AIIM IQ0-100 Certification Dumps

AIIM IQ0-100 Certification Dumps

 
Question No : 1 –
Which of the following are possible approaches to defining enterprise content classification
structures? (Choose 2)
A. Enterprise taxonomy
B. Controlled vocabulary
C. Collaborative folksonomy
D. Enterprise data syndication

Answer : A,C

Question No : 2 –
An organization has an issue with identifying the most recent version of information stored
on shared drives. The organization should do which of the following to resolve this issue?
A. Migrate to a document management solution.
B. Establish naming conventions for versions.
C. Create spreadsheets with versioning information.
D. Implement a records management program.
Answer : A

Question No : 3 –
An organization seeks to create a cost-effective test and simulation environment. Which of
the following would be a good recommendation? (Choose 2)
Answer : Purchase new servers. Use emulation software. Use notebook PCs as servers. Use virtualization software. B, D

Question No : 4 –
What is the primary challenge to implementing telecommuting technologies?
A. Email use
B. Privacy issues
C. Networking issues
D. Managing worker hours
Answer : C

Question No : 5 –
An organization seeks to streamline and automate current review processes. Which of the
following is the best choice?
A. Business process re-engineering
B. Work flow
C. Routing
D. Systems integration
Answer : B

Question No : 6 –
A social media team should have representatives from which of the following areas?
(Choose 3)
A. Executive Management
B. Information Technology
C. Financial Management
D. Records Management
E. Administrative Services
F. Communications
Answer : B,D,F

Question No : 7 –
The first step in a Change Management process is to identify
A. The affected stakeholder(s).
B. Reason for change(s).
C. Other impacted systems and resources.
D. The time frame for implementing the change.
Answer : B

Question No : 8 –
A means to capture, monitor, and leverage intellectual capital within communities of
practice is known as
A. Information Sharing
B. Knowledge Management
C. Information Transference
D. Knowledge Delivery
Answer : B

Question No : 9 –
A finclability strategy can improve access to content by (Choose 3)
A. Expecting the end user to take responsibility for better searching,
B. Emphasizing precision as opposed to recall in search results,
C. Updating search tools with more advanced user interfaces,
D. Organizing content with tools like taxonomies and ontologies.
E. Deploying separate search solutions for different content types.
F. Dynamically offering new content in response to user behavior.
Answer : C,D,F

Question No : 10 –
In order for a content rating system to be successful, it has to
A. Be social and relevant to a community of interest.
B. Allow rating on a scale from one to ten.
C. Give individuals the opportunity to provide commentary feedback.
D. Be limited to individuals who have subject matter expertise.
Answer : A

Question No : 11 –
A statement of work (SOW) for an information management project is intended to
A. Define the scope of the project,
B. Provide project reporting.
C. Identify return on investment.
D. Identify what is to be delivered.
Answer : A,D

Question No : 12 –
Best practice for managing email is to
A. Keep email indefinitely to avoid spoliation.
B. Keep only those emails that are needed, for as long as they are needed.
C. Delete email on a regimented schedule.
D. Allow employees to manage their own email as they choose.
Answer : B

Question No : 13 –
The purpose of a separator sheet during document capture is to
A. Separate each page of a document in a batch.
B. Separate documents within a batch.
C. Ensure back pages in a batch are scanned.
D. Identify the last page of a document.
Answer : B

Question No : 14 –
Which of the following are included in a controlled vocabulary? (Choose 2)
A. Synonyms
B. Preferred terms
C. Classification schemes
D. Use cases
Answer : A,B

Question No : 15 –
An organization wants to classify a large collection of images, videos, and presentations
used by a large, distributed group. Which of the following techniques offers a low-cost,
decentralized approach to classification?
A. Controlled vocabulary
B. Corporate taxonomy
C. Folksonomy
D. Enterprise wiki
Answer : C

Question No : 16 –
An international organization with regional finance departments suspects there are
inconsistent processes. Which method should be used to identify inconsistencies and
develop recommendations for change?
A. Business analysis
B. Content analysis
C. Performance analysis
D. Bandwidth analysis
Answer : A

Question No : 17 –
What is the difference between a functional requirement and a nonfunctional requirement?
A. A functional requirement describes the behavior of the system while a nonfunctional requirement describes the required qualities of the system.
B. A functional requirement describes the quality attributes of a system while a nonfunctional requirement describes the capabilities of a system.
C. A functional requirement describes an in-scope feature desired while a nonfunctional requirement describes items which have been de-prioritized.
D. A functional requirement describes the solution of a system while a nonfunctional requirement describes the implementation of a system.
Answer : A

Question No : 18 –
The following factors should be considered when retaining or archiving electronic
information for an extended period of time. (Choose 2)
A. Operating system obsolescence
B. Degradation of storage media
C. 24/7 user support
D. Changes in backup frequency
Answer : A,B

Question No : 19 –
How can information technologies best enable master data management (MDM) in an
organization?
A. Capture vast quantities of data and information.
B. Move data and information from one system to another.
C. Reuse data and information to complete an organization’s transactions.
D. Deliver data and information to people.
Answer : B

Question No : 20 –
Instant messaging (IM) systems are sometimes more effective than email because
A. IM systems cannot be used to transmit computer worms or viruses.
B. Conversations conducted on IM systems are not considered records.
C. IM enables instant, real-time communication among multiple users.
D. IM’s encryption features prevent users from disclosing confidential information.
Answer : C

Question No : 21 –
All of the following are examples of cloud computing deployment models except
A. Public cloud.
B. Server cloud.
C. Community cloud.
D. Hybrid cloud.
Answer : B

Question No : 22 –
Some of the primary business benefits driving deployment of web conferencing are
(Choose 2)
A. Leveraging investment in unified communications infrastructure.
B. Enabling informational sessions to be recorded and re-used.
C. Enhancing corporate reputation by utilizing “green” technologies.
D. Allowing web meeting content to be monitored by corporate security.
Answer : B,C

Question No : 23 –
Documents that have undergone a format conversion must have accurate and thorough
metadata captured in order to demonstrate (Choose 2)
A. Authenticity
B. Despeckling
C. Reliability
D. Transferability
Answer : A,C

Question No : 24 –
Key components of a successful email management program include which of the
following? (Choose 2)
A. Utilizing technology as the main program driver
B. Developing policies and procedures
C. Taking into consideration business processes
D. Managing email in distributed environment
Answer : B,C

Question No : 25 –
In a Strengths, Weakness, Opportunities, and Threats (SWOT) analysis, the factors
external to the organization include
A. Strengths and weaknesses.
B. Strengths and threats.
C. Opportunities and weaknesses.
D. Threats and opportunities.
Answer : D

Question No : 26 –
Which of the following are potential benefits included in a business case for a workflow
solution? (Choose 3)
A. Improved customer service
B. Operational cost reduction
C. End user adoption
D. Compliance and risk reduction
E. Implementation cost reduction
F. Better documentation
Answer : A,B,D

Question No : 27 –
Which of the following are examples of records disposition? (Choose 2)
A. Physical destruction or deletion
B. Reassignment of metadata identifiers
C. Transfer to an off-site storage facility
D. Data analytics and mining
Answer : A,C

Question No : 28 –
Organizations with many information systems should define a business process integration
strategy that includes (Choose 2)
A. ISO 9000 and ISO 9001.
B. Sponsors, customers, and end users.
C. Commercial, custom, and legacy applications.
D. Dublin Core and XML.
Answer : B,C

Question No : 29 –
Which strategy is most efficient at yielding accurate results from a search based on a
litigation hold?
A. Identifying information in databases
B. Retrieving information from off-site storage facilities
C. Evaluating email and electronic systems
D. Developing search parameters
Answer : D

Question No : 30 –
An organization has just released a new. completely redesigned website. The website
bounce rate has increased by 20 percent over the previous site’s. The website manager
suspects the issue results from confusion caused by the new website’s structure, layout
and/or visual cues. The best recommendation is to start investigating by doing
A. A/B testing.
B. Multivariate testing.
C. Usability testing,
D. Conversion testing.
Answer : C

Question No : 31 –
Which of the following are examples of asynchronous collaboration? (Choose 2)
A. Online meetings
B. Shared workspaces
C. Wikis
D. Instant messaging (IM)
Answer : B,C

Question No : 32 –
Which of the following is the best definition of text analytics?
A. The process of transforming content into a format that can reliably be searched, retrieved, and used by the organization- such as scanning. Web capture, fax capture, mobile capture, and document imaging.
B. Methods of collaboration and communication through internal channels, internet email, telephone, company-controlled external channels, and/or branded external channels.
C. A combination of semantic analysis, linguistics, entity extraction, tagging, pattern recognition, lexical analysis, and other forms of artificial intelligence used to infer meaning from bodies of content.
D. A set of activities required for systematic analysis and control of creation, receipt, classification, maintenance, use, and disposition of recorded information maintained as evidence of business activities and transactions.
Answer : C

Question No : 33 –
Which of the following measures can be taken to secure information during web
conferencing? (Choose 3)
A. Set the meeting recording option to “always on.”
B. Close desktop sharing when no longer needed.
C. Create a unique, strong password for each meeting.
D. Use the phone to conduct the audio portion of web meetings.
E. Hide lists of meeting topics to keep sensitive topics confidential.
F. Implement a firewall at home for web conference participation.
Answer : B,C,E

Question No : 34 –
What is the most effective way to capture and manage content posted to commercial social
media sites? (Choose 2)
A. Use the sites’ native capabilities and APIs to identify and capture relevant content,
B. Capture content as screenshots, then print and file according to the classification system.
C. Create applicable search queries and RSS feeds and capture the resulting outputs.
D. Develop custom applications that can capture content directly from the sites.
Answer : A,C

Question No : 35 –
Two differences between mobile websites and mobile native applications are that (Choose
2)
A. Mobile websites require certification and distribution through third parties (e.g. iPhone App Store), while native applications do not.
B. Mobile native applications load pages more slowly than mobile websites, due to network latency.
C. Mobile websites are supported by nearly all mobile browsers, while native applications are built on different platforms depending on the device.
D. Mobile native applications offer best-in-class user experience, while mobile web applications are limited by browser capabilities.
Answer : C,D

Question No : 36 –
Three organizations are collaborating on a project, using a distributed information
architecture. Each organization has its own procedure for giving privileges to information,
resulting in inconsistent access to information. The project manager asks the information
manager to recommend a solution that gives team members consistent access to
information. The information manager’s recommendation is to
A. Develop a standard checklist for all administrators to use.
B. Route all access requests to one administrator.
C. Control user privileges based on the user’s organization,
D. Control user privileges based on the user’s role.
Answer : D

Question No : 37 –
What are the primary organizational drivers for pursuing enterprise content management
(ECM)? (Choose 2)
A. Application integration
B. Regulatory compliance
C. Business efficiency
D. Employee motivation
Answer : B,C

Question No : 38 –
Which of the following is a key benefit of metadata?
A. It is used specifically for electronic records management.
B. It determines retention value.
C. It supports and ensures the evidential value of records.
D. It ensures transparency in an organization.
Answer : C

Question No : 39 –
Digital rights management (DRM) provides which of the following? (Choose 2)
A. A system used to control access to copyrighted material using technological means
B. The use of authentication techniques to sign electronic documents and authorize electronic transactions
C. The controls for product authenticity, user fees, terms-of-use and expiration of rights
D. Implementation of laws regarding privacy of personal information in the workplace
Answer : A,C

Question No : 40 –
Vital records are defined as records that are fundamental to the functioning of an
organization and are necessary to continue operations during
A. Normal circumstances.
B. An external audit.
C. Extraordinary conditions.
D. Litigation.
Answer : C

Question No : 41 –
What are the key benefits of implementing an instant messaging (IM) solution in a
geographically distributed global organization? (Choose 2)
A. Auto-translation between languages
B. Online presence
C. Real-time messaging
D. Quality of service (QoS)
Answer : B,C

Question No : 42 –
A mobile satellite communications provider wants to use an enterprise portal(s) to increase
the efficiency of its globally dispersed staff. What is the best approach to achieve a
collaborative information workplace?
A. Integrate data, content, information, knowledge, and applications across the organization into one portal.
B. Integrate Web content and documents across the organization into one portal and keep records, data, and applications separate.
C. Integrate data and applications to produce graphical analytic dashboards and allow the use of an existing content management platform.
D. Integrate content, information, and knowledge into one portal and keep data and applications in a separate secure portal.
Answer : A

Question No : 43 –
Social tagging capabilities of enterprise social media are also referred to as
A. mashups
B. folksonomies
C. microblogging
D. cloud computing
Answer : B

Question No : 44 –
A third-party vendor is in possession of an organization’s records. Best practice for the
organization is to do which of the following? (Choose 2)
A. Have the third-party vendor manage and retain records in accordance with the vendor’s policy.
B. Have the third-party vendor manage and retain records in accordance with the organization’s policy.
C. Limit the scope of any litigation matter by excluding records retained by a third-party vendor.
D. Notify the third-party vendor of relevant legal holds and require acknowledgement and action.
Answer : B,D

Question No : 45 –
Three organizations are collaborating on a project. The project has a distributed information
architecture where information is distributed across many systems hosted by the different
organizations. The team developed a list of system URLs and frequently-accessed
information, but many team members still cannot readily locate information. The project
manager asked the information manager to recommend a quick and relatively inexpensive
solution that allows all team members to find information more easily. The information
manager’ s recommended solution is to
A. Use a standard taxonomy for all systems.
B. Develop a web portal for the project team.
C. Develop a federated search strategy that will integrate all systems.
D. Move all information to one Enterprise Content Management (ECM) system.
Answer : B

Question No : 46 –
Knowledge Management should be seen as a (n) (Choose 2)
A. Ongoing practice.
B. Emerging market.
C. Toolset.
D. Discipline.
Answer : A,D

Question No : 47 –
Advantages of using open-source software include (Choose 2)
A. A consistent and reliable software road map.
B. The ability to make changes to the code,
C. The absence of a software license,
D. The low cost of acquiring the software.
Answer : B,D

Question No : 48 –
A website privacy policy should provide which of the following options?
A. Users are able to obtain information from the site without providing personal data.
B. Users can elect not to receive future emails or share their information with third parties.
C. Users are of the age of majority in their jurisdiction.
D. Users can create a user name and password without providing personal data.
Answer : B

Question No : 49 –
Primary benefits of cloud computing include which of the following? (Choose 2)
A. Agile development
B. Resource pooling
C. Global connectivity
D. Rapid elasticity
Answer : B,D

Question No : 50 –
The business requirements for a new Web Content Management <WCM) implementation
require the development of a new proprietary module. This is an example of WCM
A. Configuration
B. Customization
C. Extension
D. Integration
Answer : C