Certifications Interview Questions
Questions Answers Views Company eMail

When performing a general controls review, an IS auditor checks the relative location of the computer room inside the building. What potential threat is the IS auditor trying to identify? A. Social engineering B. Windstorm C. Earthquake D. Flooding

1 2309

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

1 1786

Which of the following is a control to detect an unauthorized change in a production environment? A. Denying programmers access to production data. B. Requiring change request to include benefits and costs. C. Periodically comparing control and current object and source programs. D. Establishing procedures for emergency changes.

1 3527

Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports

1 1893

Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking

1 2715

Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.

1 5925

Of the following who is MOST likely to be responsible for network security operations? A. Users B. Security administrators C. Line managers D. Security officers

1 2573

Sales orders are automatically numbered sequentially at each of a retailer's multiple outlets. Small orders are processed directly at the outlets, with large orders sent to a central production facility. The MOST appropriate control to ensure that all orders transmitted to production are received and processed would be to: A. send and reconcile transaction counts and totals. B. have data transmitted back to the local site for comparison. C. compare data communications protocols with parity checking. D. track and account for the numerical sequence of sales orders at the production facility.

1 2431

IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.

1 2464

The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data

1 1825

An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.

1 2971

Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor

1 2286

The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.

1 3341

An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password

1 4460

Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler

1 5257

Un-Answered Questions { Certifications }

Hi, Can any one please tell me the experience of their CCNA interview,and please tell me all the questions they asked in the interview. Many Thanks...


Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?


what kind of certification should i go for and from where for doing erp- sap in sd module.


why join as medical representative


Can anybody provide me the material which is useful for the bo xi r2 certification.Thanks in advance.


hi i done IBM AS/400 course .....i want to certification any one can information about that and material of soft copy for that....please its urgent


Hii,freinds i have passed my b.tech this year in electrical and electronics engineering ,i am a average student so plz guide me how will i get good job in core industries ,should i do any automation course if yes than from which institute .


can any one give about the COGNOS and CRYSTAL REPORTS certification details?


1. The Write statement was written and suddenly the program was showing something different what can be the reason WRITE 'MOHAN'(001). a)User must have choosen a different language b) User must have made the line inactive at the Runtime. c)There must something different Written on the Text element . d)If nothing is mentioned in the Multilingual Table what will be the output. 2. how the Transaction Variant.will be helpful to the Enduser? a)hide the screen Field. b)To change the Flow Logic. c)To schedule background process 3. Rollback to be done at the dialog work process what will you write. a) Rollback work b) Message A c) Message E d) Rollback work at the End of the PAI. 4) Rollback at the LUW concept. a)You will write the Code at the PAI Block of the Each Dialog process b)You will write the Code ROLLBACK work at the End of the LUW PAI block. 5. Field statement regarding the CHAIN INPUT If the user has committed any wrong value on the one Field of the Cain Input. And what will be the syntax. a) Field Moudle Check Message E b) Field Moudle Check Message I c) Field Module check


HI, I have completed my M.com and MBA and currently working in IT sector in HR Recruitment. i just want to do Oracle HRMS functional course. And is there is any study center in Coimbatore from where i can do this certification.


how to apply of export document cource which is the best classes for export documentation please advice me.


What is difference between null Nat and NAT 0


I want to do QTP Mercury Certification, give me an idea and the where can i register for that?


Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.


being in business intelligence and data warehousing,what would be the importance of a oracle certification how much would it cost me