When performing a general controls review, an IS auditor checks the relative location of the computer room inside the building. What potential threat is the IS auditor trying to identify? A. Social engineering B. Windstorm C. Earthquake D. Flooding1 2485
To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.1 1997
Which of the following is a control to detect an unauthorized change in a production environment? A. Denying programmers access to production data. B. Requiring change request to include benefits and costs. C. Periodically comparing control and current object and source programs. D. Establishing procedures for emergency changes.1 3746
Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports1 2076
Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking1 3022
Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.1 6507
Of the following who is MOST likely to be responsible for network security operations? A. Users B. Security administrators C. Line managers D. Security officers1 2773
Sales orders are automatically numbered sequentially at each of a retailer's multiple outlets. Small orders are processed directly at the outlets, with large orders sent to a central production facility. The MOST appropriate control to ensure that all orders transmitted to production are received and processed would be to: A. send and reconcile transaction counts and totals. B. have data transmitted back to the local site for comparison. C. compare data communications protocols with parity checking. D. track and account for the numerical sequence of sales orders at the production facility.1 2566
IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.1 2580
The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data1 1947
An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.1 3193
Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor1 2696
The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.1 3544
An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password1 4745
Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler1 5450
1. The Write statement was written and suddenly the program
was showing something different what can be the reason WRITE
a)User must have choosen a different language
b) User must have made the line inactive at the Runtime.
c)There must something different Written on the Text element .
d)If nothing is mentioned in the Multilingual Table what
will be the output.
2. how the Transaction Variant.will be helpful to the Enduser?
a)hide the screen Field.
b)To change the Flow Logic.
c)To schedule background process
3. Rollback to be done at the dialog work process what will
a) Rollback work
b) Message A
c) Message E
d) Rollback work at the End of the PAI.
4) Rollback at the LUW concept.
a)You will write the Code at the PAI Block of the Each
b)You will write the Code ROLLBACK work at the End of the
LUW PAI block.
5. Field statement regarding the CHAIN INPUT
If the user has committed any wrong value on the one Field
of the Cain Input.
And what will be the syntax.
What technique would you use to fix the 10 leftmost columns on a list when scrolling to the right? a) Set Left Scroll-Boundary Column 10 b) Set Right Scroll-Boundary Column 10 c) Scroll List PS+<10> d) Scroll List Left Note: My answer for this question is A. But if you think different then pls give link or explain how.
aadhaar certification questions
I have complete the I.T.I electrician and 12 years experience on this field. How to get electrical supervisor certificate by tamilnadu electrical license board
Where can I get LAtest qtp 2010 exam questions ?
what is an added benefit for using vortex pumps?
How can we Change the IP-Phone/VM Login or Owner name in CME GUI Mode..
how can get electrical supervisory competency certificate in state govt.
I have done GNIIT software engneering and B.COM and also i have 1yr exp in oracle DBA can i do oracle DBA certification plz adviced me frnds....as early possible with certification details...
I have cleared Informatica certification Designer. if anybody need dumps, can contact at firstname.lastname@example.org
HOW TO USE FSMO ROLES IN FOREST.. MEANS IF WE HAVE A THREE DOAMINS IN FOREST .....THEY R HYD.COM(FIRST ONE....PRIMARY DOMAIN IN THE FOREST),BANG.COM (SECOND DOMAIN),CSD.COM(THIRD DOMAIN). I WANT TO IMPLEMENT FSMO ROLES IN THIRD DOMAIN HOW TO IMPLEMENT IT ...MEANS HOW TO CONNECT WITH DOAMIN AND WHAT ROLES WE IMPLEMENT..
is there use of doing CEIS certification by karRox for other industry rather than IBM? if yes name the company's who approve for such certifications?
Please any one suggest me to write the certification in sap ABAP module
i want to write scjp 1.6 exam in august/september. iam from bangalore. any one who sells scjp 1.6 vocher can contact me in my mail id email@example.com. the vocher cost should be around 4500-5000.
How does PPP use LCP for link control?