Explanation for Question 11. Given the information in the passage, which of the following statements is the author of the passage most likely to believe?A. To identify vulnerabilities, many companies and governments research their OSS but not their other software.Scanning the passage for "research" and "software," we find the following:
many governments and companies research all their software in order to identify vulnerabilities
We say that the passage says that companies and governments research "all their software," so both OSS and other software.
Eliminate.
B. Many of the vulnerabilities first identified in OSS are the same as vulnerabilities found in other software.The passage does not say that vulnerabilities identified in OSS are the same as vulnerabilities in other software.
Eliminate.
C. To identify vulnerabilities, many companies and governments research their non-OS software but not their OSS.Scanning the passage for "research" and "software," we find the following:
many governments and companies research all their software in order to identify vulnerabilities
We see that the passage says that companies and governments research "all their software," so both non-OS software and OSS.
Eliminate.
D. Many of the vulnerabilities first identified in non-OS software are the same as vulnerabilities found in OSS.The passage does not say that vulnerabilities identified in non-OS software are the same as vulnerabilities in OSS.
Eliminate.
E. To identify vulnerabilities, many companies and governments research both their OSs and their other software.Scanning the passage for "research" and "software," we find the following:
many governments and companies research all their software in order to identify vulnerabilities
We see that the passage says that companies and governments research "all their software," so both their OSs and their other software, as this choice says.
The correct answer is (E).
Explanation for Question 22. Which of the following most accurately describes the function of the first paragraph?Reviewing the passage, we see that it's structured in the following way:
The first paragraph begins by stating the importance of "securing digital information."
It next introduces the concept of "large-scale risks arising from easily correctable vulnerabilities in commonly used operating systems (OSS) or other software."
Then, it poses the question "But if these vulnerabilities are known and easily correctable, why do they remain such a high risk?
Finally, it states that "There are two primary reasons."
Then, the second and third paragraphs present those "two primary reasons," one in each paragraph.
A. It states a thesis that is supported by each of the other two paragraphs.The passage does not state a thesis in the first paragraph. Rather, it asks a question that is answered by the second and third paragraphs.
Eliminate.
B. It defines the essential characteristics of a term, and the other two paragraphs report how the term is used in government and business.The first paragraph does not define a term, and the second and third paragraphs do not say how a term is used.
Eliminate.
C. It expresses a question that is answered affirmatively in the second paragraph and negatively in the third.This choice is half right, in that the first paragraph does express a question: "But if these vulnerabilities are known and easily correctable, why do they remain such a high risk?"
However, the second and third paragraphs don't answer that question "affirmatively," or "yes," or "negatively," or "no." In fact, the question is not even a yes/no question that could be answered affirmatively or negatively.
Rather, the question asks, "Why?" and the second and third paragraphs present reasons why the vulnerabilities remain a high risk.
Eliminate.
D. It describes a problematic situation, and the subsequent two paragraphs explain why that situation exists.This choice describes exactly what the paragraphs do.
The first paragraph describes a problematic situation in which "there are also large-scale risks arising from easily correctable vulnerabilities in commonly used operating systems (OSS) or other software, and these vulnerabilities are known by at least some companies or governments."
Then, the second and third paragraphs present reasons "why that situation exists."
Keep.
E. It presents well-known evidence for a given phenomenon, and the other two paragraphs support that evidence.The first paragraph does present a "phenomenon," that "there are also large-scale risks arising from easily correctable vulnerabilities in commonly used operating systems (OSS) or other software, and these vulnerabilities are known by at least some companies or governments."
However, it presents no evidence for that phenomenon, and the second and third paragraphs do not provide support for any evidence. Rather, they present explanations.
Eliminate.
The correct answer is (D).
Explanation for Question 33. Which of the following is the closest analogy for the scenario described in the third paragraph?Reviewing the third paragraph, we see that the scenario involves a way to address an issue, software vulnerability, being available but not used.
A. A farmer's crop was damaged by a rare disease, but some of the crop was salvaged.The scenario in the third paragraph involves a vulnerability, not damage, and does not involve salvage.
Eliminate.
B. An attorney disclosed evidence to an opposing attorney, but neither attorney used the evidence at trial. This choice does involve something not being used as does the scenario described by the third paragraph, but this scenario seems different in that there is no issue that remains unaddressed.
Keep in case there's no better choice.
C. A customer complains to a retail store about a recently purchased product, but the retail store refused to issue a refund to the customer.The scenario described by this choice involves an issue, one with a product, as the scenario described by the third paragraph does, but it does not involve a fix that goes unused.
Eliminate.
D. A manufacturer recalls a defective product, but some owners of the product deliberately choose not to have it fixed.Like the scenario described by the third paragraph, the scenario described by this choice involves an issue, defectiveness of a product, and a way to address that issue that goes unused.
Keep.
E. A corporation has a policy that is supposed to regulate how two divisions interact, but the policy will soon be changed.The scenario described by this choice has basically nothing in common with the scenario described by the third paragraph. After all, in this scenario, there is no issue and no way to address an issue that goes unused.
Eliminate.
Since the scenario described by (D) is clearly analogous to the scenario described by the third paragraph whereas the scenario described by (B) has only an issue and not a way to address that issue, we'll choose (D) over (B).
The correct answer is (D).