New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HRCI aPHRi - Associate Professional in Human Resources - International

Page: 2 / 6
Total 177 questions

Which of the following should HR do to prepare to interview a candidate?

A.

Produce a job description

B.

Review the candidate's resume

C.

Share resumes with the hiring manager

D.

Screen applications for relevant experience

What initiative aims to create a workforce that reflects the local population and an organization’s customers?

A.

Diversity

B.

Recognition

C.

Social responsibility

The stage during which an employee’s suitability for the job is determined is known as:

A.

Orientation.

B.

Onboarding

C.

Probation.

D.

On-the –job training (OJT).

Stalking text messages and threatening emails are examples of:

A.

Power abuse

B.

Cyberbullying

C.

Interpersonal conflict

D.

Sexual harassment

Match the job analysis method to the correct description.

Employees are most likely to experience a high level of job satisfaction when their jobs include:

A.

Task variety

B.

Management duties

C.

Repetitive assignments.

D.

Delegation of authority

Which of the following is the best option for measuring the monetary value of a training program?

A.

Cost-benefit analysis

B.

Learning program costs

C.

Learning management system (LMS)

D.

Return on investment (ROI)

A key indicator of an engaged employee is:

A.

Socializing with colleagues

B.

Achieving minimum targets

C.

Attending meetings regularly

D.

Alignment with organizational goals

Which of the following best defines the process of promoting an organization as desirable in the labor market?

A.

Social influencing

B.

Strategic planning

C.

Marketing initiatives

D.

Employment branding

To help protect the internal network, an organization should:

A.

Warm employees by sharing suspicious emails.

B.

Prevent the installation of unlicensed software.

C.

Reveal passwords only to supervisors and managers.

D.

Give all employees access to the organization’s firewall.