laitimes

In the first half of 2023, information system project managers comprehensive knowledge real questions + answers

author:Soft test treasure chest
In the first half of 2023, information system project managers comprehensive knowledge real questions + answers

In order to facilitate the self-test of candidates' scores, Kekeguo has sorted out for you the comprehensive knowledge questions + analysis 1-15 of information system project managers in the first half of 2023, the specific content is as follows:

1. "New infrastructure" mainly includes three aspects: information technology facilities, converged infrastructure and innovation infrastructure, of which information infrastructure includes (1) communication infrastructure (2) intelligent transportation infrastructure (3) new technology infrastructure (4) scientific research infrastructure (5) computing power infrastructure

A、135

B、145

C、234

D、235

Reference answer: A

Analysis: Information infrastructure. Information infrastructure mainly refers to the infrastructure generated based on the evolution of a new generation of information technology. Information infrastructure includes: (1) communication network infrastructure represented by 5G, Internet of Things industrial Internet, satellite Internet: (2) new technology infrastructure represented by artificial intelligence, cloud computing, blockchain, etc.; (3) Computing power infrastructure represented by data centers and intelligent computing centers. Information infrastructure highlights "new technology".

2. The valueization of teaching data is to take ( ) as the starting point, go through the stage of teaching data assetization, data capitalization and limited periods, and realize data value

A. Intelligent data

B. Data recycling

C. Data security

D. Data industrialization

Reference answer: B

Analysis: Data value-based refers to the economic process of starting from data resources and going through the stages of data assetization and data capitalization to realize data value.

3. Network security situation awareness is based on ( ), data integration feature extraction, etc., and a series of situation evaluation algorithms are applied to generate the overall situation of the network.

A. Security application software

B. Security infrastructure

C. Secure network environment

D. Security big data

Reference answer: D

Analysis: The premise of security situation awareness is security big data, which performs data integration and feature extraction on the basis of security big data, and then applies a series of situation assessment algorithms to generate the overall situation of the network.

4. ( ) refers to multiple programs in an operating system running in parallel at the same time, and can run multiple operating systems at the same time, and there are multiple programs running in each operating system, but the CPU simulates dual CPUs to balance the running performance, and the two simulated CPUs cannot be separated, can only work together.

A. Virtualization technology, multi-tasking hyper-threading technology

B. Hyper-Threading Technology Virtualization Technology Multitasking

C. Virtualization technologyHyper-threading technology multitasking

D. Multi-task virtualization technology Hyper-Threading Technology

Reference answer: D

Analysis: Multi-tasking refers to multiple programs running in parallel in one operating system, and in virtualization technology, side can run multiple operating systems at the same time, hyper-threading technology is just a single CPU simulation dual CPU to balance the program running performance, these two simulated CPUs can not be separated, can only work together.

5. The T governance framework is defined in GB/T34960.1 - ( ) The three major governance domains that do not belong to the T governance framework

A. Management system

B. Technical system

C. Top-level design

D. Resources

Reference answer: B

Analysis: The IT governance framework defined by GB/T34960.1 includes three governance areas: top-level information technology design, management system and resources.

6. ( ) Not the objective of the T audit.

A. Review and evaluate the achievement of T objectives

B. Identify and assess T risks

C. Protect the security of information assets

D. Propose evaluation opinions and improvements

Reference answer: C

Analysis: The purpose of T audit refers to understanding the overall status of the organization's T system and T activities through the implementation of T audit work, reviewing and evaluating whether the organization has achieved T objectives, fully identifying and evaluating relevant T risks, putting forward evaluation opinions and improvement suggestions, and promoting the organization to achieve T objectives.

7. The information systems strategic triangle does not include ( ).

A. Security technology

B. Business strategy

C. Organizational mechanism

D. Information system

Reference answer: A

Analysis: The Information Systems Strategy Triangle highlights the necessary alignment between business strategy, information systems and organizational mechanisms.

8. Data management capability maturity model (DCMM) divides the organization's management maturity into 5 levels, each level of data will be different, from the beginning to emphasize the standardization of data management, data is regarded as an important asset to achieve organizational performance goals.

A. Quantitative management level

B. Robust level

C. Optimization level

D. Managed level

Reference answer: B

Analysis: Robustness: Data has been regarded as an important asset to achieve organizational performance goals, and a series of standardized management processes have been formulated at the organizational level to promote the standardization of data management.

9. Among the commonly used OOD principles, the principle ( ) is that an object should have as little knowledge as possible about other objects, which is consistent with the ( ) principle of structural optimization methods.

A. Single job high cohesion

B. Combined reuse Low coupling

C. Dimeter low coupling

D. Open and close high cohesion

Reference answer: C

Analysis: Common OOD principles include:

●Single-job principle: Design a class with a single function. This principle is consistent with the principle of high cohesion in a structured approach.

●Opening and closing principle: open to expansion, closed to modification.

● Lee's substitution principle: A subclass can replace a parent class.

● Dependency inversion principle: rely on abstraction, not concrete implementation; To program against an interface, do not program against an implementation.

● Interface isolation principle: It is better to use multiple specialized interfaces than to use a single total interface.

●Principle of combined reuse: Try to use combination, not inheritance relationship to achieve the purpose of reuse.

The Dimeter principle (the law of least knowledge): One object should be to the other

10. ( ) is the basis of ( ), both of which are designed to be able to recover data or systems in the event of a system crash or disaster.

A. Data disaster recovery Data backup

B. Data storage Data security

C. Data security Data storage

D. Data backup Data disaster recovery

Reference answer: D

Analysis: Data backup is the foundation of data disaster recovery. Data backup is the last line of defense for high data availability, and its purpose is to be able to quickly recover data in the event of a system data crash.

11. From the perspective of information system integration technology, ( ) at the top, mainly solve ( ) problems

A. Data integration and interoperability

B. Network integration interconnection

C. Software integration and mutual adaptation

D. Network application integration interoperability

Reference answer: D

Analysis: From the perspective of information system integration technology, on the integration stack, the application is integrated at the top layer, mainly solving the problem of application interoperability, using language as a metaphor, grammar, semantics, pragmatics three correspond to the system integration technology, network integration solves the problem of syntax, data integration solves the problem of semantics, and application integration solves the problem of pragmatics

12. ( ) is to prevent the modification, insertion, deletion of the exchanged data by illegal entities and the loss of data during the data exchange.

A. Peer entity authentication services

B. Data confidentiality services

C. Data integrity services

D. Data source point

Reference answer: C

Analysis: Security services include peer entity authentication services, data confidentiality services, data integrity services, data source point authentication services, prohibition of denial services, and criminal evidence services.

(3) Data integrity services. Data integrity services are used to prevent modification, insertion, deletion, and data loss during data exchange by illegal entities.

Data integrity services can be divided into:

● Link mode data integrity with recovery function

● Link data integrity without recovery function

● Select the field link method for data integrity

● Select fields without linking mode data integrity

● No link data integrity

13. Regarding the description of performance evaluation, it is incorrect ( ).

A. Performance evaluation should take employee development as the first goal and fully understand the development potential of employees

B. The performance evaluation is led by the human resources department, which is coordinated and cooperated by relevant departments

C. Performance evaluation is the most technical link in the whole cyclical cycle of performance governance

D. Formulating scientific and reasonable evaluation methods is the key to performance evaluation

Reference answer: A

Analysis: Performance evaluation refers to the common development of employees and the organization as the goal, through a formal structured system or method, evaluate and measure the work behavior and work results of the team or individual employees in a certain cycle, and comprehensively understand the development potential of employees.

14. Knowledge management needs to follow the principle of accumulation, sharing and exchange of original tests. Among them, ( ) is the basis for the implementation of knowledge management, ( ) it is necessary to establish an organizational structure and cultural climate conducive to knowledge management.

A. The principle of sharing The principle of communication

B. Accumulation principle Communication principle

C. Accumulation principle Sharing principle

D. Communication principle Sharing principle

Reference answer: B

Analysis: Knowledge management is a complex process that follows the following 3 principles: (1) The principle of accumulation. Knowledge accumulation is the basis for the management of implementing knowledge. (2) The principle of sharing. Knowledge sharing means that information and knowledge within an organization should be as open as possible, so that every employee can access and use the knowledge and information of the organization. (3) Principles of communication. The core of knowledge management is to establish an organizational structure and cultural atmosphere conducive to communication within the organization, so that there are no obstacles to communication between people.

15. Data protection is carried out according to the importance of data in economic and social development, and the degree of harm caused to national security, public interests, or the lawful rights and interests of individuals and organizations once it is tampered with, destroyed, leaked, or illegally obtained or illegally used, which is the implemented data ( ) protection system.

A. Classification and grading

B. Security review

C. Risk assessment

D. Emergency response

Reference answer: A

Parse:

16. ( ) Applicable to the design, implementation, deployment and use of PaaS cloud computing systems.

A、GB/T 35301 "Information Technology Cloud Computing Platform as a Service (PaaS) Reference Architecture"

B、GB/T 36327 "Information Technology Cloud Computing Platform as a Service (PaaS) Application Management Requirements"

C、CB/T 37739 "Information Technology Cloud Computing Platform as a Service (PaaS) Deployment Requirements"

D、GB/T 32399 "Information Technology Cloud Computing Reference Architecture"

Reference answer: A

Analysis: GB/T35301 "Information Technology Cloud Computing Platform as a Service (Paas) Test Architecture" (this standard applies to the design, implementation, deployment and use of PaaS cloud computing systems)

17. ( ) Focus on prioritizing projects and providing the required resources to align with organizational strategy; ( ) Achieve established benefits by coordinating their components and controlling their dependencies.

A. Program management Organizational level project management

B. Project portfolio management Organizational project management

C. Program management Project portfolio management

D. Project portfolio management Program management

Reference answer: D

Analysis: Portfolio management aligns with organizational strategy by selecting the right program or project, prioritizing work, and providing the resources needed. Program management coordinates the projects and other components contained in a program and controls dependencies between them to achieve established benefits.

18. The description of the relevant competencies of the project manager is incorrect ( ).

A. Project management, strategy and business, and leadership are skills that project managers need to focus on

B. Interpersonal communication occupies most of the work content of the project manager

C. Leadership focuses on short-term goals, operable problems and problem solving

D. Strategic and business skills help project managers understand the business factors associated with the project

Reference answer: C

Parse:

19. Regarding the description of "managing complexity principles" in project management principles, it is incorrect ( ).

A. Complexity can arise at any time during the project lifecycle

B. Factors that affect value, communication, technology, and risk can all create complexity

C. The project team can predict the emergence of future complexity in real time and analyze its causes

D. Complexity is caused by system interaction, uncertainty, and ambiguity

Reference Answer:

Parse:

20. Regarding the description of the value of the project, it is incorrect ( ).

A. The project exists in the organization and creates value for stakeholders

B. Value is process-oriented and quantitatively defined with the goal of obtaining expected economic benefits

C. Projects can create value by improving efficiency, productivity, effectiveness, or responsiveness

D. Value is the ultimate indicator of project success and can create new products, services or results that meet the needs

Reference Answer:

Parse:

21. In the feasibility report, "whether there is a problem of insufficient human resources, and whether the required personnel can be obtained through social recruitment or training" belongs to the content of ( ).

A. Technical feasibility analysis

B. Economic feasibility analysis

C. Feasibility analysis of social benefits

D. Feasibility analysis of operating environment

Reference Answer:

Parse:

22. What cannot be used as a basis for project evaluation is ( ).

A. Proposal and its approval documents

B. Feasibility study report

C. Agreement documents

D. Project charter

Reference Answer:

Parse:

23. As a characteristic or attribute of an item, complexity refers to ( ) ( ) contains multiple parts (2) there are differences between different parts (3) dynamic interactions between different parts (4) interactions produce behavior that is much greater than the simple sum of the parts

A、①②③

B、②③④

C、①③④

D、(1)(2)(3)(4)

Reference Answer:

Parse:

24. Among the interpersonal and team skills required to develop a project charter, ( ) help stakeholders agree on goals, success criteria, high-level requirements, project description, overall milestones, and more.

A. Conflict management

B. Interviews

C. Conference management

D. Brainstorming

Reference Answer:

Parse:

Question 25: ( ) Belongs to work performance data (1) Key Performance Indicators (KPIs) (2) Earned Value Analysis (3) Actual start date of progress activities (4) Deliverable status (5) Contract performance information (6) Number of defects

A、①②③④

B、①③④⑥

C、②③⑤⑥

D、(3)(4)(5)(6)

Reference answer: B

Analysis: Work performance data includes completed work, key performance indicators (KPIs), technical performance measurement results, actual start and finish dates of progress activities, completed story points, deliverable status, progress progress, number of change requests, number of defects, actual costs incurred, actual duration, etc.

26. The main functions of the process of closing a project or phase include (1) archiving project or phase information, (2) using your own organizational knowledge to improve project outcomes, (3) managing the deliverables of project work in an integrated manner, (4) determining the basis for project work, and (5) freeing up organizational team resources

A、①②⑤

B、①⑤

C、①③⑤

D、(1)(4)

Reference answer: B

Analysis: The main functions of this process: (1) archive project or phase information and complete the planned work: (2) free up organizational team resources to start new work

27. ( ) Used to confirm the successful completion of project deliverables.

A. Business needs

B. Solution requirements

C. Quality requirements

D. Transition and readiness requirements

Reference answer: C

Analysis: Quality requirements: Any conditions or criteria used to confirm the successful completion of project deliverables or the fulfillment of other project requirements, for example, testing, certification, validation, etc.

28. Regarding the description of the confirmation range, it is incorrect that: ( )

A. One of the functions of the confirmation scope is to ensure that the acceptance process is objective

B. The process of confirming the scope usually precedes the process of controlling the quality, and the two can also be carried out at the same time

C. When confirming the scope, check whether the deliverables have clear quality standards

D. Management, clients, and project managers have different concerns when confirming the scope

Reference answer: B

Analysis: The quality control process usually takes precedence over the validation scope

29. Regarding the description of WBS, it is correct that: ( )

A. The work in the WBS provides services for deliverables

B. The content of the WBS will generally go beyond the scope of activities to complete the deliverables

C. Elements in a WBS can be the responsibility of one or more people

D. WBS shall include subcontracted work, but not management work

Reference answer: A

Resolution: WBS must be deliverable-oriented.

30. Regarding the description of the activity ordering, it is incorrect :( )

A. In , each activity has a unique activity number, and each activity indicates the duration of the activity

B. The activities flowing into the same node have common points and immediate activities

C. In the two-code network diagram, at least one of the immediate preceding events and immediately following events of any two activities is different

D. The hysteresis is the amount of time that the immediate activity needs to be postponed relative to the immediate activity, and is generally expressed as a negative value

Reference answer: D

Analysis: Hysteresis: Compared with the immediate activity, the amount of time that the immediate activity needs to be postponed, which is generally expressed by a positive value.

Still improving, complete 2023 on the information system project manager 75 multiple-choice questions + analysis and sharing! ~

In the first half of 2023, information system project managers comprehensive knowledge real questions + answers