Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Management





Management Interview Questions
Questions Answers Views Company eMail

Involvement of senior management is MOST important in the development of: A. strategic plans. B. IS policies. C. IS procedures. D. standards and guidelines.

1 11734

The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program? A. Utilization of an intrusion detection system to report incidents. B. Mandating the use of passwords to access all software. C. Installing an efficient user log system to track the actions of each user D. Provide training on a regular basis to all current and new employees.

1 10335

With reference to the risk management process, which of the following statements is correct? A. Vulnerabilities can be exploited by a threat. B. Vulnerabilities are events with the potential to cause harm to IS resources. C. Vulnerability exists because of threats associated with use of information resources. D. Lack of user knowledge is an example of a threat.

1 5512

The role of IT auditor in complying with the Management Assessment of Internal Controls (Section 404 of the Sarbanes-Oxley Act) is: A. planning internal controls B. documenting internal controls C. designing internal controls D. implementing internal controls

1 5253

A primary function of risk management is the identification of cost-effective controls. In selecting appropriate controls, which of the following methods is best to study the effectiveness of adding various safeguards in reducing vulnerabilities? A. "What if" analysis B. Traditional cost/benefit analysis C. Screening analysis D. A "back-of-the-envelope" analysis

1 4466

The document used by the top management of organizations to delegate authority to the IS audit function is the: A. long-term audit plan. B. audit charter. C. audit planning methodology. D. steering committee minutes.

1 7295

Before reporting results of an audit to senior management, an IS auditor should: A. Confirm the findings with auditees. B. Prepare an executive summary and send it to auditee management. C. Define recommendations and present the findings to the audit committee. D. Obtain agreement from the auditee on findings and actions to be taken.

TPA,

1 5896

IS management has recently informed the IS auditor of its decision to disable certain referential integrity controls in the payroll system to provide users with a faster report generator. This will MOST likely increase the risk of: A. data entry by unauthorized users. B. a nonexistent employee being paid. C. an employee receiving an unauthorized raise. D. duplicate data entry by authorized users.

2 8324

Describe previously utilized Sales Management Processes?

2637

In the context of memory management, what are placement and replacement algorithms?

1 10576

Paging a memory management function, while multiprogramming a processor management function, are the two interdependent?

IBM,

2 12351

How does Problem Management relate to Configuration Management?

1 5029

What Configuration Management tools are available?

TCS,

5 13879

What Problem Management tools are available?

2217

What is key management ?

Wipro,

2117




Related Topics


Un-Answered Questions { Management }

The Following Characterstics posses some XYZ company. * Uses formal standards and policies * Conducts software inspections * Has advanced configuration management and change control * Uses CASE tools * Has a software engineering process group * Gathers metrics on process and quality * Requires that developers have formal software engineering training * Practices continued process improvement Based on aboue , Tell me which CMM Level is the company..? 1. Level 1 - Initial 2. Level 2 - Repeatable 3. Level 3 - Defined 4. Level 4 - Managed 5. Level 5 - Optimizing

2185


Your audit indicates that the corporate quality management system did NOT work as it should have. How should this finding be categorized? 1. Minor nonconformance 2. Major nonconformance 3. Deficiency 4. Observation 5. Catastrophic failure

2543


14 year old woman requests the combined oral contraceptive pill for contraception. Please see her and discuss her management?

1971


How are fund-raising and publicity and management and administration costs apportioned over funds?

1914


What part can management policy play in the analysis of cost behaviour?

2070


Do you have accommodation management experience?

2557


Have you previously held a management position in the Hotel & Catering Field?

2407


What are some career opportunities for entertainment managers in the field of Music Management?

2304


What are some opportunities for entertainment managers in the field of Sport Management?

2330


What and where are the policy statements for requirement management?

5563


How do internal quality audits cover requirements management activities in the project?

2742


What is the project management structure in your project? Is a PL assigned to the project?

2539


How do you create the Software Project Management Plan (SPMP)?

4581


What Problem Management tools are available?

2217


What is key management ?

2117