1. Home
  2. GAQM
  3. CITM-001 CITM Dumps

Eliminate Risk of Failure with GAQM CITM-001 Exam Dumps

Schedule your time wisely to provide yourself sufficient time each day to prepare for the GAQM CITM-001 exam. Make time each day to study in a quiet place, as you'll need to thoroughly cover the material for the Certified Information Technology Manager Exam . Our actual Certified Information Technology Manager exam dumps help you in your preparation. Prepare for the GAQM CITM-001 exam with our CITM-001 dumps every day if you want to succeed on your first try.

All Study Materials

Instant Downloads

24/7 costomer support

Satisfaction Guaranteed

Q2.

Which of the following best suits the statement below? It's the main memory of the computer system and is volatile

Answer: A

See the explanation below.

RAM, or Random Access Memory, is the best fit for the statement because it is the main memory of the computer system and is volatile. RAM is a type of computer memory that is used to store data that is currently being used by the computer's operating system and applications. RAM is volatile because it loses its contents when the power supply to the computer is turned off or interrupted. RAM is also faster and more expensive than other types of memory, such as ROM, PROM, or hard disk, which are non-volatile and can retain data without power. RAM is divided into two types: static RAM (SRAM) and dynamic RAM (DRAM), which differ in their speed, power consumption, and design.Reference

https://en.wikipedia.org/wiki/Volatile_memory

https://www.bbc.co.uk/bitesize/guides/zfyyb82/revision/1

https://www.proprofs.com/quiz-school/story.php?title=information-technology-quiz_7


Q5.

A malicious program that records a user's keystrokes is an example of:

Answer: A

See the explanation below.

A malicious program that records a user's keystrokes is an example of aTrojan horse. A Trojan horse is a type of malware that masquerades as a legitimate file or application, but secretly performs malicious actions in the background. A Trojan horse can be used to install other malware, such as keyloggers, on the victim's device. A keylogger is a specific type of Trojan horse that captures and sends the user's keystrokes to a remote attacker, who can use them to steal sensitive information, such as passwords, credit card numbers, or personal data.

The other options are not correct because:

Adware is a type of malware that displays unwanted advertisements on the user's device, often redirecting them to malicious websites or installing more malware. Adware does not necessarily record the user's keystrokes, although some adware may have keylogging capabilities.

An anti-virus program is a software that protects the user's device from malware, such as viruses, worms, ransomware, spyware, etc. An anti-virus program does not record the user's keystrokes, but rather scans and removes any malicious programs that may do so.

A performance monitor is a software that measures and displays the performance of the user's device, such as CPU usage, memory usage, disk space, network traffic, etc. A performance monitor does not record the user's keystrokes, but rather provides useful information for troubleshooting or optimizing the device.


CITM Study Guide, Chapter 7: IT Security Management, pp. 131-132

What Is a keylogger and how to detect keystroke logging - Norton

Keylogger: how to recover the infected pc? - Panda Security

Are You Looking for More Updated and Actual GAQM CITM-001 Exam Questions?

If you want a more premium set of actual GAQM CITM-001 Exam Questions then you can get them at the most affordable price. Premium Certified Information Technology Manager exam questions are based on the official syllabus of the GAQM CITM-001 exam. They also have a high probability of coming up in the actual Certified Information Technology Manager Exam .
You will also get free updates for 90 days with our premium GAQM CITM-001 exam. If there is a change in the syllabus of GAQM CITM-001 exam our subject matter experts always update it accordingly.