Limited-Time Offer: Enjoy 60% Savings! - Ends In 0d 00h 00m 00s Coupon code: 60OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Most Recent GAQM CITM-001 Exam Questions & Answers


Prepare for the GAQM Certified Information Technology Manager Exam exam with our extensive collection of questions and answers. These practice Q&A are updated according to the latest syllabus, providing you with the tools needed to review and test your knowledge.

QA4Exam focus on the latest syllabus and exam objectives, our practice Q&A are designed to help you identify key topics and solidify your understanding. By focusing on the core curriculum, These Questions & Answers helps you cover all the essential topics, ensuring you're well-prepared for every section of the exam. Each question comes with a detailed explanation, offering valuable insights and helping you to learn from your mistakes. Whether you're looking to assess your progress or dive deeper into complex topics, our updated Q&A will provide the support you need to confidently approach the GAQM CITM-001 exam and achieve success.

The questions for CITM-001 were last updated on Jan 27, 2025.
  • Viewing page 1 out of 16 pages.
  • Viewing questions 1-5 out of 80 questions
Get All 80 Questions & Answers
Question No. 1

Which three are the business models that an international firm might adhere to? (Choose three)

Show Answer Hide Answer
Correct Answer: B, C, D

According to the CITM study guide, an international firm can adopt different business models depending on its degree of global integration and local responsiveness. The study guide identifies four types of business models: international, multidomestic, global, and transnational. These are similar to the typology of multinational companies proposed by Bartlett and Ghoshal (1989). The study guide defines each business model as follows:

International: The firm operates in multiple countries but has a low degree of global integration and local responsiveness. The firm's subsidiaries are largely independent and follow the parent company's strategy and culture. The firm exploits its core competencies and capabilities across different markets without much adaptation. This business model is also known as theinternational projectoror thecentralized exporter.

Multidomestic: The firm operates in multiple countries and has a high degree of local responsiveness but a low degree of global integration. The firm's subsidiaries are highly autonomous and tailor their products and services to the specific needs and preferences of the local markets. The firm sacrifices efficiency and standardization for differentiation and customization. This business model is also known as themultinational drivenor thedecentralized federation.

Global: The firm operates in multiple countries and has a high degree of global integration but a low degree of local responsiveness. The firm's subsidiaries are highly dependent on the parent company and follow a standardized and centralized strategy and culture. The firm leverages economies of scale and scope to achieve cost efficiency and competitiveness. This business model is also known as theintegrated global ITor thecoordinated federation.

Transnational: The firm operates in multiple countries and has a high degree of both global integration and local responsiveness. The firm's subsidiaries are interdependent and collaborate with each other and the parent company to share and transfer knowledge, resources, and best practices. The firm balances efficiency and adaptation to achieve innovation and learning. This business model is also known as theintellectual synergyor theheterarchical network.

Based on these definitions, the three business models that an international firm might adhere to are B, C, and D. Option A is not a valid business model, but rather a characteristic of the transnational business model.Reference:

CITM Study Guide, Chapter 4: International Business Strategy, pp. 63-66

Bartlett, C.A. and Ghoshal, S. (1989). Managing across borders: The transnational solution.Harvard Business School Press1


Question No. 3

Which design usually begins with specifying the desired output?

Show Answer Hide Answer
Correct Answer: A

Functional design is a design approach that focuses on the functionality and performance of a system, rather than its structure or appearance. Functional design usually begins with specifying the desired output, such as the goals, objectives, and requirements of the system, and then derives the input, processes, and data needed to achieve the output. Functional design can be applied to various types of systems, such as software, hardware, or business processes. Functional design is often contrasted with other design approaches, such as organizational design, object-oriented design, and structured design, which have different emphases and methods.Reference:

System Analysis & Design - System Design1

Process models in design and development2

B .Engineering Design3


Question No. 5

A malicious program that records a user's keystrokes is an example of:

Show Answer Hide Answer
Correct Answer: A

A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.

The other options are not correct because:

Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.

An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.

A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.


CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132

What Is a keylogger and how to detect keystroke logging - Norton

Keylogger: how to recover the infected pc? - Panda Security

Unlock All Questions for GAQM CITM-001 Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 80 Questions & Answers