, air conditioning, and surge protectors
    d) Emergency evacuation plans and manual logging
    Answer: a) Password protection, encryption, and firewalls
  292. What is the main goal of Security Management Controls?
    a) Reducing operational costs in IT systems
    b) Ensuring information system assets are secure and recoverable
    c) Identifying training needs for employees
    d) Designing new IT policies for future upgrades
    Answer: b) Ensuring information system assets are secure and recoverable
  293. What does the term “Directive Controls” imply in information systems?
    a) Controls that correct errors after incidents
    b) Controls that provide formal directions to mitigate risks
    c) Controls that detect unauthorized system activities
    d) Controls that safeguard physical resources only
    Answer: b) Controls that provide formal directions to mitigate risks
  294. Which control prevents unauthorized users from accessing sensitive areas like server
    rooms?
    a) Logical Access Controls
    b) Directive Controls
    c) Physical Access Controls
    d) Detective Controls
    Answer: c) Physical Access Controls
  295. What does a Disaster Recovery Plan (DRP) primarily address?
    a) Enhancing employee productivity during crises
    b) Recovering and restoring critical operations after disruptions
    c) Monitoring performance of outsourced operations
    d) Conducting regular internal audits of IT systems
    Answer: b) Recovering and restoring critical operations after disruptions
  296. What is the role of “Concurrency Controls” in database management?
    a) Ensuring simultaneous access does not compromise data integrity
    b) Managing employee performance during multitasking
    c) Restricting unauthorized software installations
    d) Detecting network intrusions in real-time
    Answer: a) Ensuring simultaneous access does not compromise data integrity
  297. Which of these is a key element of Operations Management Controls?
    a) Developing software applications
    b) Managing day-to-day operations of hardware and software
    c) Conducting employee quality assurance training
    d) Analyzing future IT system requirements
    Answer: b) Managing day-to-day operations of hardware and software
  298. What is the primary purpose of a Quality Assurance Management Control system?
    a) To train employees in cybersecurity protocols
    b) To ensure information systems meet established quality goals and standards
    c) To eliminate preventive and detective controls
    d) To conduct cost-benefit analysis of IT systems
    Answer: b) To ensure information systems meet established quality goals and standards
  299. Which of the following is an example of Corrective Control?
    a) Using firewalls to prevent unauthorized access
    b) Removing unauthorized users after a security breach
    c) Monitoring logs for suspicious activities
    d) Encrypting data for secure transmission
    Answer: b) Removing unauthorized users after a security breach
  300. What is the function of “Access Control Lists” (ACLs) in operating systems?
    a) Managing access rights for files and directories
    b) Limiting the duration of system uptime
    c) Securing physical access to servers
    d) Automating routine system updates
    Answer: a) Managing access rights for files and directories
  301. What is the first line of defense in terminal login procedures?
    a) Password authentication
    b) Logging physical visitor entries
    c) Using biometric access
    d) Encrypting user data
    Answer: a) Password authentication
  302. Which of these is a characteristic of Preventive Controls?
    a) Reactive to threats
    b) Designed to avoid errors and incidents proactively
    c) Focused on analyzing errors post-occurrence
    d) Implemented only in manual environments
    Answer: b) Designed to avoid errors and incidents proactively
  303. What is a key feature of Directive Controls?
    a) They eliminate errors entirely.
    b) They provide guidelines to employees to mitigate risks.
    c) They primarily detect unlawful activities.
    d) They are reactive in addressing threats.
    Answer: b) They provide guidelines to employees to mitigate risks.
  304. What are examples of Physical Access Controls?
    a) Firewalls and antivirus software
    b) Cipher locks, video cameras, and visitor logging
    c) Cloud backup systems and data encryption
    d) Network traffic monitoring and alert systems
    Answer: b) Cipher locks, video cameras, and visitor logging
  305. What does “Logical Access Control” ensure?
    a) That users are logged off after inactivity
    b) That IT systems meet operational quality standards
    c) That financial audits are conducted quarterly
    d) That fire protection systems are operational
    Answer: a) That users are logged off after inactivity
  306. Which of the following is an environmental control for preventing electrical exposure?
    a) Fire alarms and extinguishers
    b) Voltage regulators and surge protectors
    c) Cipher locks and video cameras
    d) Manual logging of visitor entries
    Answer: b) Voltage regulators and surge protectors
  307. What is the focus of Systems Development Management Controls?
    a) Managing hardware and software upgrades
    b) Overseeing daily IT operations
    c) Analyzing, designing, and maintaining information systems
    d) Conducting fraud investigations
    Answer: c) Analyzing, designing, and maintaining information systems
  308. What does a “Call Back Device” in network access control do?
    a) Encrypts network data automatically
    b) Monitors all user activities on the network
    c) Disconnects unauthorized access and reconnects to authorized numbers
    d) Provides detailed network traffic reports
    Answer: c) Disconnects unauthorized access and reconnects to authorized numbers
  309. Which is an example of Detective Control?
    a) Firewall installation
    b) Intrusion detection system (IDS)
    c) Network encryption
    d) Strong password policy
    Answer: b) Intrusion detection system (IDS)
  310. What is the purpose of terminal timeouts?
    a) To allow remote access
    b) To log off inactive users automatically
    c) To increase the efficiency of system resources
    d) To maintain continuous session activity
    Answer: b) To log off inactive users automatically
  311. Which control type minimizes the impact of a threat after it has occurred?
    a) Preventive Control
    b) Corrective Control
    c) Detective Control
    d) Directive Control
    Answer: b) Corrective Control
  312. What is the significance of firewalls in IT systems?
    a) Preventing physical intrusions
    b) Ensuring access control between networks
    c) Managing data repositories
    d) Detecting unauthorized physical access
    Answer: b) Ensuring access control between networks
  313. What is a primary feature of a Disaster Recovery Plan (DRP)?
    a) Reducing operational costs during system upgrades
    b) Providing a backup plan for critical system recovery
    c) Monitoring staff performance in emergencies
    d) Designing new hardware for recovery
    Answer: b) Providing a backup plan for critical system recovery
  314. What are “Concurrency Controls” designed to address in databases?
    a) Errors in manual data entry
    b) Simultaneous access issues affecting data integrity
    c) Unauthorized access to physical locations
    d) Overloading of network systems
    Answer: b) Simultaneous access issues affecting data integrity
  315. Which of the following is an example of Directive Control?
    a) Installing antivirus software
    b) Establishing Standard Operating Procedures (SOPs)
    c) Monitoring suspicious activities in logs
    d) Scheduling automatic data backups
    Answer: b) Establishing Standard Operating Procedures (SOPs)
  316. What is the key objective of Physical Access Controls?
    a) Preventing logical attacks
    b) Ensuring secure access to tangible and intangible resources
    c) Enhancing user interface designs
    d) Monitoring software system logs
    Answer: b) Ensuring secure access to tangible and intangible resources
  317. Which process ensures accurate time synchronization across an enterprise network?
    a) Network encryption
    b) Clock synchronization
    c) Terminal timeout
    d) Role-based access control
    Answer: b) Clock synchronization
  318. What is the primary purpose of a “Privilege Management” system in user access control?
    a) To allow unrestricted user access to resources
    b) To align access rights with job responsibilities
    c) To prevent password sharing
    d) To enforce biometric authentication
    Answer: b) To align access rights with job responsibilities
  319. Which control ensures that unauthorized updates to a database are prevented?
    a) Logical Access Controls
    b) Corrective Controls
    c) Access Control Lists (ACLs)
    d) Concurrency Controls
    Answer: c) Access Control Lists (ACLs)
  320. What is the main characteristic of Application Control?
    a) Securing physical access to IT facilities
    b) Managing network operations efficiently
    c) Restricting user actions within a specific application
    d) Monitoring employee performance in IT operations
    Answer: c) Restricting user actions within a specific application
  321. What is the purpose of environmental controls like water detectors in IT facilities?
    a) To prevent unauthorized personnel access
    b) To mitigate risks of water damage to systems
    c) To ensure logical access to sensitive areas
    d) To reduce the impact of electrical surges
    Answer: b) To mitigate risks of water damage to systems
  322. Which control mechanism prevents the misuse of unattended user equipment?
    a) Biometric authentication
    b) Password sharing policies
    c) Terminal timeouts
    d) Encryption protocols
    Answer: c) Terminal timeouts
  323. What is the function of the “Data Preparation and Entry” control?
    a) Monitoring network traffic
    b) Managing system utilities
    c) Promoting speed and accuracy in input environments
    d) Preventing unauthorized software updates
    Answer: c) Promoting speed and accuracy in input environments
  324. What is the role of a “Firewall” in network security?
    a) Encrypting transmitted data
    b) Blocking unauthorized traffic between networks
    c) Detecting user activity within a system
    d) Ensuring database integrity
    Answer: b) Blocking unauthorized traffic between networks
  325. What are examples of Output Controls in information systems?
    a) Report distribution and storage controls
    b) Monitoring network performance
    c) Logical access restrictions
    d) Emergency evacuation plans
    Answer: a) Report distribution and storage controls
  326. Which of the following best describes Quality Assurance (QA) Management Controls?
    a) Monitoring compliance with established quality standards
    b) Designing hardware for enhanced performance
    c) Conducting fraud investigations
    d) Managing employee training programs
    Answer: a) Monitoring compliance with established quality standards
  327. What is the main objective of “System Development Management Controls”?
    a) To supervise network traffic
    b) To analyze, design, and maintain information systems
    c) To enforce physical security measures
    d) To train employees on operating systems
    Answer: b) To analyze, design, and maintain information systems
    CHAPTER 9
    Information Systems and Technology
  328. What is the primary component of an Information System?
    A) People, Process, and Technology
    B) Hardware, Software, and Cloud Computing
    C) Networks and Infrastructure
    D) Data Mining Tools
    Answer: A) People, Process, and Technology
  329. What distinguishes Information Systems from Information Technology?
    A) Information Systems include only hardware.
    B) Information Technology focuses on hardware and software, while Information Systems
    involve processes and people.
    C) Information Technology excludes communication networks.
    D) Both are identical in function and definition.
    Answer: B) Information Technology focuses on hardware and software, while Information
    Systems involve processes and people.
  330. Why is IT auditing essential?
    A) To automate financial transactions.
    B) To evaluate internal controls and asset safety.
    C) To replace manual data processing.
    D) To generate financial reports automatically.
    Answer: B) To evaluate internal controls and asset safety.
    IT Tools and Techniques
  331. What is a major advantage of CAATs (Computer-Assisted Audit Techniques)?
    A) Manual data verification
    B) Automation in data testing and analysis
    C) Dependence on physical audits
    D) Reduced accuracy in audit processes
    Answer: B) Automation in data testing and analysis
  332. What does the Integrated Test Facility (ITF) technique involve?
    A) Simulating a test environment outside the system.
    B) Creating a dummy entity within the system to test data processing.
    C) Conducting audits manually without automation.
    D) Using outdated system tools for testing.
    Answer: B) Creating a dummy entity within the system to test data processing.
  333. Which tool is used for creating flowcharts and data analysis?
    A) Microsoft Word
    B) Audit Command Language (ACL)
    C) System Control Audit Review File (SCARF)
    D) Microsoft Access
    Answer: B) Audit Command Language (ACL)
    Risks and Controls
  334. What is the key risk in the Procure-to-Pay (P2P) process?
    A) Delays in system updates
    B) Unauthorized changes to supplier master files
    C) Slow invoice processing
    D) Outdated financial reporting
    Answer: B) Unauthorized changes to supplier master files
  335. What is the main objective of control in the Order-to-Cash (O2C) cycle?
    A) Automating customer data deletion
    B) Verifying the accuracy of customer orders
    C) Generating random invoices
    D) Adjusting credit lines based on manual calculations
    Answer: B) Verifying the accuracy of customer orders
  336. Which risk is associated with the Inventory Cycle?
    A) Inaccurate shipment records
    B) Lack of user access restrictions
    C) Inefficient data visualization
    D) Delayed master configuration
    Answer: A) Inaccurate shipment records
    Auditing Approaches
  337. What does the “Blackbox” auditing approach focus on?
    A) Reviewing internal program logic
    B) Reconciling inputs with outputs without processing logic examination
    C) Using embedded audit modules
    D) Creating custom pseudocode
    Answer: B) Reconciling inputs with outputs without processing logic examination
  338. What is a benefit of auditing through the computer?
    A) Simplified manual verification
    B) Continuous evaluation of embedded controls
    C) Eliminates system reliability concerns
    D) Reduces the need for test environments
    Answer: B) Continuous evaluation of embedded controls
    System-Specific Controls
  339. What does transaction tagging in auditing ensure?
    A) System-wide user access
    B) Manual processing of tagged data
    C) Verification of data integrity throughout processing stages
    D) Inaccurate labeling of transactions
    Answer: C) Verification of data integrity throughout processing stages
  340. What is the focus of Continuous and Intermittent Simulation (CIS)?
    A) Replacing Database Management Systems
    B) Detecting and logging transaction exceptions in real-time
    C) Manual validation of financial transactions
    D) Generating static financial reports
    Answer: B) Detecting and logging transaction exceptions in real-time
    Process-Specific Questions
  341. What is the primary function of Human Resource (HR) cycles?
    A) Configuring user roles in IT systems
    B) Managing the employee lifecycle within an enterprise
    C) Conducting financial audits
    D) Tracking raw materials in production
    Answer: B) Managing the employee lifecycle within an enterprise
  342. What should be restricted in Payroll Management to maintain integrity?
    A) Access to payroll master files
    B) Frequency of data backups
    C) Time spent on data entry
    D) The number of system users
    Answer: A) Access to payroll master files
    Advanced Topics
  343. What is a risk in Fixed Asset Management?
    A) Delayed salary disbursement
    B) Unauthorized changes to asset records
    C) Unplanned marketing expenses
    D) Inconsistent sales reports
    Answer: B) Unauthorized changes to asset records
  344. What is the purpose of SCARF (System Control Audit Review File)?
    A) Managing unauthorized users
    B) Continuous monitoring of system transactions
    C) Storing physical assets for review
    D) Automating manual calculations
    Answer: B) Continuous monitoring of system transactions
  345. What is the key objective of safeguarding assets in Information Systems Auditing?
    A) Maximizing storage capacity
    B) Preventing unauthorized access
    C) Increasing hardware compatibility
    D) Reducing operational costs
    Answer: B) Preventing unauthorized access
  346. What is the main focus of system effectiveness in Information Systems Auditing?
    A) Ensuring optimal hardware usage
    B) Meeting user requirements and decision-making needs
    C) Simplifying data entry processes
    D) Enhancing program compatibility
    Answer: B) Meeting user requirements and decision-making needs
  347. What does improved system efficiency imply?
    A) Eliminating data redundancy
    B) Using minimum resources for maximum output
    C) Reducing employee count in IT departments
    D) Generating real-time financial statements
    Answer: B) Using minimum resources for maximum output
    Process Risks and Controls
  348. What is a common risk in the Procure-to-Pay process?
    A) Incorrect posting of accounts payable amounts
    B) Unauthorized recruitment in HR processes
    C) Duplicate payroll entries
    D) Delayed approval of tax filings
    Answer: A) Incorrect posting of accounts payable amounts
  349. What ensures accuracy in Purchase Orders?
    A) Proper authorization of requisitions
    B) Use of manual data entry
    C) Avoidance of automated tools
    D) Delegation of approvals to unauthorized staff
    Answer: A) Proper authorization of requisitions
  350. Which control is necessary for the Order-to-Cash cycle?
    A) Restricting unauthorized customer orders
    B) Allowing all orders without verification
    C) Preventing automated data transfer
    D) Ignoring invalid shipping records
    Answer: A) Restricting unauthorized customer orders
  351. What is an example of a management process in business?
    A) Manufacturing goods
    B) Strategic planning and governance
    C) Shipping customer orders
    D) Processing supplier invoices
    Answer: B) Strategic planning and governance
  352. How are credit notes issued in the O2C process?
    A) Based on organizational policies
    B) Through manual calculations only
    C) Using handwritten notes
    D) Without verification
    Answer: A) Based on organizational policies
    IT Tools and Techniques
  353. What is the purpose of Parallel Simulation in auditing?
    A) To independently validate processing logic
    B) To eliminate the need for manual input
    C) To generate random audit samples
    D) To track only small-scale transactions
    Answer: A) To independently validate processing logic
  354. Which tool can assist in analyzing data for audit purposes?
    A) SAP Audit Management
    B) Notepad
    C) Adobe Photoshop
    D) Google Maps
    Answer: A) SAP Audit Management
  355. What does the Test Data technique focus on?
    A) Providing input transactions to evaluate system performance
    B) Generating random audit reports
    C) Simulating manual operations
    D) Disabling system-generated outputs
    Answer: A) Providing input transactions to evaluate system performance
    Risks and Control Objectives
  356. What ensures accurate updates in Inventory Management Systems?
    A) Restricting unauthorized system access
    B) Allowing unlimited user access
    C) Ignoring changes in master data
    D) Limiting transaction approvals
    Answer: A) Restricting unauthorized system access
  357. What is a key risk in Fixed Asset transactions?
    A) Inaccurate depreciation calculation
    B) Delayed salary payments
    C) Unrecorded customer orders
    D) Mismanaged purchase invoices
    Answer: A) Inaccurate depreciation calculation
  358. What does system configuration involve in business processes?
    A) Setting initial parameters based on policies
    B) Completely automating all human interactions
    C) Eliminating manual verifications
    D) Ignoring master file updates
    Answer: A) Setting initial parameters based on policies
    Auditing Concepts
  359. What is the primary purpose of Continuous Auditing?
    A) Detecting errors at the point of occurrence
    B) Eliminating the need for manual reports
    C) Reducing system capacity requirements
    D) Automating all organizational tasks
    Answer: A) Detecting errors at the point of occurrence
  360. What is a key benefit of Embedded Audit Modules (EAM)?
    A) Real-time transaction monitoring
    B) Reduced system security
    C) Delayed error detection
    D) Manual testing of transactions
    Answer: A) Real-time transaction monitoring
    Specific Controls
  361. How should payroll data be managed in HR processes?
    A) By restricting access to authorized users
    B) By sharing access widely across teams
    C) By avoiding automation tools
    D) By skipping transaction reviews
    Answer: A) By restricting access to authorized users
  362. What risk does SCARF help mitigate?
    A) Transaction irregularities and policy violations
    B) Delayed salary disbursements
    C) Unmonitored asset depreciation
    D) Manual financial reporting
    Answer: A) Transaction irregularities and policy violations
    Business Processes
  363. What does the Ordering phase in the Inventory Cycle involve?
    A) Placing and receiving raw material orders
    B) Tracking customer complaints
    C) Configuring financial reports
    D) Shipping finished goods
    Answer: A) Placing and receiving raw material orders
  364. Which control ensures accurate financial statements?
    A) Automated reconciliation of ledger accounts
    B) Allowing unrestricted manual data entry
    C) Limiting master data updates
    D) Avoiding reporting tools
    Answer: A) Automated reconciliation of ledger accounts
    Advanced Topics
  365. What is an essential feature of IT audit tools?
    A) Real-time data analysis capabilities
    B) Exclusive focus on manual processes
    C) Dependency on physical audits
    D) Ignoring transaction errors
    Answer: A) Real-time data analysis capabilities
  366. What ensures privacy in digital ecosystems?
    A) Implementing security safeguards under data protection laws
    B) Sharing user credentials openly
    C) Allowing unrestricted database access
    D) Ignoring encryption standards
    Answer: A) Implementing security safeguards under data protection laws
  367. How is data integrity achieved in Information Systems?
    A) Ensuring completeness, reliability, and accuracy of data
    B) Relying solely on manual audits
    C) Limiting data access to one department
    D) Avoiding data validation steps
    Answer: A) Ensuring completeness, reliability, and accuracy of data
    Control and Security
  368. What is the key control in the CASA process?
    A) Restricting unauthorized credit line setups
    B) Allowing open credit for all customers
    C) Ignoring master file updates
    D) Avoiding regular audits
    Answer: A) Restricting unauthorized credit line setups
  369. What does segregation of duties (SoD) aim to achieve?
    A) Preventing unauthorized transactions
    B) Simplifying all tasks under one role
    C) Limiting financial transparency
    D) Automating user logins
    Answer: A) Preventing unauthorized transactions
    System Audit Techniques
  370. What is the purpose of a pre-audit survey?
    A) Collecting background information for focused auditing
    B) Avoiding interactions with management
    C) Replacing data analysis processes
    D) Automating decision-making entirely
    Answer: A) Collecting background information for focused auditing
  371. What is a critical aspect of an auditor’s role in continuous simulation?
    A) Identifying transaction exceptions
    B) Simplifying configuration steps
    C) Eliminating test environments
    D) Ignoring real-time updates
    Answer: A) Identifying transaction exceptions
    IT Governance
  372. What does an effective governance system in IT ensure?
    A) Alignment of IT objectives with business goals
    B) Ignoring user feedback
    C) Automating unauthorized processes
    D) Reducing compliance requirements
    Answer: A) Alignment of IT objectives with business goals
    Miscellaneous
  373. What defines operational business processes?
    A) Delivering value directly to customers
    B) Supporting core processes indirectly
    C) Monitoring management tasks
    D) Simplifying budgeting activities
    Answer: A) Delivering value directly to customers
  374. What is a key risk in General Ledger transactions?
    A) Inaccurate account codes
    B) Over-reliance on automation
    C) Avoiding periodic reconciliations
    D) Delayed shipment tracking
    Answer: A) Inaccurate account codes
  375. What does Continuous Audit Techniques rely on?
    A) Embedded system modules
    B) Manual input for large datasets
    C) Limiting automation tools
    D) Eliminating test environments
    Answer: A) Embedded system modules
  376. What is an objective of the Test Data technique?
    A) Verifying system processes with valid and invalid inputs
    B) Eliminating erroneous transactions entirely
    C) Avoiding transaction tagging methods
    D) Ignoring invalid inputs during tests
    Answer: A) Verifying system processes with valid and invalid inputs
  377. What does P2P automation achieve?
    A) A seamless procure-to-pay lifecycle
    B) Simplified customer order tracking
    C) Manual processing of invoices
    D) Reduced vendor data accuracy
    Answer: A) A seamless procure-to-pay lifecycle
    CHAPTER 10
    Multiple-Choice Questions on Digital Data, Privacy, Security, and Business
    Intelligence
  378. What is the primary goal of data protection?
     A) Maximize profits
     B) Ensure data availability, privacy, and integrity
     C) Replace physical documentation
     D) Increase customer engagement
    Answer: B) Ensure data availability, privacy, and integrity
  379. What does the Digital Personal Data Protection Act, 2023 primarily address?
     A) The rights of corporations over data
     B) The processing of digital personal data within India
     C) Cybersecurity standards
     D) Regulation of international trade
    Answer: B) The processing of digital personal data within India
  380. What is a Digital Asset?
    A) Any physical asset stored in warehouses
     B) Any file created and stored digitally with ownership rights
     C) A company’s IT infrastructure
     D) Financial assets stored digitally
    Answer: B) Any file created and stored digitally with ownership rights
  381. Which of the following is NOT a key principle of Fair Information Practices?
     A) Collection limitation
     B) Data profiling
     C) Data quality
     D) Use limitation
    Answer: B) Data profiling
  382. What is the purpose of data encryption?
     A) To increase the size of stored data
     B) To conceal information and protect it from unauthorized access
     C) To format data for user readability
     D) To prevent system crashes
    Answer: B) To conceal information and protect it from unauthorized access
  383. What is the relationship between data privacy and data security?
     A) Data privacy is a prerequisite for data security
     B) Data security is a prerequisite for data privacy
     C) Both are independent and unrelated
     D) Data security always follows data privacy
    Answer: B) Data security is a prerequisite for data privacy
  384. Which law governs electronic transactions and cybersecurity in India?
     A) Digital Commerce Act, 2019
     B) Information Technology Act, 2000
     C) Cyber Protection Act, 2021
     D) Data Privacy Act, 2023
    Answer: B) Information Technology Act, 2000
  385. What does Section 43A of the IT Act address?
     A) Cyber terrorism
     B) Protection against data breaches
     C) Identity theft penalties
     D) Computer hacking penalties
    Answer: B) Protection against data breaches
  386. Which tool is widely used for creating data dashboards?
     A) Python
     B) Tableau
     C) Excel
     D) R
    Answer: B) Tableau
  387. What is the purpose of Data Loss Prevention (DLP) systems?
     A) To analyze customer preferences
     B) To monitor and secure data against unwanted access
     C) To encrypt network connections
     D) To organize data for analysis
    Answer: B) To monitor and secure data against unwanted access
  388. What does predictive analytics aim to achieve?
     A) Understanding why an event occurred
     B) Predicting future outcomes based on historical data
     C) Visualizing past trends
     D) Recommending the best action to take
    Answer: B) Predicting future outcomes based on historical data
  389. Which key right is granted to individuals under the Digital Personal Data Protection
    Act, 2023?
     A) Right to publish sensitive information
     B) Right to be forgotten
     C) Right to prosecute third-party processors
     D) Right to deny encryption
    Answer: B) Right to be forgotten
  390. What is a key feature of third-generation firewalls?
     A) They only monitor incoming traffic
     B) They use in-line deep packet inspection
     C) They restrict email communications
     D) They focus exclusively on physical device protection
    Answer: B) They use in-line deep packet inspection
  391. What are the four types of data analytics?
     A) Prescriptive, Descriptive, Exploratory, Interpretive
     B) Descriptive, Diagnostic, Predictive, Prescriptive
     C) Predictive, Interactive, Diagnostic, Visual
     D) Exploratory, Statistical, Prescriptive, Predictive
    Answer: B) Descriptive, Diagnostic, Predictive, Prescriptive
  392. What does Data Governance ensure?
     A) Immediate deletion of old records
     B) The availability, integrity, and security of data
     C) Promotion of free data sharing across networks
     D) Automatic encryption of all stored files
    Answer: B) The availability, integrity, and security of data
  393. Which section of the IT Act addresses penalties for identity theft?
     A) Section 66C
     B) Section 43
     C) Section 67A
     D) Section 66E
    Answer: A) Section 66C
  394. What is a primary application of prescriptive analytics?
     A) Analyzing historical data
     B) Recommending the best course of action
     C) Identifying existing system vulnerabilities
     D) Generating statistical reports
    Answer: B) Recommending the best course of action
  395. What is the focus of the Digital Personal Data Protection Act, 2023 regarding data
    fiduciaries?
     A) Increasing revenue
     B) Data minimization and security
     C) Encouraging global data sharing
     D) Eliminating consent for data use
    Answer: B) Data minimization and security
  396. Which practice ensures the quality of business data?
     A) Data Encryption
     B) Data Profiling
     C) Data Loss Prevention
     D) Firewall Implementation
    Answer: B) Data Profiling
  397. What does the term “Data at Rest” refer to?
    A) Data being analyzed
     B) Data stored in databases or devices
     C) Data being transmitted
     D) Data being visualized
    Answer: B) Data stored in databases or devices
  398. What is Business Intelligence (BI)?
     A) Collecting financial records for auditing purposes
     B) Turning organizational data into actionable insights
     C) Managing physical assets within a company
     D) Designing websites for e-commerce
    Answer: B) Turning organizational data into actionable insights
  399. Which tool is known for its strong data visualization capabilities?
     A) Power BI
     B) Excel
     C) QlikSense
     D) Tableau
    Answer: D) Tableau
  400. What is the primary function of dashboards in BI tools?
     A) Create complex database queries
     B) Display visual summaries and performance metrics
     C) Automate software updates
     D) Manage customer feedback
    Answer: B) Display visual summaries and performance metrics
  401. Which phase in the BI lifecycle involves creating metadata?
     A) Design data model
     B) Building data warehouse
     C) Creation of BI project structure
     D) Development of BI objects
    Answer: C) Creation of BI project structure
  402. What is predictive modeling used for in BI?
     A) Managing financial transactions
     B) Generating trend forecasts using statistical methods
     C) Creating interactive dashboards
     D) Storing unstructured data
    Answer: B) Generating trend forecasts using statistical methods
  403. What does OLAP stand for?
     A) Online Analytical Processing
     B) On-demand Analytical Program
     C) Open Logic Application Processing
     D) Operational Level Analytics Program
    Answer: A) Online Analytical Processing
  404. What distinguishes BI from Data Analytics?
     A) BI focuses on historical data, while analytics predicts future trends
     B) Analytics is only used by non-technical personnel
     C) BI tools cannot generate dashboards
     D) Analytics is purely for data storage
    Answer: A) BI focuses on historical data, while analytics predicts future trends
  405. What is a key feature of Sisense BI tool?
     A) Interactive mobile reports
     B) End-to-end analytics with drag-and-drop functionality
     C) Exclusive focus on financial data
     D) High hardware requirements
    Answer: B) End-to-end analytics with drag-and-drop functionality
  406. What chart type in Power BI is best for displaying proportions?
     A) Line Chart
     B) Pie Chart
     C) Funnel Chart
     D) Bar Chart
    Answer: B) Pie Chart
  407. What is the significance of predictive modeling in retail BI?
     A) Automating inventory management
     B) Identifying customer purchase trends
     C) Restricting market competition
     D) Eliminating product diversity
    Answer: B) Identifying customer purchase trends
    CHAPTER 11
    Business Intelligence (BI) Concepts
  408. What is the primary purpose of Business Intelligence (BI)?
    o (a) Store large amounts of data
    o (b) Turn organizational data into actionable insights
    o (c) Replace manual labor with automation
    o (d) Increase employee productivity
    o Answer: (b) Turn organizational data into actionable insights
  409. Which of the following is a key functionality of BI tools?
    o (a) Real-time monitoring
    o (b) Predictive modeling
    o (c) Data visualization
    o (d) All of the above
    o Answer: (d) All of the above
  410. Which BI technique involves exploring data to extract trends and insights?
    o (a) Data mining
    o (b) Dashboards
    o (c) Analytics
    o (d) OLAP
    o Answer: (c) Analytics
  411. What does ETL stand for in the context of BI?
    o (a) Extract, Transform, Load
    o (b) Export, Translate, List
    o (c) Examine, Transfer, Log
    o (d) Enable, Test, Load
    o Answer: (a) Extract, Transform, Load
  412. Which phase of the BI lifecycle involves creating a project structure or
    metadata?
    o (a) Analyze Business Requirements
    o (b) Develop BI Objects
    o (c) Create BI Project Structure
    o (d) Design Data Model
    o Answer: (c) Create BI Project Structure
    o
    BI Tools and Techniques
  413. Which popular BI tool was used by Heathrow Airport for operational
    improvements?
    o (a) Tableau
    o (b) Microsoft Power BI
    o (c) QlikSense
    o (d) Sisense
    o Answer: (b) Microsoft Power BI
  414. What is a primary feature of Tableau as a BI tool?
    o (a) Drag-and-drop analytics interface
    o (b) Built-in AI capabilities
    o (c) Advanced cloud integration
    o (d) Real-time monitoring
    o Answer: (a) Drag-and-drop analytics interface
  415. Which BI tool emphasizes self-service analytics?
    o (a) QlikSense
    o (b) Sisense
    o (c) Tableau
    o (d) Dundas BI
    o Answer: (a) QlikSense
  416. What is the main advantage of using BI dashboards?
    o (a) Store unstructured data
    o (b) Provide real-time insights and visualizations
    o (c) Replace ETL processes
    o (d) Perform manual analysis
    o Answer: (b) Provide real-time insights and visualizations
  417. Which functionality allows BI tools to uncover patterns in large datasets?
    o (a) OLAP
    o (b) Data Mining
    o (c) Real-time Monitoring
    o (d) Reporting
    o Answer: (b) Data Mining
    BI Life Cycle
  418. Which step comes first in the BI Life Cycle?
    o (a) Build the Data Warehouse
    o (b) Design Data Model
    o (c) Analyze Business Requirements
    o (d) Develop BI Objects
    o Answer: (c) Analyze Business Requirements
  419. What does the Design Data Model phase achieve in BI?
    o (a) Develop dashboards
    o (b) Analyze historical data
    o (c) Establish relationships within data entities
    o (d) Maintain project changes
    o Answer: (c) Establish relationships within data entities
  420. What is the primary objective of administering and maintaining the BI project?
    o (a) Data storage
    o (b) Security and performance monitoring
    o (c) Create dashboards
    o (d) Forecast trends
    o Answer: (b) Security and performance monitoring
    BI Chart Types
  421. Which chart type is best suited for showing proportions?
    o (a) Line Chart
    o (b) Pie Chart
    o (c) Funnel Chart
    o (d) Bar Chart
    o Answer: (b) Pie Chart
  422. What does a funnel chart typically represent?
    o (a) Numerical propositions across phases
    o (b) Historical data trends
    o (c) Distribution of data points
    o (d) Key performance indicators
    o Answer: (a) Numerical propositions across phases
  423. What is the distinguishing feature of a Doughnut Chart compared to a Pie
    Chart?
    o (a) It uses more colors
    o (b) It has a central hole for additional details
    o (c) It only shows negative values
    o (d) It represents real-time data
    o Answer: (b) It has a central hole for additional details
    Advanced BI Applications
  424. Which BI functionality enables businesses to solve analytical problems with
    multiple dimensions?
    o (a) ETL
    o (b) OLAP
    o (c) Predictive Modeling
    o (d) Reporting
    o Answer: (b) OLAP
  425. What is predictive modeling used for in BI?
    o (a) Visualizing current data
    o (b) Generating probabilities and trend models
    o (c) Cleaning and storing data
    o (d) Sharing reports with stakeholders
    o Answer: (b) Generating probabilities and trend models
  426. Which feature of BI tools facilitates mobile access to dashboards and reports?
    o (a) Real-time monitoring
    o (b) Mobile Business Intelligence
    o (c) Collaborative BI
    o (d) Data Mining
    o Answer: (b) Mobile Business Intelligence
  427. Which BI tool feature allows seamless sharing of information with stakeholders?
    o (a) Predictive Analytics
    o (b) Collaborative BI
    o (c) ETL
    o (d) Data Visualization
    o Answer: (b) Collaborative BI
  428. How did Heathrow Airport benefit from using BI?
    o (a) Reduced employee count
    o (b) Improved passenger flow management
    o (c) Eliminated flight delays
    o (d) Increased operational costs
    o Answer: (b) Improved passenger flow management
  429. What challenge did SkullCandy solve using BI tools?
    o (a) Automating payroll systems
    o (b) Consolidating data from multiple sources
    o (c) Enhancing customer service chatbots
    o (d) Reducing manufacturing costs
    o Answer: (b) Consolidating data from multiple sources
  430. Which advantage of BI tools helps retailers update prices in real-time?
    o (a) Predictive modeling
    o (b) Scorecards
    o (c) Mobile BI
    o (d) ETL processes
    o Answer: (a) Predictive modeling
  431. What is a major benefit of BI in retail?
    o (a) Increased paperwork
    o (b) Improved customer experience
    o (c) Limited access to data
    o (d) Reduced data transparency
    o Answer: (b) Improved customer experience
  432. Which of the following BI tools offers end-to-end data encryption?
    o (a) Tableau
    o (b) Microsoft Power BI
    o (c) Sisense
    o (d) QlikSense
    o Answer: (b) Microsoft Power BI
  433. Which of the following charts is best for analyzing trends over time?
    o (a) Line Chart
    o (b) Funnel Chart
    o (c) Doughnut Chart
    o (d) Pie Chart
    o Answer: (a) Line Chart
  434. What is the role of dashboards in BI?
    o (a) Storing data
    o (b) Visualizing data for decision-making
    o (c) Writing ETL scripts
    o (d) Managing employee performance
    o Answer: (b) Visualizing data for decision-making
    o
  435. What is a primary focus of BI scorecards?
    o (a) Predicting customer behavior
    o (b) Monitoring Key Performance Indicators (KPIs)
    o (c) Cleaning raw data
    o (d) Storing historical data
    o Answer: (b) Monitoring Key Performance Indicators (KPIs)
  436. Which BI feature supports real-time decision-making?
    o (a) Data mining
    o (b) Real-time monitoring
    o (c) Predictive modeling
    o (d) OLAP
    o Answer: (b) Real-time monitoring
  437. Which BI tool capability allows for insights from historical and real-time data?
    o (a) Scorecards
    o (b) Reporting
    o (c) Dashboards
    o (d) Predictive Analytics
    o Answer: (c) Dashboards
  438. What is the main advantage of using automated reports in BI tools?
    o (a) Reduced manual effort
    o (b) Increased operational costs
    o (c) Limited scalability
    o (d) Decreased accuracy
    o Answer: (a) Reduced manual effort
  439. How does BI improve customer experience in retail?
    o (a) By automating payroll systems
    o (b) By analyzing customer preferences and trends
    o (c) By increasing data redundancy
    o (d) By limiting product options
    o Answer: (b) By analyzing customer preferences and trends
  440. What is the key use of OLAP in BI?
    o (a) Creating reports
    o (b) Analyzing data across multiple dimensions
    o (c) Storing raw data
    o (d) Enhancing mobile access
    o Answer: (b) Analyzing data across multiple dimensions
  441. Which BI feature helps identify anomalies in real-time?
    o (a) ETL
    o (b) Data Mining
    o (c) Real-time monitoring
    o (d) Scorecards
    o Answer: (c) Real-time monitoring
  442. Which BI tool feature provides visual tools for measuring KPIs?
    o (a) Dashboards
    o (b) ETL
    o (c) Scorecards
    o (d) Data Mining
    o Answer: (c) Scorecards
  443. What makes predictive analytics valuable in BI?
    o (a) Real-time data visualization
    o (b) Forecasting future trends based on historical data
    o (c) Reducing ETL processes
    o (d) Limiting operational scope
    o Answer: (b) Forecasting future trends based on historical data
  444. How do BI tools facilitate agile decision-making?
    o (a) By centralizing data for quicker access
    o (b) By limiting data processing
    o (c) By reducing reporting accuracy
    o (d) By increasing operational costs
    o Answer: (a) By centralizing data for quicker access
  445. What does a Line Chart primarily depict?
    o (a) Distribution of data
    o (b) Trends over time
    o (c) Proportional data
    o (d) Key performance metrics
    o Answer: (b) Trends over time
  446. Which BI process transforms raw data into meaningful insights?
    o (a) Data Visualization
    o (b) ETL
    o (c) Data Mining
    o (d) Predictive Modeling
    o Answer: (b) ETL
  447. Which chart type is ideal for visualizing stages in a process?
    o (a) Funnel Chart
    o (b) Doughnut Chart
    o (c) Pie Chart
    o (d) Bar Chart
    o Answer: (a) Funnel Chart
  448. Which BI tool capability provides insights for both historical and real-time data?
    o (a) Reporting
    o (b) Dashboards
    o (c) Predictive Analytics
    o (d) Collaborative BI
    o Answer: (b) Dashboards
  449. What role does Collaborative BI play in organizations?
    o (a) Restricting data access
    o (b) Facilitating team-based decision-making
    o (c) Enhancing predictive models
    o (d) Replacing dashboards
    o Answer: (b) Facilitating team-based decision-making
  450. What is a key advantage of BI tools for businesses?
    o (a) Improved data-driven decision-making
    o (b) Increased data storage costs
    o (c) Limited data accessibility
    o (d) Enhanced manual processing
    o Answer: (a) Improved data-driven decision-making
  451. How does BI support operational efficiency?
    o (a) By creating redundant processes
    o (b) By analyzing process bottlenecks
    o (c) By reducing collaboration
    o (d) By increasing complexity
    o Answer: (b) By analyzing process bottlenecks
  452. Which BI feature is used to generate ad-hoc reports?
    o (a) Dashboards
    o (b) Reporting
    o (c) Data Mining
    o (d) OLAP
    o Answer: (b) Reporting
  453. What is the role of Mobile BI in organizations?
    o (a) Improving employee satisfaction
    o (b) Enabling access to BI tools on mobile devices
    o (c) Replacing traditional BI tools
    o (d) Reducing report generation time
    o Answer: (b) Enabling access to BI tools on mobile devices
  454. Which BI application helps optimize product pricing?
    o (a) ETL
    o (b) Predictive Modeling
    o (c) Data Visualization
    o (d) Collaborative BI
    o Answer: (b) Predictive Modeling
  455. How does BI improve financial forecasting?
    o (a) By reducing data entry errors
    o (b) By providing historical and trend-based insights
    o (c) By automating payroll systems
    o (d) By limiting analytics scope
    o Answer: (b) By providing historical and trend-based insights
  456. What is a common use of BI in marketing?
    o (a) Identifying customer segments
    o (b) Creating data warehouses
    o (c) Reducing data redundancy
    o (d) Enhancing operational delays
    o Answer: (a) Identifying customer segments
  457. Which BI tool feature allows for evidence-based decision-making?
    o (a) Data Mining
    o (b) Predictive Analytics
    o (c) Reporting
    o (d) Scorecards
    o Answer: (b) Predictive Analytics
    CHAPTER 12
  458. What does FinTech stand for?
    A) Financial Technology
    B) Financial Terminology
    C) Financial Transactions
    D) Financial Tactics
    Answer: A) Financial Technology
  459. Which technology is NOT commonly associated with FinTech?
    A) Artificial Intelligence
    B) Blockchain
    C) Cloud Computing
    D) Nuclear Physics
    Answer: D) Nuclear Physics
  460. What is a key advantage of Blockchain?
    A) Centralized control
    B) Immutability of records
    C) Slow transaction processing
    D) High operational costs
    Answer: B) Immutability of records
  461. Which of the following is an example of limited memory AI?
    A) Self-driving cars
    B) Chatbots
    C) Human-like robots
    D) Bitcoin mining
    Answer: A) Self-driving cars
  462. What is a major characteristic of Public Cloud?
    A) Exclusive use by one organization
    B) Highly scalable and affordable
    C) Completely secure
    D) Requires private networks
    Answer: B) Highly scalable and affordable
  463. Which of the following is a FinTech product?
    A) Peer-to-peer lending
    B) Cloud Storage Services
    C) Traditional Banking
    D) Social Media
    Answer: A) Peer-to-peer lending
  464. What is the role of Robo-Advisors in FinTech?
    A) Human-driven customer service
    B) Algorithm-driven financial planning
    C) Manual data processing
    D) Stock trading on paper
    Answer: B) Algorithm-driven financial planning
  465. What technology powers cryptocurrency transactions?
    A) Blockchain
    B) Cloud Computing
    C) Artificial Intelligence
    D) Big Data
    Answer: A) Blockchain
  466. What does AI stand for?
    A) Artificial Integration
    B) Automated Intelligence
    C) Artificial Intelligence
    D) Advanced Interface
    Answer: C) Artificial Intelligence
  467. Which is NOT a benefit of Big Data in FinTech?
    A) Improved customer insights
    B) Faster decision-making
    C) Higher transaction fees
    D) Better fraud detection
    Answer: C) Higher transaction fees
  468. What is the primary goal of FinTech?
    A) To replace traditional banks
    B) To simplify and enhance financial transactions
    C) To eliminate the use of currency
    D) To focus only on cryptocurrency
    Answer: B) To simplify and enhance financial transactions
  469. Which is an example of Distributed Ledger Technology?
    A) Credit Card Transactions
    B) Blockchain
    C) Data Encryption
    D) Cloud Storage
    Answer: B) Blockchain
  470. What is the key feature of Blockchain?
    A) Centralized database
    B) Tamper-proof records
    C) Dependency on third parties
    D) Slow processing speed
    Answer: B) Tamper-proof records
  471. Which of the following is NOT a type of AI?
    A) Weak AI
    B) Narrow AI
    C) General AI
    D) Smart AI
    Answer: D) Smart AI
  472. What is the main advantage of cloud computing for businesses?
    A) High upfront cost
    B) Scalability
    C) Dependency on hardware
    D) Limited storage options
    Answer: B) Scalability
  473. What does GDPR stand for?
    A) General Data Processing Regulation
    B) General Data Protection Regulation
    C) Global Data Privacy Regulation
    D) Government Data Processing Rules
    Answer: B) General Data Protection Regulation
  474. Which organization regulates financial technology in India?
    A) SEBI
    B) RBI
    C) NPCI
    D) All of the above
    Answer: D) All of the above
  475. What is a Hybrid Cloud?
    A) A mix of public and private clouds
    B) A decentralized network
    C) A cloud owned by multiple companies
    D) A single-tenant cloud
    Answer: A) A mix of public and private clouds
  476. Which of the following is a Blockchain application?
    A) Supply chain management
    B) Video streaming
    C) Online gaming
    D) Travel bookings
    Answer: A) Supply chain management
  477. What is a key challenge for FinTech adoption?
    A) Lack of internet
    B) Regulatory compliance
    C) High customer satisfaction
    D) Excessive transparency
    Answer: B) Regulatory compliance
  478. What is the full form of AI?
    A) Analytical Intelligence
    B) Artificial Intelligence
    C) Automated Interaction
    D) Advanced Intelligence
    Answer: B) Artificial Intelligence
  479. Which type of Blockchain does NOT require permission to join?
    A) Private Blockchain
    B) Public Blockchain
    C) Consortium Blockchain
    D) Hybrid Blockchain
    Answer: B) Public Blockchain
  480. What is an advantage of Distributed Ledger Technology?
    A) Centralized authority
    B) Improved traceability
    C) Slower processing times
    D) High transaction costs
    Answer: B) Improved traceability
  481. Which FinTech product uses AI for financial planning?
    A) Blockchain
    B) Robo-Advisors
    C) P2P Lending Platforms
    D) Cryptocurrency Wallets
    Answer: B) Robo-Advisors
  482. What is the key feature of Cloud Computing?
    A) Dependency on local hardware
    B) Pay-as-you-go pricing model
    C) Limited accessibility
    D) High maintenance cost
    Answer: B) Pay-as-you-go pricing model
  483. Which technology ensures data cannot be tampered with?
    A) Artificial Intelligence
    B) Blockchain
    C) Cloud Computing
    D) Big Data
    Answer: B) Blockchain
  484. What is the role of NPCI in India?
    A) Regulating cryptocurrency
    B) Managing payment systems
    C) Providing loans
    D) Supervising data privacy
    Answer: B) Managing payment systems
  485. What does SaaS stand for in Cloud Computing?
    A) Software as a Service
    B) Storage as a Service
    C) Systems and Applications Software
    D) Server and Application Services
    Answer: A) Software as a Service
  486. Which of the following is a FinTech use case?
    A) Automated Teller Machines
    B) Mobile Payments
    C) Manual Financial Audits
    D) Handwritten Cheques
    Answer: B) Mobile Payments
  487. What is the role of Big Data in FinTech?
    A) Reduce customer interaction
    B) Predict market trends
    C) Eliminate internet dependency
    D) Increase manual processing
    Answer: B) Predict market trends
  488. Which is NOT a challenge for Blockchain adoption?
    A) Scalability issues
    B) Lack of transparency
    C) High energy consumption
    D) Regulatory uncertainty
    Answer: B) Lack of transparency
  489. What is the purpose of Distributed Ledger Technology?
    A) Centralized financial record-keeping
    B) Peer-to-peer transaction verification
    C) Manual transaction reconciliation
    D) Dependency on intermediaries
    Answer: B) Peer-to-peer transaction verification
  490. What is a common feature of AI and ML in FinTech?
    A) Manual data entry
    B) Predictive analysis
    C) Physical server dependency
    D) Increased fraud rates
    Answer: B) Predictive analysis
  491. Which Blockchain feature ensures data security?
    A) Open access
    B) Cryptographic hashing
    C) Manual verification
    D) Centralized storage
    Answer: B) Cryptographic hashing
  492. What is a benefit of Cloud Computing for startups?
    A) Reduced capital investment
    B) Increased maintenance cost
    C) Limited storage options
    D) Dependency on physical servers
    Answer: A) Reduced capital investment
  493. What is the key characteristic of Narrow AI?
    A) Performs a single task efficiently
    B) Matches human intelligence
    C) Manages multiple tasks simultaneously
    D) Exhibits emotional intelligence
    Answer: A) Performs a single task efficiently
  494. What is the role of UPI in FinTech?
    A) Facilitating online shopping
    B) Enabling instant digital payments
    C) Providing insurance services
    D) Managing stock investments
    Answer: B) Enabling instant digital payments
  495. Which is NOT an example of Cloud Computing?
    A) Google Drive
    B) Amazon Web Services
    C) Local hard disk storage
    D) Microsoft Azure
    Answer: C) Local hard disk storage
  496. Which AI type is still under development?
    A) Weak AI
    B) General AI
    C) Reactive AI
    D) Limited Memory AI
    Answer: B) General AI
  497. What is the advantage of using Blockchain for supply chain management?
    A) Centralized data control
    B) Improved traceability
    C) Increased intermediaries
    D) Manual tracking
    Answer: B) Improved traceability
  498. What does “Tamper-proof” in Blockchain mean?
    A) Data can be easily edited
    B) Data cannot be altered once recorded
    C) Data is visible to a single user
    D) Data is stored offline
    Answer: B) Data cannot be altered once recorded
  499. Which cloud type combines private and public clouds?
    A) Community Cloud
    B) Hybrid Cloud
    C) Private Cloud
    D) Public Cloud
    Answer: B) Hybrid Cloud
  500. What is a limitation of Public Cloud?
    A) High scalability
    B) Security concerns
    C) Low availability
    D) High setup cost
    Answer: B) Security concerns
  501. What powers smart contracts in Blockchain?
    A) Cryptography
    B) Human supervision
    C) Manual verification
    D) Data redundancy
    Answer: A) Cryptography
  502. Which is a disadvantage of Cloud Computing?
    A) Requires internet connectivity
    B) Reduces scalability
    C) Increases maintenance cost
    D) Requires on-premise servers
    Answer: A) Requires internet connectivity
  503. What is the function of Machine Learning in FinTech?
    A) Storing customer data
    B) Automating financial processes
    C) Managing physical branches
    D) Eliminating fraud
    Answer: B) Automating financial processes
  504. What is the primary goal of Big Data in finance?
    A) Manual customer analysis
    B) Predicting financial patterns
    C) Increasing paperwork
    D) Reducing digital transactions
    Answer: B) Predicting financial patterns
  505. Which Blockchain type is open to anyone?
    A) Private Blockchain
    B) Public Blockchain
    C) Consortium Blockchain
    D) Hybrid Blockchain
    Answer: B) Public Blockchain
  506. What is the main purpose of AI in fraud detection?
    A) Identify patterns of irregular transactions
    B) Increase manual intervention
    C) Delay fraud detection
    D) Eliminate all digital transactions
    Answer: A) Identify patterns of irregular transactions
  507. Which FinTech service improves insurance accessibility?
    A) PolicyBazaar
    B) UPI
    C) Google Pay
    D) Bitcoin
    Answer: A) PolicyBazaar
    CHAPTER 13
    Digital Payments
  508. Which organization operates retail payments and settlement systems in India?
    o (a) Securities Exchange Board of India (SEBI)
    o (b) Reserve Bank of India (RBI)
    o (c) National Payments Corporation of India (NPCI)
    o (d) Indian Banks’ Association (IBA)
    o Answer: (c) National Payments Corporation of India (NPCI)
  509. What is the upper limit per UPI transaction?
    o (a) ₹ 50,000
    o (b) ₹ 1,00,000
    o (c) ₹ 1,50,000
    o (d) ₹ 2,00,000
    o Answer: (b) ₹ 1,00,000
  510. Which of the following is NOT a type of digital payment?
    o (a) Immediate Payment Service (IMPS)
    o (b) Aadhar Enabled Payment Service (AEPS)
    o (c) Unified Payments Interface (UPI)
    o (d) Real-Time Gross Settlement (RTGS)
    o Answer: (d) Real-Time Gross Settlement (RTGS)
  511. Which of these is an example of a mobile wallet?
    o (a) Paytm
    o (b) RuPay
    o (c) IMPS
    o (d) BHIM
    o Answer: (a) Paytm
  512. What is the primary authentication factor in UPI transactions?
    o (a) Biometric authentication only
    o (b) PIN only
    o (c) Two-factor authentication
    o (d) Single-click login
    o Answer: (c) Two-factor authentication
  513. Which digital payment mode allows transactions without internet?
    o (a) UPI
    o (b) USSD
    o (c) IMPS
    o (d) Mobile Wallet
    o Answer: (b) USSD
  514. Which of the following is a feature of RuPay cards?
    o (a) High international transaction fees
    o (b) Reversal of disputed transactions
    o (c) Limited ATM withdrawal
    o (d) No merchant acceptance
    o Answer: (b) Reversal of disputed transactions
  515. What is the primary advantage of e-RUPI?
    o (a) Physical issuance of vouchers
    o (b) Purpose-specific digital vouchers
    o (c) High transaction charges
    o (d) Requires a smartphone
    o Answer: (b) Purpose-specific digital vouchers
    Internet of Things (IoT)
  516. What is the main goal of IoT?
    o (a) Enable wireless payments
    o (b) Create a global interconnected network of devices
    o (c) Improve smartphone battery life
    o (d) Enhance e-commerce operations
    o Answer: (b) Create a global interconnected network of devices
  517. Which of the following applications of IoT helps in debt collection?
    o (a) Personalized offering
    o (b) Fraud prevention
    o (c) Monitoring supply chain activities
    o (d) Capacity building
    o Answer: (c) Monitoring supply chain activities
  518. What is a major challenge in IoT implementation?
    o (a) Excessive hardware requirements
    o (b) Data connectivity issues
    o (c) Limited applications in banking
    o (d) Lack of customer interest
    o Answer: (b) Data connectivity issues
  519. Which industry benefits most from IoT applications?
    o (a) Agriculture
    o (b) Financial services
    o (c) Retail
    o (d) Manufacturing
    o Answer: (b) Financial services
    Quantum Computing
  520. What is the primary difference between bits and qubits?
    o (a) Qubits can exist in multiple states simultaneously.
    o (b) Qubits are slower than bits.
    o (c) Bits use quantum superposition.
    o (d) Qubits are restricted to binary values.
    o Answer: (a) Qubits can exist in multiple states simultaneously.
  521. Which sector is expected to benefit the most from quantum computing?
    o (a) Agriculture
    o (b) Financial services
    o (c) Retail
    o (d) Manufacturing
    o Answer: (b) Financial services
  522. What makes quantum computing a potential threat to financial organizations?
    o (a) Reduced processing power
    o (b) Incompatibility with traditional algorithms
    o (c) Ability to break cryptographic protocols
    o (d) High costs of implementation
    o Answer: (c) Ability to break cryptographic protocols
  523. Which of the following is NOT a feature of quantum computing?
    o (a) Faster data processing
    o (b) Solving optimization problems
    o (c) Limited computational capacity
    o (d) High accuracy in financial modeling
    o Answer: (c) Limited computational capacity
    RegTech
  524. What is the main purpose of RegTech?
    o (a) Improve internet speed
    o (b) Facilitate automated regulatory compliance
    o (c) Manage cryptocurrency transactions
    o (d) Enhance physical security
    o Answer: (b) Facilitate automated regulatory compliance
  525. Which of the following technologies does RegTech rely on?
    o (a) Artificial Intelligence (AI)
    o (b) Blockchain
    o (c) Big Data
    o (d) All of the above
    o Answer: (d) All of the above
  526. How does RegTech contribute to financial inclusion?
    o (a) By reducing the cost of compliance
    o (b) By limiting access to certain markets
    o (c) By introducing complex financial instruments
    o (d) By enforcing strict regulations
    o Answer: (a) By reducing the cost of compliance
  527. Which is a key application of RegTech in financial institutions?
    o (a) Customer service management
    o (b) Anti-money laundering
    o (c) Retail marketing
    o (d) Hardware upgrades
    o Answer: (b) Anti-money laundering
    Mobile Computing
  528. What is the key benefit of mobile computing?
    o (a) Improved customer relationships
    o (b) Flexibility to work from any location
    o (c) Enhanced physical security measures
    o (d) Better hardware compatibility
    o Answer: (b) Flexibility to work from any location
  529. Which component of mobile computing ensures reliable communication?
    o (a) Mobile hardware
    o (b) Mobile software
    o (c) Mobile communication
    o (d) Mobile applications
    o Answer: (c) Mobile communication
  530. Which mobile operating system is most commonly used?
    o (a) Windows Mobile
    o (b) Android
    o (c) BlackBerry OS
    o (d) Symbian
    o Answer: (b) Android
  531. What is NOT an advantage of mobile computing?
    o (a) Increased flexibility
    o (b) Enhanced productivity
    o (c) Improved information flow
    o (d) Reduced dependency on communication networks
    o Answer: (d) Reduced dependency on communication networks
    E-Business
  532. What is the major benefit of e-business to businesses?
    o (a) Increased paperwork
    o (b) Improved accessibility and global reach
    o (c) High costs of operation
    o (d) Limited market expansion
    o Answer: (b) Improved accessibility and global reach
  533. Which of the following is NOT a disadvantage of e-business?
    o (a) Internet connectivity issues
    o (b) High start-up costs
    o (c) Enhanced customer interaction
    o (d) Legal and security concerns
    o Answer: (c) Enhanced customer interaction
  534. How does e-business improve efficiency?
    o (a) By reducing rework and overhead costs
    o (b) By increasing dependency on manual processes
    o (c) By eliminating digital transactions
    o (d) By restricting geographical reach
    o Answer: (a) By reducing rework and overhead costs
  535. Which of the following is NOT a benefit of e-business?
    o (a) Time savings
    o (b) Cost reduction
    o (c) Limited access to customers
    o (d) Wide range of product options
    o Answer: (c) Limited access to customers
  536. Which risk is associated with e-business?
    o (a) Enhanced transparency
    o (b) Platform downtime
    o (c) Increased physical inventory
    o (d) Faster customer service
    o Answer: (b) Platform downtime
  537. What is a critical control for data privacy in e-business?
    o (a) Strong passwords
    o (b) Two-factor authentication
    o (c) Regular system updates
    o (d) All of the above
    o Answer: (d) All of the above
    General Questions
  538. What does UPI stand for?
    o (a) Universal Payment Infrastructure
    o (b) Unified Payment Interface
    o (c) Unique Payment Identifier
    o (d) Universal Pay Identification
    o Answer: (b) Unified Payment Interface
  539. Which technology helps improve anti-money laundering processes?
    o (a) Mobile hardware
    o (b) RegTech
    o (c) Quantum computing
    o (d) Internet of Things
    o Answer: (b) RegTech
  540. Which payment mode allows Aadhaar-based transactions?
    o (a) IMPS
    o (b) AEPS
    o (c) UPI
    o (d) BHIM
    o Answer: (b) AEPS
  541. What is a key feature of quantum computing?
    o (a) Linear processing
    o (b) Superposition of states
    o (c) High hardware costs
    o (d) Limited applications
    o Answer: (b) Superposition of states
  542. Which digital payment system is specifically designed for feature phones?
    o (a) e-RUPI
    o (b) USSD
    o (c) BHIM
    o (d) IMPS
    o Answer: (b) USSD
  543. Which of these is a benefit of mobile computing?
    o (a) Reduced travel time
    o (b) Increased physical storage
    o (c) Higher paper usage
    o (d) Limited communication access
    o Answer: (a) Reduced travel time
  544. Which technology is integral to IoT?
    o (a) Blockchain
    o (b) Wireless sensors
    o (c) Smart contracts
    o (d) Quantum algorithms
    o Answer: (b) Wireless sensors
  545. Which financial tool uses Big Data for customer profiling?
    o (a) Quantum computing
    o (b) IoT
    o (c) RegTech
    o (d) UPI
    o Answer: (c) RegTech
  546. Which is NOT a type of card used in digital payments?
    o (a) Debit card
    o (b) Smart card
    o (c) RuPay card
    o (d) Internet card
    o Answer: (d) Internet card
  547. What does e-RUPI primarily use?
    o (a) NFC technology
    o (b) QR codes
    o (c) Blockchain
    o (d) SMS verification
    o Answer: (b) QR codes
  548. What is a key advantage of digital payments?
    o (a) High transaction fees
    o (b) Increased environmental impact
    o (c) Transparency and ease of tracking
    o (d) Limited adoption by businesses
    o Answer: (c) Transparency and ease of tracking
  549. Which is NOT a benefit of IoT in financial services?
    o (a) Fraud prevention
    o (b) Collection of debts
    o (c) Limiting customer base
    o (d) Personalized offerings
    o Answer: (c) Limiting customer base
  550. Which RegTech application focuses on customer verification?
    o (a) AML
    o (b) KYC
    o (c) UDAAP
    o (d) Synthetic identity fraud detection
    o Answer: (b) KYC
  551. What is a major concern with quantum computing?
    o (a) High accuracy
    o (b) Breaking existing encryption
    o (c) Limited processing speed
    o (d) Low computational capacity
    o Answer: (b) Breaking existing encryption
  552. Which IoT application benefits banking services the most?
    o (a) Wearable technology
    o (b) Predictive analysis
    o (c) Automated checkouts
    o (d) Blockchain integration
    o Answer: (b) Predictive analysis
  553. What ensures secure online transactions?
    o (a) Use of antivirus software
    o (b) Strong encryption protocols
    o (c) Regular password updates
    o (d) All of the above
    o Answer: (d) All of the above
  554. Which is NOT a component of mobile computing?
    o (a) Mobile communication
    o (b) Mobile hardware
    o (c) Desktop software
    o (d) Mobile software
    o Answer: (c) Desktop software
  555. What is a characteristic of mobile wallets?
    o (a) Linked to physical cash only
    o (b) Requires a debit card for use
    o (c) Stores payment details securely
    o (d) Does not offer rewards
    o Answer: (c) Stores payment details securely
  556. Which emerging technology aids in capacity building?
    o (a) IoT
    o (b) Quantum computing
    o (c) Mobile computing
    o (d) RegTech
    o Answer: (a) IoT
  557. What is the purpose of e-business?
    o (a) Restrict market expansion
    o (b) Enhance customer reach and efficiency
    o (c) Increase legal complexities
    o (d) Focus solely on local markets
    o Answer: (b) Enhance customer reach and efficiency

CA Student

Welcome to SPOMMCQ! As a fellow CA aspirant, I know the challenges of preparing for the ICAI exams. I upload comprehensive content across various subjects, including LAW and Costing, to support your study journey. Explore detailed notes, practice questions, and useful tips designed to help you succeed in your exams. Let's navigate the CA exam preparation together! Connect with me and stay ahead in your studies.

Leave a Reply

Your email address will not be published. Required fields are marked *