GAQM CITM-001 Certified Information Technology Manager Exam CITM Exam Practice Test

Page: 1 / 14
Total 80 questions
Question 1
Question 2

Which of the following best suits the statement below? It's the main memory of the computer system and is volatile



Answer : A

RAM, or Random Access Memory, is the best fit for the statement because it is the main memory of the computer system and is volatile. RAM is a type of computer memory that is used to store data that is currently being used by the computer's operating system and applications. RAM is volatile because it loses its contents when the power supply to the computer is turned off or interrupted. RAM is also faster and more expensive than other types of memory, such as ROM, PROM, or hard disk, which are non-volatile and can retain data without power. RAM is divided into two types: static RAM (SRAM) and dynamic RAM (DRAM), which differ in their speed, power consumption, and design.Reference

https://en.wikipedia.org/wiki/Volatile_memory

https://www.bbc.co.uk/bitesize/guides/zfyyb82/revision/1

https://www.proprofs.com/quiz-school/story.php?title=information-technology-quiz_7


Question 3
Question 4
Question 5

A malicious program that records a user's keystrokes is an example of:



Answer : A

A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.

The other options are not correct because:

Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.

An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.

A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.


CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132

What Is a keylogger and how to detect keystroke logging - Norton

Keylogger: how to recover the infected pc? - Panda Security

Question 6

How many techniques are available to the design team for collecting data?



Answer : C

According to the CITM course outline1, there are five data collection techniques that are commonly used in business analytics. They are:

Observations: This technique involves watching and recording the behavior, actions, or events of interest. Observations can be either direct or indirect, structured or unstructured, participant or non-participant.

Interviews: This technique involves asking questions to individuals or groups of people who have relevant knowledge or experience on the topic. Interviews can be either structured, semi-structured, or unstructured, depending on the level of flexibility and standardization of the questions.

Surveys: This technique involves administering a set of questions to a sample of respondents who represent the population of interest. Surveys can be either quantitative or qualitative, depending on the type and scale of the questions.

Focus groups: This technique involves gathering a small group of people who share some common characteristics or opinions on the topic and facilitating a discussion among them. Focus groups can be used to explore attitudes, perceptions, feelings, or preferences of the participants.

Documents: This technique involves reviewing and analyzing existing documents or records that are relevant to the topic. Documents can be either primary or secondary, depending on the source and authenticity of the information.


1: 7 Data Collection Methods and Techniques | SafetyCulture

2: CITM 500 Data and Information Management | The Chang School of Continuing Education - Toronto Metropolitan University

3: Data Collection Methods | Step-by-Step Guide & Examples - Scribbr

4: Data Collection - Methods Types and Examples - Research Method

Question 7

Which model extends the waterfall approach by recognizing the different cycles?



Answer : D

The spiral model is a software development lifecycle model that extends the waterfall approach by recognizing the different cycles of planning, risk analysis, engineering, and evaluation. The spiral model allows for iterative and incremental development, where each cycle produces a prototype or a deliverable that can be evaluated by the customer and the project team. The spiral model also incorporates risk management throughout the project, as each cycle involves identifying and resolving potential risks before proceeding to the next cycle. The spiral model is suitable for large, complex, and uncertain projects that require frequent feedback and adaptation.Reference:

Spiral Model vs. Waterfall Model: Definitions and Differences

Waterfall Methodology: The Ultimate Guide to the Waterfall Model


Page:    1 / 14   
Total 80 questions