ISA 3.0 ICAI QUESTION BANK

ISA 3.0 ICAI QUESTION BANK MODULE 6

Study material Based

ICAI DISA 3.0 QUESTION BANK : MODULE 6 :- STUDY MATERIAL BASED

1 / 12

Which of the following is not an example for AI Platform?

2 / 12

Which of the following is not a stream of AI?

3 / 12

Which of the following is not a cloud deployment model?

4 / 12

Which of the following tools best describe Predictive Analytics?

5 / 12

Which of the following is a central storage for all kinds of structured, semi structured or unstructured raw data collected from multiple sources even outside of company’s operational systems ?

 

6 / 12

The method by which companies analyze customer data or other types of information in an effort to identify patterns and discover relationships between different data elements is often referred to as:

7 / 12

Which one is simplest form of analytics?

8 / 12

Which of the following is a system of inter-connected and inter-related computing devices which have ability to transfer the data over network:

9 / 12

Which of the following statements about RPA is false?

10 / 12

Which of the following is not a step involved in RPA?

11 / 12

What is Blockchain?

12 / 12

What does P2P technology stand for?

Your score is

The average score is 67%

0%

Practice sets

ISA 3.0 ICAI MODULE 6

1 / 141

1. Which of the following is NOT one of the tools of Robotics Process Automation?

2 / 141

2. What does P2P technology stand for?

3 / 141

3. Which of the following statement about RPA is false?

4 / 141

4. Which of the following is not a step involved in RPA?

5 / 141

5. Which of the following is not a stream of AI?

6 / 141

6. Chris wants to use a low-power, personal area network wireless protocol for a device he is designing. Which of the following wireless protocols is best suited to creating small, low-power devices that can connect to each other at relatively short distances across buildings or rooms?

7 / 141

7. Which of the following is not the concern in Internet of Things?

8 / 141

8. The role of sensor in smart grid architecture of IoT is to ……

9 / 141

9. Which is the at the lowest layer in the IoT Architecture?

10 / 141

10. While investigating a widespread distributed denial-of-service attack, Matt types in the IP address of one of the attacking systems into his browser and sees the following page. What type of devices is the botnet likely composed of?

11 / 141

11. Mike has been tasked with preventing an outbreak of malware like Mirai, a botnet that targeted IP-based cameras and routers. What type of systems should be protected in his organization?

12 / 141

12. Which of the following is a system of inter-connected and inter-related computing devices which have ability to transfer the data over network?

13 / 141

13. Which of the following is not a feature of Internet of things devices?

14 / 141

14. An IS auditor finds that, at certain times of the day, the data warehouse query performance decreases significantly. Which of the following controls would it be relevant for the IS auditor to review?

15 / 141

15. Hunter is reviewing his organization’s monitoring strategy and identifying new technologies that they might deploy. His assessment reveals that the firm is not doing enough to monitor employee activity on endpoint devices. Which one of the following technologies would best meet his needs?

16 / 141

16. The quality of the metadata produced from a data warehouse is …………… in the warehouse’s design. Choose the BEST answer.”

17 / 141

17. The most important factor to be considered when setting up a customer data warehouse on an offshore location is which of the following?

18 / 141

18. Which of the following tools best describe Predictive Analytics?

19 / 141

19. Which of the following is NOT a type of Business Analytics?

20 / 141

20. Data Mining ____________

21 / 141

21. Which of the following is the most important element in the design of a data warehouse?

22 / 141

22. Which of the following would MOST likely indicate that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?

23 / 141

23. Which of the following should an IS auditor consider while auditing data warehousing systems?

24 / 141

24. Which of the following is not an example for AI Platform?

25 / 141

25. Hadoop (a big data tool) works with number of related tools. Choose from the following, the common tools included into Hadoop:

26 / 141

26. Ben wants to provide predictive information about his organization’s risk exposure in an automated way as part of an ongoing organizational risk management plan. What should he use to do this?

27 / 141

27. Which of the following should an IS auditor recommend for the protection of specific sensitive information stored in the data warehouse?

28 / 141

28. A Data Warehouse is a collection of decision-support data that is_________________

29 / 141

29. A decision support system (DSS):

30 / 141

30. Which of the following steps will be taken first to carry out data analytics?

31 / 141

31. Which one is simplest form of analytics?

32 / 141

32. Which of the following is related to ‘Discovery of hidden patterns in the large data to find some valuable information’ :

33 / 141

33. Which of the following is a central storage for all kinds of structured; semi structured or unstructured raw data collected from multiple sources even outside of company’s operational systems?

34 / 141

34. A Data Mart ___________

35 / 141

35. Which of the following business purposes can be met by implementing Data warehouse in an organisation?

36 / 141

36. Which of the following is the MOST critical and contributes the greatest to the quality of data in a data warehouse?

37 / 141

37. Which of the following is the GREATEST risk when implementing a data warehouse?

38 / 141

38. The IS auditor is reviewing the terms of the contract with the cloud service provider. Which of the following is the most important consideration?

39 / 141

39. Which of the following would be of most concern to the IS auditor with respect to the storage of personal customer information in cloud environments?

40 / 141

40. The IS auditor reviews the terms of the contract with the Cloud Service Provider. Which of the following is the most important consideration?

41 / 141

41. Which of the following is the most important clause in a contract with a cloud service provider?

 

42 / 141

42. Which of the following is the best way to verify a cloud service providers physical security arrangements?

43 / 141

43. Typically, with IDaaS (Identity as a Service,) where is the LDAP/Active Directory database most likely to be stored? Choose the best answer from below.?

44 / 141

44. An organization has historically outsourced the management of its IT resources to another company for service management and maintenance. They are now considering moving to a cloud-based solution and would like to ensure that the network components, such as routers, switches, and storage components are all handled by the cloud provider. Which type of cloud framework is this?

45 / 141

45. A cloud-based service that provides account provisioning, management, authentication, authorization, reporting, and monitoring capabilities is known as what type of service?

46 / 141

46.

Kristen wants to use multiple processing sites for her data, but does not want to pay for a full data center. Which of the following options would you recommend as her best option if she wants to be able to quickly migrate portions of her custom application environment to facilities in multiple countries without having to wait to ship or acquire hardware?

47 / 141

47. Which one of the following would be considered an example of infrastructure as a service cloud computing?

48 / 141

48. Cloud computing uses a shared responsibility model for security, where the vendor and customer both bear some responsibility for security. The division of responsibility depends upon the type of service used. Place the cloud service offerings listed here in order from the case where the customer bears the least responsibility to where the customer bears the most responsibility. 1. IaaS 2. SaaS 3. PaaS?

49 / 141

49. Thomas recently signed an agreement for a serverless computing environment where his organization’s developers will be able to write functions in Python and deploy them on the cloud provider’s servers for execution. The cloud provider will manage the servers. What term best describes this model?

50 / 141

50. Bert is considering the use of an infrastructure as a service cloud computing partner to provide virtual servers. Which one of the following would be a vendor responsibility in this scenario?

51 / 141

51. Jim is implementing an IDaaS solution for his organization. What type of technology is he putting in place?

52 / 141

52. Frank is working to select a new cloud service that will provide object storage for an application being developed by his team. What category of cloud service is Frank planning to use?

53 / 141

53. Renee is a software developer who writes code in Node.js for her organization. The company is considering moving from a self-hosted Node.js environment to one where Renee will run her code on application servers managed by a cloud vendor. What type of cloud solution is Renee’s company considering?

54 / 141

54. Mark is considering replacing his organization’s customer relationship management (CRM) solution with a new product that is available in the cloud. This new solution is completely managed by the vendor, and Mark’s company will not have to write any code or manage any physical resources. What type of cloud solution is Mark considering?

55 / 141

55. Roger recently accepted a new position as a security professional at a company that runs its entire IT infrastructure within an IaaS environment. Which one of the following would most likely be the responsibility of Roger’s firm?

56 / 141

56. Jim is implementing a cloud identity solution for his organization. What type of technology is he putting in place?

57 / 141

57. Jim’s organization-wide implementation of IDaaS offers broad support for cloud-based applications. Jim’s company does not have internal identity management staff and does not use centralized identity services. Instead, they rely upon Active Directory for AAA services. Which of the following options should Jim recommend to best handle the company’s on-site identity needs?

58 / 141

58. Ben wants to ensure that the instance-to-instance (system-to-system) traffic in his cloudhosted infrastructure as a service environment is secure. What can he do to fully ensure that the virtualized network traffic is not being captured and analyzed?
Ben is an information security professional at an organization that is replacing its physical servers with cloud-hosted virtual machines. As the organization builds its virtual environment, it is moving toward a hybrid cloud operational model with some systems and services remaining in its local data center and others hosted in the cloud. The following diagram shows the local data center and cloud VPC’s network IP ranges, which you should consider as you answer the questions.

59 / 141

59. ICMP, RIP, and network address translation all occur at what layer of the OSI model?

60 / 141

60. Rick is an application developer who works primarily in Python. He recently decided to evaluate a new service where he provides his Python code to a vendor who then executes it on their server environment. What type of cloud computing environment is this service?

61 / 141

61. In a software as a service cloud computing environment, who is normally responsible for ensuring that appropriate firewall controls are in place to protect the application?

62 / 141

62. In an infrastructure as a service (IaaS) environment where a vendor supplies a customer with access to storage services, who is normally responsible for removing sensitive data from drives that are taken out of service?

63 / 141

63. Fran’s company is considering purchasing a web-based email service from a vendor and eliminating its own email server environment as a cost-saving measure. What type of cloud computing environment is Fran’s company considering?

64 / 141

64. Which cloud deployment method is considered the most secure and has very few chances of data leakage?

65 / 141

65. Which of the following is not a cloud deployment model?

66 / 141

66. One of your client’s managers tells you that they have recently opted for some cloud computing facilities. Being a non-IT official; he says he does not understand what exactly is meant by the term but he has been told that they have opted for a model of Infrastructure as a Service (IaaS). With your own background knowledge of the subject; you explain to him that an IaaS model involves_____________

67 / 141

67. A Software as a Service (SaaS) Cloud Computing model allows clients access to______________

68 / 141

68. A Platform as a Service (PaaS) Cloud Computing model allows clients access to______________

69 / 141

69. A Platform as a Service (PaaS) Cloud Computing model allows clients access to______________

70 / 141

70. ….. has a feature of remote access through which a customer can access the data from anywhere and at any time with the help of internet connection.

71 / 141

71. Which one of the following services does NOT come under category of Cloud computing ?

72 / 141

72. In the context of Cloud Computing, what is the full form of PaaS?

73 / 141

73. Which of the following cloud service model indicates use of the service provider’s application/software on cloud infrastructure?

74 / 141

74. Which of the following is NOT a cloud service model:

75 / 141

75. Darcy’s organization is deploying serverless computing technology to better meet the needs of developers and users. In a serverless model, who is normally responsible for configuring operating system security controls?

76 / 141

76. One of the initiatives in Green Information Technology implementation could be______________

77 / 141

77. Effective Green Information Technology implementation could involve_______________

78 / 141

78. Identify the odd one out.

79 / 141

79. The Back-end in Cloud computing refers to ___________

80 / 141

80. The Front-end in Cloud computing refers to _________

81 / 141

81. An useful step in Green Information Technology implementation could be________________

82 / 141

82. Ben wants to use multiple internet service providers (ISPs) to connect to his cloud VPC to ensure reliable access and bandwidth. What technology can he use to manage and optimize those connections?

Ben is an information security professional at an organization that is replacing its physical servers with cloud-hosted virtual machines. As the organization builds its virtual environment, it is moving toward a hybrid cloud operational model with some systems and services remaining in its local data center and others hosted in the cloud. The following diagram shows the local data center and cloud VPC’s network IP ranges, which you should consider as you answer the questions.

83 / 141

83. In which cloud computing model does a customer share computing infrastructure with other customers of the cloud vendor where one customer may not know the other’s identity?

84 / 141

84. ‘Google’ is the example of Cloud.

85 / 141

85. In what cloud computing model does the customer build a cloud computing environment in his or her own data center or build an environment in another data center that is for the customer’s exclusive use?

86 / 141

86. An organization is reviewing its contract with a cloud computing provider. For which of the following reasons would the organization want to remove a lock-in clause from the contract?

87 / 141

87. Which of the following is important consideration for an SLA while outsourcing IT operations to cloud service provider?

88 / 141

88. Cloud computing refers to ___________

89 / 141

89. Eimear’s software development team uses an approach that creates many discrete software objects and then binds them together using APIs. What term best describes this architecture?

90 / 141

90. You are a Google account holder. Google informs you that they have begun to offer cloud computing facilities to its users & that; as an existing user; you will be allowed up to 15 GB of data storage on the cloud free of cost & thereafter; a nominal $ 0.026 per GB per month. Delighted; you begin using the facility with your laptop. Soon; you receive an alert on the system that you have exhausted the 15 GB free storage space & would need to begin paying for securing more storage space. Which of the characteristics of Cloud computing does this demonstrate ?

91 / 141

91. Which of the following falls outside the typical features of Cloud computing ?

92 / 141

92. What is a Hybrid Cloud computing facility ?

93 / 141

93. One of following actions could be an intrinsic part of Green Information Technology implementation ________________

94 / 141

94. What type of authentication scenario is shown in the following diagram?

95 / 141

95. If Alex’s organization is one that is primarily made up of off-site, traveling users, what availability risk does integration of critical business applications to on-site authentication create, and how could he solve it?
please use your knowledge of SAML integrations and security architecture design and refer to the following scenario and diagram: Alex is in charge of SAML integration with a major third-party partner that provides a variety of business productivity services for his organization.

96 / 141

96. As identity management continues to become more complex, and as users need access to more systems, IdaaS (Identity as a Service) is becoming increasingly popular. Which of the following is NOT a benefit from managing identity solutions in the cloud?

97 / 141

97. Jim’s Microsoft Exchange environment includes servers that are located in local data centers at multiple business offices around the world as well as an Office 365 deployment for employees who are not located at one of those offices. Identities are created and used in both environments and will work in both. What type of federated system is Jim running?

 

98 / 141

98. Brian recently joined an organization that runs the majority of its services on a virtualization platform located in its own data center but also leverages an IaaS provider for hosting its web services and a SaaS email system. What term best describes the type of cloud environment this organization uses?

99 / 141

99. If availability of authentication services is the organization’s biggest priority, what type of identity platform should Ben recommend? Please refer to the following scenario:

The organization that Ben works for has a traditional on-site Active Directory environment that uses a manual provisioning process for each addition to their 350- employee company. As the company adopts new technologies, they are increasingly using software as a service applications to replace their internally developed software stack.

Ben has been tasked with designing an identity management implementation that will allow his company to use cloud services while supporting their existing systems. Using the logical diagram shown here, answer the following questions about the identity recommendations Ben should make.

100 / 141

100. One of the major risks associated with Cloud computing is __________________

101 / 141

101. As you are considering migrating resources to the cloud, you want to ensure the Cloud Service Provider has the ability to provision and de-provision resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible. This technique is referred to as:?

102 / 141

102. Carl is deploying a set of video sensors that will be placed in remote locations as part of a research project. Due to connectivity limitations, he would like to perform as much image processing and computation as possible on the device itself before sending results back to the cloud for further analysis. What computing model would best meet his needs?

103 / 141

103. The Indian fertilizer industry depends heavily on Government subsidies since they are expected to sell their products to customers at prices far below the cost of production. The Government has evolved a complicated mechanism for deciding the subsidy level for each type of fertilizer depending upon various dynamic factors like the international price of the raw material / finished product; the Rupee/dollar exchange rate; conversion & added costs; etc. The industry association decides to set up a common cloud facility for helping the individualunits manage the work of raising regular subsidy claims linked to the various costfactors as also sales elements; etc. Such a cloud facility would be deemed to be a______________

104 / 141

104. A medical organization has decided that in order to maintain compliance with HIPAA, they would need to update their environment. Specifically, in order to be in compliance, they would need to upgrade their storage devices and increase their security controls to provide the necessary security to protect their patients’ information. Additionally, they do not want to take on any more administrative duties. Among other options, they are considering storing their data in the cloud. Which deployment would likely satisfy their needs in the most cost-effective manner?

105 / 141

105. Microsoft Azure is a …….. computing service

106 / 141

106. At one point in time, it was common for organizations to have mainframe computers which were accessed by terminals on the users’ workstations. Terminals were the ultimate thin clients. Now as we move towards cloud-based services, we are hearing the term “thin clients” again today more and more. What is the implication of using thin clients?

107 / 141

107. Xavier’s company has been using an increasing number of cloud services, and he is concerned that the security policies that the company has implemented in its existing data center are not being followed in the cloud. Which of the following solutions is best suited to ensuring that policies are applied to all cloud services?

108 / 141

108. Nadia’s company is operating a hybrid cloud environment with some on-site systems and some cloud-based systems. She has satisfactory monitoring on-site, but needs to apply security policies to both the activities her users engage in and to report on exceptions with her growing number of cloud services. What type of tool is best suited to this purpose?

109 / 141

109. Gary wants to distribute a large file and prefers a peer-to-peer CDN. Which of the following is the most common example of this type of technology?

110 / 141

110. Which of the following is true about the bitcoin scripting language?

111 / 141

111. Bitcoin is created by ………

112 / 141

112. Identify one of the types of the blockchain network.

113 / 141

113. What does the block in the blockchain contain? i. Transaction data. ii. Hash point. iii. Timestamp.

114 / 141

114. Block in the block chain consist of? I. Hash pointer II. Transaction data III. Timestamp

115 / 141

115. The term used for a blockchain splits is ………

116 / 141

116. What is a Blockchain?

117 / 141

117. Which of the following is not a blockchain component?

118 / 141

118. An example of an information to support strategic management is:

119 / 141

119. ………. is a set of methodologies that transform raw data into meaningful and useful information for business purpose.

120 / 141

120. What are the pillars of blockchain technology?

121 / 141

121. What are the benefits of blockchain technology?

122 / 141

122. The method by which companies analyze customer data or other types of information in an effort to identify patterns and discover relationships between different data elements is often referred to as:

123 / 141

123. Which of the following tools is most useful in detecting security intrusions

124 / 141

124. Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?

125 / 141

125. Which one of the following types of artificial intelligence attempts to use complex computations to replicate the partial function of the human mind?

126 / 141

126. Alan is assessing the potential for using machine learning and artificial intelligence in his cybersecurity program. Which of the following activities is most likely to be

127 / 141

127. The most important factor impacting the effectiveness of the neural network is:

128 / 141

128. An IDS that observes the general pattern of activities and updates its database is a:

129 / 141

129. Neural networks are effective in detecting fraud; because they can:

130 / 141

130. Neural Networks and Fuzzy Logics are classified under which category of Artificial intelligence?

131 / 141

131. Which of the following algorithms is used for reinforcement machine learning ?

132 / 141

132. Who among the following is known as the father of Artificial Intelligence (AI)?

133 / 141

133. Which of the following is NOT true in problem solving in artificial intelligence?

134 / 141

134. Which of the following are effective in detecting fraud because they have the capability to consider a large number of variables when trying to resolve a problem? Choose the BEST answer.

135 / 141

135. Which of the following systems-based approaches would a financial processing company employ to monitor spending patterns to identify abnormal patterns and report them?

136 / 141

136. Which of the following recent trends can be defined as the abstraction of different computing resources like processor, Memory etc, and is the single most effective way to reduce IT expenses?

137 / 141

137. In Artificial Intelligence (AI), which agent deals with happy and unhappy state ?

138 / 141

138. Which of the following languages is suitable for artificial intelligence?

139 / 141

139. In an inter school competition on Artificial Intelligence; four children develop software which performs the following different functions respectively. Which of them is a correct example of the use of basic Artificial Intelligence?

140 / 141

140. Fifth Generation programming language _________________

141 / 141

141. Artificial Intelligence works with the help of two concepts; one of them is Artificial neurons. The other is ?

Your score is

The average score is 44%

0%

Related Post

GST Appeal: Filing procedure & Physical document submission#1In “GST”

Extended Timelines for issuance of Notice and order under section 73 and 74 of GST Act.In “GST”

Affidavit for GST Registration

YouTaxClub
Logo
Compare items
  • Total (0)
Compare
0
Shopping cart