When performing a general controls review, an IS auditor checks the relative location of the computer room inside the building. What potential threat is the IS auditor trying to identify? A. Social engineering B. Windstorm C. Earthquake D. Flooding1 2186
To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.1 1674
Which of the following is a control to detect an unauthorized change in a production environment? A. Denying programmers access to production data. B. Requiring change request to include benefits and costs. C. Periodically comparing control and current object and source programs. D. Establishing procedures for emergency changes.1 3349
Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports1 1780
Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking1 2601
Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.1 5600
Of the following who is MOST likely to be responsible for network security operations? A. Users B. Security administrators C. Line managers D. Security officers1 2405
Sales orders are automatically numbered sequentially at each of a retailer's multiple outlets. Small orders are processed directly at the outlets, with large orders sent to a central production facility. The MOST appropriate control to ensure that all orders transmitted to production are received and processed would be to: A. send and reconcile transaction counts and totals. B. have data transmitted back to the local site for comparison. C. compare data communications protocols with parity checking. D. track and account for the numerical sequence of sales orders at the production facility.1 2331
IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.1 2335
The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data1 1717
An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.1 2835
Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor1 2087
The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.1 3205
An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password1 4255
Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler1 5146
Hi, I am doing mba hr and having 4.4 yrs experience in marketing research and accounts payable together. Now i have 2 yrs of carrier break. Will it be advisable to do oracle hrms certification and grab new opportunities?
sir now i am pursuing BCA from DEC or UGC approved university pls tell me that i can apply its certificat in govt. jobs.
I have my NCFM certification-beginner's level exam at 9th of june. if anybody has any dump/test paper except those, present is nse-india site please send it to me at email@example.com thanks in advance
In Linux . for example some is entered in ur server or system they made some changes in ur server or system . how can u check that user activity . he already applied #history -c . how can u check that user activity
hai, i think to do certification in oracle 11i. Can any one help me regarding fee, duration , preparation, and how much it is use full for getting a good job.
For WebSphere MQ clients on some platforms, if a security exit is not defined, the values of two environment variables MQ_USER_ID and MQ_PASSWORD are transmitted to the server. On which of the following platforms are these environment variables used?
If any one has Informatica or Teradata certification dumps., Please forward it to my mail. I'm preparing for these certifications. My mail id firstname.lastname@example.org. Please do the needful.
how can get electrical supervisory competency certificate in state govt.
Hi can any one help me for 70-562 dumps?
what are the different symmetric algorithms?
What requirements should a VPN fulfill?
Can anyone give me Teradata TA0-121 certification exam dumps.....If anyone has plz send me on my mail Id email@example.com Thanx in advance.................
I am interested in doing QTP certification.Can u pls send me the details as to how to proceed with the same?Also can u pls send me the required study materials,question pattern and sample questions?My email id is firstname.lastname@example.org
I am sudhakar. I would like to interest to take 33kv supervisor license certificate. But I dont know how to apply how the application will get.when notification will rise.please let me know
108. Identify the one addition that is not part of the interface of a method a) Importing b) Result c) Exception d) Returning NOTE: I think the answer is B. Please comment if you are sure with your answer