Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) When performing a general controls review, an IS auditor checks the relative location of the computer room inside the building. What potential threat is the IS auditor trying to identify? A. Social engineering B. Windstorm C. Earthquake D. Flooding
1 5043To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.
1 4698Which of the following is a control to detect an unauthorized change in a production environment? A. Denying programmers access to production data. B. Requiring change request to include benefits and costs. C. Periodically comparing control and current object and source programs. D. Establishing procedures for emergency changes.
1 7948Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports
1 5750Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking
1 5970Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.
1 12964Of the following who is MOST likely to be responsible for network security operations? A. Users B. Security administrators C. Line managers D. Security officers
1 5419Sales orders are automatically numbered sequentially at each of a retailer's multiple outlets. Small orders are processed directly at the outlets, with large orders sent to a central production facility. The MOST appropriate control to ensure that all orders transmitted to production are received and processed would be to: A. send and reconcile transaction counts and totals. B. have data transmitted back to the local site for comparison. C. compare data communications protocols with parity checking. D. track and account for the numerical sequence of sales orders at the production facility.
1 5528IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.
1 5068The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data
1 4440An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.
1 5870Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor
1 5921The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.
1 7173An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password
1 8198Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler
1 7862
Which command we give if router ios stucked?
i am 18 years old and have located a college in usa which is favourable for me.i wanna ask that do i need to give a toefl test if i am going usa for language studies and one more thing, do i have to get toefl scores from some international institute or i can also get scores from my countrie's local institute which provide toefl tests.plzzzzzzzzz help me solve this confusion
In eigrp metric parameters which 2 options are enable by default?
How many types of ends in wan?
how many max partition are created in redhat linux
Can anyone of u pls suggest some good bit easy certification for QTP if any material found pls mail to pvlavanya@rediffmail.com
An update function module VF is called within subprogram VU .The program contains the call , VU on commit . At which point are the parameters for the update function VF evaluated ? a) when perform is executed b) at the beginning of function c) at commit work d) at start of v1 update e) at the end of the dialog step. Please answer only if you are very sure about this. Else please dont try.
i want study matterials and syllabus for hpux 11i v3 based certification (hp0-a01) for HPUX system administration.
Explain why is udp lease favored when compared to tcp?
Hi, Could anybody help me,by providing the ISTQB foundation level, materials or questions papers and patterns. What should I focus on..also plz tell me that how to prepare for this exam.. any reference books.. as i want to prepare it myself..plz reply.. my email-id is prameela.js@rediffmail.com or on prameela.js@gmail.com Thanks all in advance
Explain the difference between tftp and ftp application layer protocols?
How does PPTP encapsulate data?
The transfer function is y = x1 + 5x2, where X1 ~ N(5,12) and X2 ~ N(5,22). Which statement is true about the shape of y? [QID 809] 1) It must be a normal distribution since the means of the inputs are identical. 2) It will be a normal distribution. 3) It cannot be a normal distribution since the standard deviations of the inputs are different. 4) It is not normal.
What is the difference between arp and rarp?
How many types of ethernet?