Limited-Time Offer: Enjoy 50% Savings! - Ends In 0d 00h 00m 00s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Most Recent GAQM CITM-001 Exam Dumps

 

Prepare for the GAQM Certified Information Technology Manager Exam exam with our extensive collection of questions and answers. These practice Q&A are updated according to the latest syllabus, providing you with the tools needed to review and test your knowledge.

QA4Exam focus on the latest syllabus and exam objectives, our practice Q&A are designed to help you identify key topics and solidify your understanding. By focusing on the core curriculum, These Questions & Answers helps you cover all the essential topics, ensuring you're well-prepared for every section of the exam. Each question comes with a detailed explanation, offering valuable insights and helping you to learn from your mistakes. Whether you're looking to assess your progress or dive deeper into complex topics, our updated Q&A will provide the support you need to confidently approach the GAQM CITM-001 exam and achieve success.

The questions for CITM-001 were last updated on Mar 29, 2025.
  • Viewing page 1 out of 16 pages.
  • Viewing questions 1-5 out of 80 questions
Get All 80 Questions & Answers
Question No. 4

How many techniques are available to the design team for collecting data?

Show Answer Hide Answer
Correct Answer: C

According to the CITM course outline1, there are five data collection techniques that are commonly used in business analytics. They are:

Observations: This technique involves watching and recording the behavior, actions, or events of interest. Observations can be either direct or indirect, structured or unstructured, participant or non-participant.

Interviews: This technique involves asking questions to individuals or groups of people who have relevant knowledge or experience on the topic. Interviews can be either structured, semi-structured, or unstructured, depending on the level of flexibility and standardization of the questions.

Surveys: This technique involves administering a set of questions to a sample of respondents who represent the population of interest. Surveys can be either quantitative or qualitative, depending on the type and scale of the questions.

Focus groups: This technique involves gathering a small group of people who share some common characteristics or opinions on the topic and facilitating a discussion among them. Focus groups can be used to explore attitudes, perceptions, feelings, or preferences of the participants.

Documents: This technique involves reviewing and analyzing existing documents or records that are relevant to the topic. Documents can be either primary or secondary, depending on the source and authenticity of the information.


1: 7 Data Collection Methods and Techniques | SafetyCulture

2: CITM 500 Data and Information Management | The Chang School of Continuing Education - Toronto Metropolitan University

3: Data Collection Methods | Step-by-Step Guide & Examples - Scribbr

4: Data Collection - Methods Types and Examples - Research Method

Question No. 5

A malicious program that records a user's keystrokes is an example of:

Show Answer Hide Answer
Correct Answer: A

A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.

The other options are not correct because:

Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.

An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.

A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.


CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132

What Is a keylogger and how to detect keystroke logging - Norton

Keylogger: how to recover the infected pc? - Panda Security

Unlock All Questions for GAQM CITM-001 Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 80 Questions & Answers