You can view the questions in the exam, along with their answers, after completing the exam
Before you start writing these sample exam related questions, it is advisable to ensure you are ready, have adequate battery life and optimal network. This is because you have only 5 attempts to take the test or 6 months grace to assess course, before your login details become invalid, whichever comes first. The sample exam is a good practice, as it will familiarize you with the type of questions on the actual exam. Thus, feel free to answer, review as much as you can, and make any changes while answering the sample exam.
We urge you to read the following and then click on the link to start the sample exam.
Also view screenshots below the instructions
General information about the actual exam:
0 of 32 Questions completed
You have already completed the test before. Hence you can not start it again.
Test is loading…
You must sign in or sign up to start the test.
You must first complete the following:
0 of 32 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which of the following is considered a Threat to information security by human error?.
Which of the following is the FIRST step in conducting a security risk analysis
Which of the following is not considered a “best practice” that HR managers should consider to secure information security and privacy?.
Which of the following method that is used for collects qualitative data?
The team can BEST make its case by:.
The economic rationale for most security programs is based on which of the following cost considerations?.
The BEST way to test the theory is to:.
Which type of security breach is more difficult to monitor?.
What is the mode?.
Which of the following is not a recommended privacy protection practice?.
If an HR practitioner developed an economic or statistical model to identify costs and benefits associated with an HR program, this would be called a(n):.
What should HR advise the manager to look for in project team members?
When speaking with potential investors and potential employees, what is the MOST effective way to protect the organization’s proprietary information?.
Which of the following common selection techniques is least predictive of workplace violence?.
Which of the following diagrams would BEST illustrate this?.
Which of the following is the MOST important role HR can play a major change initiative?.
An issues log is a tool for project managers that will:.
With regard to technology security risks, which action would be most helpful?.
The budgeting effort in a project’s life cycle occurs during which phase?
The main purpose of an HRIS project status report is to:.
Which of the following is an Internet platform designed to link vendors, suppliers, and partners to the global enterprise?
Which of the following is not an advantage of the Human Resource Information System?.
Which of the following measures uses number of incumbents and salary?
Increasingly, the failure to successfully implement HRIS has to do with:.
An effort to consciously gather, organize and share information internally is called:
Which of the following technologies has the GREATEST impact on policies and procedures concerning privacy?.
A company requirement that employees show their badges on entering the building would be considered part of which security measure?.
What can be done to reduce resistance to change to a new HRIS?.
All of the following are important in efforts to protect information in an organization EXCEPT.
Which is the prioritized step to implement HRIS is?
What is the MEAN of the following salaries? 40,000; 50,000; 65,000; 76,000..
The PRIMARY priority of a project manager who is exhibiting the interpersonal role is: