When performing a general controls review, an IS auditor checks the relative location of the computer room inside the building. What potential threat is the IS auditor trying to identify? A. Social engineering B. Windstorm C. Earthquake D. Flooding1 2839
To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.1 2349
Which of the following is a control to detect an unauthorized change in a production environment? A. Denying programmers access to production data. B. Requiring change request to include benefits and costs. C. Periodically comparing control and current object and source programs. D. Establishing procedures for emergency changes.1 4279
Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports1 2507
Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking1 3469
Security administration procedures require read-only access to: A. access control tables. B. security log files. C. logging options. D. user profiles.1 7747
Of the following who is MOST likely to be responsible for network security operations? A. Users B. Security administrators C. Line managers D. Security officers1 3193
Sales orders are automatically numbered sequentially at each of a retailer's multiple outlets. Small orders are processed directly at the outlets, with large orders sent to a central production facility. The MOST appropriate control to ensure that all orders transmitted to production are received and processed would be to: A. send and reconcile transaction counts and totals. B. have data transmitted back to the local site for comparison. C. compare data communications protocols with parity checking. D. track and account for the numerical sequence of sales orders at the production facility.1 2889
IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.1 2922
The information that requires special precaution to ensure integrity is termed? A. Public data B. Private data C. Personal data D. Sensitive data1 2292
An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.1 3605
Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor1 3255
The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.1 3891
An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password1 5211
Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler1 5813
please give us the detail about the company HESS CORPORATION , 1-11 Jhon street London
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is email@example.com will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
hai can anybody snd an sample RHCE Exam question to my email ca6th@ gmail.com
Can you explain different components in PKI?
32. Policy Enforcement Federation is configured in which of the following components? a. Identity Manager b. Service Gateway c. Access Manager d. Directory Server
i want to do oracle certification..could any one pleas tell me what is the level 1 certification exam in oracle? how do we get dumps?
I am currently into Telecom Testing doing some Protocol- level testing(SIP,SS7,CAP protocols) and some Black-Box testing.Is there any certifications which I can do related to this?
What are the different types of VPN?
Can anyone of u pls suggest some good bit easy certification for QTP if any material found pls mail to firstname.lastname@example.org
I would like to know about Oracle Online Course certification (Finance)
how to apply of export document cource which is the best classes for export documentation please advice me.
hi thiz is rahul i want to do my ocp certification can any one plz guide me with full details
from where can i avail a certificate course of EPBX so that in helps me improve my resume as front desk executive
Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.
I want to join a good institute in Noida for SAP SD for experienced professionals,I have 2 years of experience as a SAP SD functional consultant.Can anyone suggest plz.