Certifications Interview Questions
Questions Answers Views Company eMail

When performing a general controls review, an IS auditor checks the relative location of the computer room inside the building. What potential threat is the IS auditor trying to identify? A. Social engineering B. Windstorm C. Earthquake D. Flooding

1 2227

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

1 1714

Which of the following is a control to detect an unauthorized change in a production environment? A. Denying programmers access to production data. B. Requiring change request to include benefits and costs. C. Periodically comparing control and current object and source programs. D. Establishing procedures for emergency changes.

1 3403

Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports

1 1815

Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking

1 2634

Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.

1 5697

Of the following who is MOST likely to be responsible for network security operations? A. Users B. Security administrators C. Line managers D. Security officers

1 2461

Sales orders are automatically numbered sequentially at each of a retailer's multiple outlets. Small orders are processed directly at the outlets, with large orders sent to a central production facility. The MOST appropriate control to ensure that all orders transmitted to production are received and processed would be to: A. send and reconcile transaction counts and totals. B. have data transmitted back to the local site for comparison. C. compare data communications protocols with parity checking. D. track and account for the numerical sequence of sales orders at the production facility.

1 2365

IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.

1 2387

The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data

1 1755

An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.

1 2872

Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor

1 2147

The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.

1 3248

An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password

1 4299

Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler

1 5189

Un-Answered Questions { Certifications }

What is the procedure to install the crital patch/package on the SVM ( root mirroring ).


Can you explain different components in PKI?


In IPSec what is SAD, SPD and SA's?


is Karnataka state university fake or recogn.


How does PPTP encapsulate data?


Hi , I am planning to take up OCA certification.Can you please provide me with the path for Oracle DBA certi.If any one of you have dumps for same,please mail them to sajagporwal123@gmail.com.Please give me any tips if possible.


I have done GNIIT software engneering and B.COM and also i have 1yr exp in oracle DBA can i do oracle DBA certification plz adviced me frnds....as early possible with certification details...


hi, I have apply twice for visitor visa and I was asked if I have a child and I said no I never knew, but I have seven y (7)year old child . and I plan to reapply for the third time show I tell them that I have a 7 year old child? my child mother and I was loving and later she and her family travel another county were there no communication between , in 2014 they came back and she bought my beautiful duather .


what are the different asymmetric algorithms?


Please could any send me Informatica power center developer certification dumps @    tsailunet@gmail.com? Thanks in advance


I studied btech in one of the university but i failed in some subjects so im editing all and trying to apply for ms in USA is there any problem..?? But i have all btech certificates of same college only..


Can anyone pls let me knnow is there any change in dump recently(in 2011 ) for IBM EXAM703 ?


mcse 2003 to mcitp upgrade paper


Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.


Do you know at least 5 principles of a database system? plz send me with examples