Last visit was: 19 Nov 2025, 05:12 It is currently 19 Nov 2025, 05:12
Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
User avatar
Sajjad1994
User avatar
GRE Forum Moderator
Joined: 02 Nov 2016
Last visit: 18 Nov 2025
Posts: 17,289
Own Kudos:
49,302
 [2]
Given Kudos: 6,179
GPA: 3.62
Products:
Posts: 17,289
Kudos: 49,302
 [2]
Kudos
Add Kudos
2
Bookmarks
Bookmark this Post
User avatar
VIGHNESHKAMATH
Joined: 28 Sep 2021
Last visit: 21 Nov 2022
Posts: 151
Own Kudos:
53
 [1]
Given Kudos: 259
Posts: 151
Kudos: 53
 [1]
Kudos
Add Kudos
1
Bookmarks
Bookmark this Post
User avatar
hydr01
Joined: 24 May 2022
Last visit: 14 Dec 2023
Posts: 34
Own Kudos:
Given Kudos: 126
Location: United States
Posts: 34
Kudos: 10
Kudos
Add Kudos
Bookmarks
Bookmark this Post
User avatar
VidishaBanerjee
Joined: 16 Jun 2021
Last visit: 01 Jun 2023
Posts: 11
Own Kudos:
3
 [1]
Given Kudos: 7
Posts: 11
Kudos: 3
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Please provide the official explanation of question no. 2.

Posted from my mobile device
User avatar
Sajjad1994
User avatar
GRE Forum Moderator
Joined: 02 Nov 2016
Last visit: 18 Nov 2025
Posts: 17,289
Own Kudos:
49,302
 [1]
Given Kudos: 6,179
GPA: 3.62
Products:
Posts: 17,289
Kudos: 49,302
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
VidishaBanerjee
Please provide the official explanation of question no. 2.

Posted from my mobile device

Official Explanation

2. According to the passage, all of the following decrease the economic benefits of technological investment EXCEPT:

Difficulty Level: 700+

Explanation

The third paragraph clearly states that indirect losses and the cost of defending against cyber-threats reduce the benefts of technology investments, so you can eliminate Choices (B) and (D).

Likewise, in the second paragraph, you find evidence to support that theft of intellectual property is a risk of increased global connectivity created by technology investment, so Choice (A) is out.

The last sentence of the second paragraph also suggests that the way that companies approach cyber-threats — reacting to them only when they occur — is costly and will likely result in more cyber-attacks. Therefore, Choice (E) likely decreases the beneft of investing in technology.

The passage doesn’t indicate that the mere act of weighing risk and reward in itself incurs cost, so Choice (C) is the answer that has the least chance of decreasing the potential gains of investing in technology.

Answer: C
User avatar
singhaz
Joined: 20 Feb 2021
Last visit: 23 May 2023
Posts: 52
Own Kudos:
34
 [2]
Given Kudos: 24
Location: India
Concentration: Entrepreneurship, Technology
GPA: 2.8
Posts: 52
Kudos: 34
 [2]
1
Kudos
Add Kudos
1
Bookmarks
Bookmark this Post
All business investments require trade-offs between risk and reward. Does the interest rate on a new bond issue adequately compensate for the risk of default Are the potential revenues fromentering a new emerging market greater than the risk that the investments will be confiscated by a new regime? Does the value of oil extracted via deep-water, offshore drilling outweigh the chance of a catastrophic accident? Tough questions must be answered by weighing up the business imperatives against a calculation of the risk — and the greater the risk, the harder it is to make the case for investment.

Summary: All investments carry risk & higher risk means it is not sensible to make investment.

Technology investments are no different. They, too, have always been a trade-off between risk and return. However, for enterprise technology, increased global connectivity is raising the stakes on both sides of the equation. The commercial rewards from tapping into this connectivity are enormous, but the more tightly we are connected, the more vulnerabilities exist that attackers can exploit and the more damage they can do once inside. Therefore, when a manufacturer invests in a new product life-cycle management system, it is making a bet that the system will not enable the theft of valuable intellectual property. When a retailer invests in mobile commerce, it is betting that cyber-fraud won’t critically damage profitability. When a bank invests in customer analytics, it is betting that the sensitive data it analyzes won’t be stolen by cyber-criminals. The odds on all those bets appear to be shifting away from the institutions and toward cyber-attackers. They could swing decisively their way in the near future given most companies’ siloed and reactive approach to cybersecurity.

Summary: With connected technologies, more people are vulnerable to cyber attacks hence investment in new product needs this consideration.

Our interviews with business leaders, chief information officers (CIOs), chief technology officers (CTOs), and chief information security officers (CISOs) indicate that concerns about cyber-attacks are already affecting large institutions’ interest in and ability to create value from technology investment and innovation. Potential losses, both direct and indirect, reduce the expected economic benefits of technology investments, as do the high cost and lengthy time frame required to build the defense mechanisms that can protect the organization against a growing range of attackers. In short, the models companies use to protect themselves from cyber-attack are limiting their ability to extract additional value from technology.

Summary: Cyber attacks concerns big institutions. Cyber attacks are limiting companies capability.

Concern about cyber-attacks is already having a noticeable impact on business along three dimensions: lower frontline productivity, fewer resources for information technology (IT) initiatives that create value, and — critically — the slower implementation of technological innovations.

Summary: Cyber attacks decreases productivity & resources to create value, slows technological progress.

Overall: passage starts with risks in investment and then discusses about risk because of cyber attacks and their impacts.

1. The primary purpose of this passage is to

(A) identify gaps in the business world that lead to cybersecurity breaches
No
(B) refute the notion that companies are failing to thwart hackers
(C) discuss how the modern business marketplace is all about risk and reward
(D) explain how attention to cybersecurity impacts companies’ technological innovation
True
(E) demonstrate how today’s hackers are winning the fight against big corporations

2. According to the passage, all of the following decrease the economic benefits of technological investment EXCEPT:

(A) experiencing stolen intellectual property
Therefore, when a manufacturer invests in a new product life-cycle management system, it is making a bet that the system will not enable the theft of valuable intellectual property.

(B) realizing indirect losses
Potential losses, both direct and indirect, reduce the expected economic benefits of technology investments.

(C) weighing business outcomes and risks
True

(D) investing in cybersecurity protection technology
as do the high cost and lengthy time frame required to build the defense mechanisms that can protect the organization against a growing range of attackers

(E) reacting to cyber-threats only when necessary
They could swing decisively their way in the near future given most companies’ siloed and reactive approach to cybersecurity.In short, the models companies use to protect themselves from cyber-attack are limiting their ability to extract additional value from technology.

3. When the author asserts that companies take a “siloed and reactive” approach to cybersecurity, he is implying that companies
They could swing decisively their way in the near future given most companies’ siloed and reactive approach to cybersecurity.

(A) perform thorough research before implementing programs meant to improve cybersecurity
(B) combat problems after they have occurred
Yes
(C) have made strides against hackers in the ultimate battle of cybersecurity
(D) invest too much in cybersecurity
(E) take unnecessarily large investment risks and disregard the importance of cybersecurity

4. Which of the following is most likely an example of intellectual property as mentioned in the second paragraph?

(A) works of art posted to social media
(B) personal information, such as Social Security numbers or banking information
(C) computers and related technological devices
(D) customer and client lists and related contact information
(E) an outline of a streamlined manufacturing process
True

5. I bought a pair of glasses from an optometrist. One of the lenses regularly pops out of the frame. Therefore, this optometrist doesn’t know how to make a good pair of glasses. The reasoning in the argument is most vulnerable to criticism on the grounds that the argument

(A) does not allow the optometrist a chance to defend himself
(B) does not consider the possibility that other optometrists also make defective frames
(C) criticizes the optometrist’s use of a particular technique when making glasses
(D) jumps to the conclusion that the defect in the glasses must be due to the optometrist’s lack of skill
true
(E) accuses the optometrist of deliberately sabotaging the glasses
User avatar
Rabab36
Joined: 17 Jun 2022
Last visit: 23 Aug 2024
Posts: 244
Own Kudos:
Given Kudos: 67
Posts: 244
Kudos: 155
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Sajjad1994
GMATNinja

can someone explain Question -4
how to approach it
User avatar
Sajjad1994
User avatar
GRE Forum Moderator
Joined: 02 Nov 2016
Last visit: 18 Nov 2025
Posts: 17,289
Own Kudos:
49,302
 [1]
Given Kudos: 6,179
GPA: 3.62
Products:
Posts: 17,289
Kudos: 49,302
 [1]
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Rabab36
Sajjad1994
GMATNinja

can someone explain Question -4
how to approach it

Official Explanation

4. Which of the following is most likely an example of intellectual property as mentioned in the second paragraph?

Difficulty Level: 700

Explanation

The second paragraph specifically links the intellectual property to a new product life-cycle management system. The answer that relates most directly to proprietary product information is Choice (E), information regarding a proprietary product-manufacturing process.

Choice (A) describes intellectual property but not that which would likely be leaked in a new product life-cycle management system. The other choices aren’t examples of intellectual property.

Answer: E
User avatar
VerbalBot
User avatar
Non-Human User
Joined: 01 Oct 2013
Last visit: 04 Jan 2021
Posts: 18,832
Own Kudos:
Posts: 18,832
Kudos: 986
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Hello from the GMAT Club VerbalBot!

Thanks to another GMAT Club member, I have just discovered this valuable topic, yet it had no discussion for over a year. I am now bumping it up - doing my job. I think you may find it valuable (esp those replies with Kudos).

Want to see all other topics I dig out? Follow me (click follow button on profile). You will receive a summary of all topics I bump in your profile area as well as via email.
Moderators:
GMAT Club Verbal Expert
7443 posts
GMAT Club Verbal Expert
231 posts
GRE Forum Moderator
17289 posts
188 posts