Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Management





Management Interview Questions
Questions Answers Views Company eMail

Involvement of senior management is MOST important in the development of: A. strategic plans. B. IS policies. C. IS procedures. D. standards and guidelines.

1 11641

The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program? A. Utilization of an intrusion detection system to report incidents. B. Mandating the use of passwords to access all software. C. Installing an efficient user log system to track the actions of each user D. Provide training on a regular basis to all current and new employees.

1 10234

With reference to the risk management process, which of the following statements is correct? A. Vulnerabilities can be exploited by a threat. B. Vulnerabilities are events with the potential to cause harm to IS resources. C. Vulnerability exists because of threats associated with use of information resources. D. Lack of user knowledge is an example of a threat.

1 5405

The role of IT auditor in complying with the Management Assessment of Internal Controls (Section 404 of the Sarbanes-Oxley Act) is: A. planning internal controls B. documenting internal controls C. designing internal controls D. implementing internal controls

1 5154

A primary function of risk management is the identification of cost-effective controls. In selecting appropriate controls, which of the following methods is best to study the effectiveness of adding various safeguards in reducing vulnerabilities? A. "What if" analysis B. Traditional cost/benefit analysis C. Screening analysis D. A "back-of-the-envelope" analysis

1 4387

The document used by the top management of organizations to delegate authority to the IS audit function is the: A. long-term audit plan. B. audit charter. C. audit planning methodology. D. steering committee minutes.

1 7159

Before reporting results of an audit to senior management, an IS auditor should: A. Confirm the findings with auditees. B. Prepare an executive summary and send it to auditee management. C. Define recommendations and present the findings to the audit committee. D. Obtain agreement from the auditee on findings and actions to be taken.

TPA,

1 5772

IS management has recently informed the IS auditor of its decision to disable certain referential integrity controls in the payroll system to provide users with a faster report generator. This will MOST likely increase the risk of: A. data entry by unauthorized users. B. a nonexistent employee being paid. C. an employee receiving an unauthorized raise. D. duplicate data entry by authorized users.

2 8143

Describe previously utilized Sales Management Processes?

2591

In the context of memory management, what are placement and replacement algorithms?

1 10453

Paging a memory management function, while multiprogramming a processor management function, are the two interdependent?

IBM,

2 12196

How does Problem Management relate to Configuration Management?

1 4930

What Configuration Management tools are available?

TCS,

5 13656

What Problem Management tools are available?

2172

What is key management ?

Wipro,

2056




Related Topics


Un-Answered Questions { Management }

The Following Characterstics posses some XYZ company. * Uses formal standards and policies * Conducts software inspections * Has advanced configuration management and change control * Uses CASE tools * Has a software engineering process group * Gathers metrics on process and quality * Requires that developers have formal software engineering training * Practices continued process improvement Based on aboue , Tell me which CMM Level is the company..? 1. Level 1 - Initial 2. Level 2 - Repeatable 3. Level 3 - Defined 4. Level 4 - Managed 5. Level 5 - Optimizing

2134


Your audit indicates that the corporate quality management system did NOT work as it should have. How should this finding be categorized? 1. Minor nonconformance 2. Major nonconformance 3. Deficiency 4. Observation 5. Catastrophic failure

2503


14 year old woman requests the combined oral contraceptive pill for contraception. Please see her and discuss her management?

1916


How are fund-raising and publicity and management and administration costs apportioned over funds?

1874


What part can management policy play in the analysis of cost behaviour?

2018


Do you have accommodation management experience?

2523


Have you previously held a management position in the Hotel & Catering Field?

2359


What are some career opportunities for entertainment managers in the field of Music Management?

2237


What are some opportunities for entertainment managers in the field of Sport Management?

2287


What and where are the policy statements for requirement management?

5495


How do internal quality audits cover requirements management activities in the project?

2690


What is the project management structure in your project? Is a PL assigned to the project?

2473


How do you create the Software Project Management Plan (SPMP)?

4512


What Problem Management tools are available?

2172


What is key management ?

2056