Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) Which of the following would be of MOST concern to an IS auditor reviewing a VPN implementation? Computers on the network that are located: A. on the enterprise's facilities. B. at the backup site. C. in employees' homes. D. at the enterprise's remote offices.
1 5290Which of the following reports is a measure of telecommunication transmissions and determines whether transmissions are completed accurately? A. Online monitor reports B. Downtime reports C. Help desk reports D. Response time reports
1 4743Which of the following development methods uses a prototype that can be updated continually to meet changing user or business requirements? A. Data-oriented development (DOD) B. Object-oriented development (OOD) C. Business process reengineering (BPR) D. Rapid application development (RAD)
1 4353Which of the following procedures would BEST determine whether adequate recovery/restart procedures exist? A. Reviewing program code B. Reviewing operations documentation C. Turning off the UPS, then the power D. Reviewing program documentation
1 4846Which of the following imaging technologies captures handwriting from a preprinted form and converts it into an electronic format? A. Magnetic ink character recognition (MICR) B. Intelligent voice recognition (IVR) C. Bar code recognition (BCR) D. Optical character recognition (OCR)
1 4335A probable advantage to an organization that has outsourced its data processing services is that: A. needed IS expertise can be obtained from the outside. B. greater control can be exercised over processing. C. processing priorities can be established and enforced internally. D. greater user involvement is required to communicate user needs.
1 7617The act that describes a computer intruder capturing a stream of data packets and inserting these packets into the network as if it were another genuine message stream is called: A. eavesdropping. B. message modification. C. a brute-force attack. D. packet replay.
1 4967When implementing and application software package, which of the following presents the GREATEST risk? A. Uncontrolled multiple software versions B. Source programs that are not synchronized with object code C. Incorrectly set parameters D. Programming errors
1 8961Which of the following is a check (control) for completeness? A. Check digits B. Parity bits C. One-for-one checking D. Prerecorded input
1 7344Which of the following database administrator (DBA) activities is unlikely to be recorded on detective control logs? A. Deletion of a record B. Change of a password C. Disclosure of a password D. Changes to access rights
1 8832An Internet-based attack using password sniffing can: A. enable one party to act as if they are another party. B. cause modification to the contents of certain transactions. C. be used to gain access to systems containing proprietary information. D. result in major problems with billing systems and transaction processing agreements.
1 9124An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.
1 5482After a full operational contingency test, the IS auditor performs a review of the recovery steps and concludes that the elapsed time until the technological environment and systems were actually functioning, exceeded the required critical recovery time. Which of the following should the auditor recommend? A. Perform an integral review of the recovery tasks. B. Broaden the processing capacity to gain recovery time. C. Make improvements in the facility's circulation structure. D. Increase the amount of human resources involved in the recovery.
1 5115Which of the following controls would provide the GREATEST assurance of database integrity? A. Audit log procedures B. Table link/reference checks C. Query/table access time checks D. Rollback and rollforward database features
1 16874Which of the following is a strength of the program evaluation review technique (PERT) over other techniques? PERT: A. considers different scenarios for planning and control projects. B. allows the user to input program and system parameters. C. tests system maintenance processes accurately. D. estimates costs of system projects.
1 6953
1900 Value in which type of access list?
Dear Sir/Madam, I have passed lic ado written exam and my interview on 29th sep. I belong to OBC and I dont have current non creamy- layer certificate but I applied and will get within a month as per the new policies of State Govt, i have caste certificate and non creamy layer certificate of 2002. Can I eligible for the selection, plz reply me on anil_i13@yahoo.co.in or call me 09158153313.
What is the multicast routing?
Which company mange api's?
Do any of you have SCJP 6.0 certification voucher valid till Aug 2010?
What is DHCP stand for?
Who controls mac address uniqueness and how?
Does import of CRNO slit coils requires BIS certification ?
Define the different kinds of casting
In port based access-list which command u give instead of ip?
I have my NCFM certification-beginner's level exam at 20th of feb. if anybody has any dump/test paper except those, present is nse-india site please send it to me at rashi_khushi@rediffmail.com thanks in advance
Domain Trust In Red Hat Linux Dear Friends, I have one doubt, If i have 2 Red hat Linux Server am using 2 domain namely RED & ROSE, and I have 20 or more than 20 XP machine in client, it’s all running by the samba users in RED Domain, the client systems (XP machines) are work both RED & ROSE Domain means , like Domain trust concept, how to configure the Server Main Domain is RED, if it’s go down means it will be working by ROSE Domain can you please give the instruction for this query.
Which command we use for ping in ipv6?
how can we write this exam and what are its qualifications
In a GLP facility who will decide whether a study to be conducted as GLP or Non-GLP study