Free GAQM CITM-001 Exam Actual Questions

The questions for CITM-001 were last updated On Jan 17, 2025

Question No. 1

Which term describes dormant code added to software and triggered at a predetermined time or by a predetermined event?

Show Answer Hide Answer
Correct Answer: A

A logic bomb is a type of malicious code that is inserted into a software program and remains dormant until a specific condition or event occurs, such as a certain date, time, or user action. When the condition is met, the logic bomb activates and executes its harmful payload, which can range from deleting or corrupting data, to displaying unwanted messages, to crashing the system. Logic bombs are often used by disgruntled employees or hackers to sabotage an organization's IT infrastructure or to extort money or information. Logic bombs are different from keyloggers, spam, and viruses, which are explained below:

A keylogger is a software or hardware device that records every keystroke made by a user on a computer or mobile device, usually for the purpose of stealing passwords, personal information, or other sensitive data. Keyloggers can be installed by hackers through phishing, trojan viruses, or physical access to the device. Keyloggers do not wait for a specific condition to activate, but rather run continuously in the background and transmit the captured data to a remote server or storage device.

Spam is any kind of unwanted, unsolicited, or irrelevant digital communication that is sent or posted to a large number of recipients or places, typically for the purposes of advertising, phishing, spreading malware, or disrupting normal operations. Spam can be delivered via email, text message, phone call, or social media. Spam does not contain hidden code that executes a harmful action, but rather relies on the user's response or interaction to achieve its goal, such as clicking a link, opening an attachment, or providing personal information.

A virus is a type of malware that infects a computer or mobile device by attaching itself to another program or file and replicating itself when the host program or file is executed. A virus can have various harmful effects, such as deleting or modifying data, consuming system resources, displaying unwanted messages, or opening backdoors for hackers. A virus can spread from one device to another through networks, removable media, or email attachments. A virus does not require a specific condition to activate, but rather runs whenever the infected program or file is executed.


Logic Bomb Definition & Meaning - Merriam-Webster

What is a Keylogger? How to Detect a Keylogger? - Fortinet

Spam | What is Spam? | Definition & Types of Spam

Virus | Definition, Structure, & Facts | Britannica

Question No. 2

Limited access to high speed internet may impede the development of global information systems.

Show Answer Hide Answer
Correct Answer: A

Global information systems are information systems that span multiple countries, cultures, and organizations. They enable the sharing of data, knowledge, and resources across borders and regions. However, limited access to high speed internet may impede the development of global information systems, as it affects the quality, speed, reliability, and security of communication and collaboration.According to the International Telecommunication Union (ITU), in 2020, only 51.4% of the world's population had access to the internet, and only 19.1% had fixed broadband subscriptions1. This means that many people and regions are still digitally excluded or underserved, especially in developing countries and rural areas. This digital divide may create challenges and barriers for the design, implementation, and management of global information systems, such as:

Lack of infrastructure and resources: Developing and maintaining global information systems requires adequate and stable infrastructure and resources, such as servers, routers, cables, satellites, power supply, bandwidth, etc.However, many regions lack the necessary infrastructure and resources to support high speed internet access, or face high costs and risks of disruption or damage2. This may limit the availability, performance, and scalability of global information systems, and increase the complexity and cost of their development and maintenance.

Lack of interoperability and standardization: Global information systems need to ensure interoperability and standardization among different systems, platforms, protocols, formats, and languages. However, limited access to high speed internet may hinder the adoption and integration of common standards and technologies, such as cloud computing, web services, APIs, etc.This may result in compatibility issues, data inconsistency, and inefficiency of global information systems, and require more effort and coordination to achieve interoperability and standardization3.

Lack of user participation and satisfaction: Global information systems need to consider the needs, preferences, and expectations of diverse and distributed users and stakeholders. However, limited access to high speed internet may affect the user participation and satisfaction of global information systems, as it may reduce the usability, accessibility, and functionality of the systems, and cause delays, errors, or failures of communication and collaboration. This may lead to user frustration, dissatisfaction, and resistance, and lower the adoption and acceptance of global information systems.


Question No. 3

Which of the following best suits the statement below? It's the main memory of the computer system and is volatile

Show Answer Hide Answer
Correct Answer: A

RAM, or Random Access Memory, is the best fit for the statement because it is the main memory of the computer system and is volatile. RAM is a type of computer memory that is used to store data that is currently being used by the computer's operating system and applications. RAM is volatile because it loses its contents when the power supply to the computer is turned off or interrupted. RAM is also faster and more expensive than other types of memory, such as ROM, PROM, or hard disk, which are non-volatile and can retain data without power. RAM is divided into two types: static RAM (SRAM) and dynamic RAM (DRAM), which differ in their speed, power consumption, and design.Reference

https://en.wikipedia.org/wiki/Volatile_memory

https://www.bbc.co.uk/bitesize/guides/zfyyb82/revision/1

https://www.proprofs.com/quiz-school/story.php?title=information-technology-quiz_7