Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

The PRIMARY objective of a business continuity and disaster recovery plan should be to: A. safeguard critical IS assets. B. provide for continuity of operations. C. minimize the loss to an organization. D. protect human life.

2 8792

What type of transmission requires modems? A. Encrypted B. Digital C. Analog D. Modulated

1 4425

Which of the following is the MOST effective control procedure for security of a stand-alone small business computer environment? A. Supervision of computer usage B. Daily management review of the trouble log C. Storage of computer media in a locked cabinet D. Independent review of an application system design

1 5395

Which of the following represents the GREATEST potential risk in an EDI environment? A. Transaction authorization B. Loss or duplication of EDI transmissions C. Transmission delay D. Deletion or manipulation of transactions prior to or after establishment of application controls

CTS,

1 11866

During a review of a customer master file an IS auditor discovered numerous customer name duplications arising from variations in customer first names. To determine the extent of the duplication the IS auditor would use: A. test data to validate data input. B. test data to determine system sort capabilities. C. generalized audit software to search for address field duplications. D. generalized audit software to search for account field duplications.

1 8965

A control log basic to a real-time application system is a(n): A. audit log. B. console log. C. terminal log. D. transaction log.

1 5157

Which of the following is a technique that could be used to capture network user passwords? A. Encryption B. Sniffing C. Spoofing D. A signed document cannot be altered.

1 5180

The process of using interpersonal communication skills to get unauthorized access to company assets is called: A. wire tapping. B. trap doors. C. war dialing. D. social engineering.

1 5965

A hacker could obtain passwords without the use of computer tools or programs through the technique of: A. social engineering. B. sniffers. C. backdoors. D. trojan horses.

1 11316

If the decision has been made to acquire software rather than develop it internally, this decision is normally made during the: A. requirements definition phase of the project. B. feasibility study phase of the project. C. detailed design phase of the project. D. programming phase of the project.

1 4821

The secure socket layer (SSL) protocol addresses the confidentiality of a message through: A. symmetric encryption. B. message authentication code. C. hash function. D. digital signature certificates.

2 12522

Which of the following represents the MOST pervasive control over application development? A. IS auditors B. Standard development methodologies C. Extensive acceptance testing D. Quality assurance groups

1 5753

With regard to sampling it can be said that: A. sampling is generally applicable when the population relates to an intangible or undocumented control. B. if an auditor knows internal controls are strong, the confidence coefficient may be lowered. C. attribute sampling would help prevent excessive sampling of an attribute by stopping an audit test at the earliest possible moment. D. variable sampling is a technique to estimate the rate of occurrence of a given control or set of related controls.

1 4316

Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IS strategy? That it: A. has been approved by line management. B. does not vary from the IS department's preliminary budget. C. complies with procurement procedures. D. supports the business objectives of the organization.

1 7350

Which of the following goals would you expect to find in an organization's strategic plan? A. Test a new accounting package. B. Perform an evaluation of information technology needs. C. Implement a new project planning system within the next 12 months. D. Become the supplier of choice within a given time period for the product offered.

1 7575


Un-Answered Questions { Certifications }

Tell me which protocol comes under hybrid dynamic type?

1061


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

1121


I wish to write informatica Designer certification course. can u send me the dump questions

2427


Explain the benefits of vlan?

1211


How many valid ip will b in /21 in route summarization?

1138


I have my NCFM certification-beginner's level exam at 9th of june. if anybody has any dump/test paper except those, present is nse-india site please send it to me at jindalnitkkr@gmail.com thanks in advance

2769


Tell me how much internal and external ad of eigrp protocol?

1151


Which LAN switching method is used in CISCO Catalyst 5000?

1231


When ip confliction accord in subnet which ip assigned automatically and what it called?

1122


.What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 14. How would you find all users that have not logged on since last month? 15. What are the DS* commands? 16. What’s the difference between LDIFDE and CSVDE? Usage considerations? 17. What are the FSMO roles? Who has them by default? What happens when each one fails? 18. What FSMO placement considerations do you know of? 19. I want to look at the RID allocation table for a DC. What do I do? 20. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 21. How do you configure a “stand-by operation master” for any of the roles? 22. How do you backup AD? 23. How do you restore AD? 24. How do you change the DS Restore admin password? 25. Why can’t you restore a DC that was backed up 4 months ago? 26. What are GPOs? 27. What is the order in which GPOs are applied? 28. Name a few benefits of using GPMC. 29. What are the GPC and the GPT? Where can I find them? 30. What are GPO links? What special things can I do to them? 31. What can I do to prevent inheritance from above? 32. How can I override blocking of inheritance? 33. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 34. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 35. Name a few differences in Vista GPOs 36. Name some GPO settings in the computer and user parts. 37. What are administrative templates? 38. What’s the difference between software publishing and assigning? 39. Can I deploy non-MSI software with GPO? 40. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that? 1.What Is the diff b/w Win NT & win 2000 ? 2. What is difference b/w WIN NT DNS,DhCP and Win 2000 DNS,DHCp ? 3. What are the seven Layers of OSI model ? 4. what Is TCP /IP / 5. What is the difference b/w Netbios name & Hostname resolution ? 6. What are the Features of AD ?What are the diff roles of AD ?(FsmO) 7. How do you carry out migration from NT 4.0 to Windows 2000 ? 8. What is the size of SAM DB in NT 4.0 and how many objects can be created in win NT / Win 2k / 9. How do uimplement group policy and what is the difference b/w s/w deployment and publishing in AD ? 10. Where does u change the role in AD FSMO roles ? 11. What is dynamic DNS and how dows it register with DHCP ? 12. What are the new features of windows 2000 ? 13. Can u rename a domain in win 2k environment ? 14. What is the backup policy that is taken in your company and what is the s/w that is used for taking back up ? 15. How do you update Antivirus on all machines (is it Auto update or manual update) 16. What is the system state data in Win 2k / 17. How do you repair a Blue Screen error ? 18. How is OS hardening done in Servers ? 19. How is auditing is carried out a workstations? 20. Hopw RAs setup in NT and hopw is the permission given for a NT user ? 21. what are the feautures of AD ? 22. by default what is the trust relation ship in Win2k ?] 23. What is native mode in win2k and can we have prewin2k environment(Win nt,win95,98,Me etc)in native mode ? Ans No, only it possible in mIxed mode.it support Pre windows 2000. 24. What is Global catalog server ? 25. Where do you Promote a BDC and PDC ? Ans : Server Manager 26. By default when Win 2k is installed what is the role it assumes and how do you promote it to dC ? 27. what is LDAP protocol / 28. What are EFS , DFS and Kerberos in Win 2k / 29. What is forest , Tree, Organization Unit and site in Win 2k3 ? 30. Can you establish Trust relation ship b/w win 2k and Win Nt machine in native mode environment ? 31. What are the files systems supported Win 2k and 2k3 ? 32. What is tool used to manage disk management tasks ? 33. What is the different between a Basic disc and Dynamic disc ? Can you revert dynamic disk to basic disk ? 34. What are the different levels of RAID that can be setup ? 35. What are the different roles played by a DNS server ? 36. What is a ZONE in DNS ? 37. What is the tool used to move an object with in a domain ? . 38. What is delegation in Ad and what are the benefits ? 39. What is thea System policy in Win NT ? 40. What is folder redirection and how is it accomplished ? 41. Where do you create a group policy in Win 2k nd 2k3 ? 42. How do you setup Disk quotas in Win 2k and 2k3? 43. What is subnet mask Default gateway and router ? 44. How do you configuring auditing in Win 2k and what tools do you use to view the results / 45. What are the 5 different type of backup strategy followed ? 46. What is ERD and how it is created in WIN NT / 2000 / 2003 ? 47. What is the data that is backed up when you backup system state data in win 2k ? 48. How is VPN setup in Windows 2000/2003 ? 49. What is a WINS Server and what is the role in NT/2000/20003 environment ? 50. What is IP Sec in Win 2k /2003 ? 51. What is the tool used manage IIS / 52. How do you secure IIS Website ? 53. How do you setup Multiple websites using a single IP address ? 54. What are Certificate Services in Win 2k nd 2k3? 55. How do you setup RIS and what are the requrirements on client ends ? 56. How many Licenses are provided by default when you setup Terminal services and what are the 2 different modes that a Terminal services can be setup ? 57. What is the tool used to measure the performance in win2k server ? 58. How do you authorize DHCP Server in AD ? 59. What are the prerequisites for installing AD ? 60. What are the file systems supported by Win NT ? 61. How do you remotely start and stop the services in IIS and Controlpanel on a remote machine ? 62. How do you debug the blue screen problem ? 63. Have You Subscribed Technet , MSDN ? 64. How do you troubleshoot a NTLDR,NTDETECT missing issues in Win NT /2000 ? 65. How do you change Boot time in NT/2000/2003 ? 66. what is the regular maintainance on Win Nt server (Event log,chkdisk,rdisk ) 67. What is the difference b/w Exchnage 5.5 and Exchange 2000 /2003? 68. Which are the services in Exchange Server 2003 ? 69. What are the storage groups in Exchange 2k and how many mailbox per storage group can be setup per storage grouping Exch 2k and 2k3 ? 70. What are connectors in Exchange Server and what are the different type of connectors in exchange 2000/2003 ? 71. What is a Site in terms on Exch Server and Win 2000 ? 72. What is circular logging in Exch 2000 ? 73. What are the circular logging in Excjh 2000 ? 74. What are the ifferent authentication methods used in IIS ?Where do you Configure this is IIS ? 75. What are the 4 steps involved in getting IP address from DHCP server ? 76. What is push and pull partners in terms if WINs Server ? 77. How do you back up WINS DB and what format is it stored ? 78. What is the difference WIN NT DHCP and WIN 2k DHcp ? 79. In MS Exch is there any option to forward all my incoming e-mails to another e-mail address ? 80. In what format are the mails and public folder data stored on Exch server ? 81. In what format are the mails stored on client side ? 82. What is Clustering and what are the different methodology in which clustering can be implemented ? 83. What are the 4 domains models defined by MS relating to NT 4.0 ? 84. What is the diff and advantage and disadvantages between a workgroup and domain model ? 85. What is a Trust Real;tion ship & How is it established in NT 4.0 ? 86. What is LAN and WAN ? 87. What is the diff b/w Local group and global group ? 88. What is distributed file system and different types of dfs model and how is it implemented in 2000/2003 ? 89. What is a Hosts and LM Hosts file and how is it useful ? 90. What is B Node,P-node,H-node and M-node in terms of WINS ? 91. What is AT command and how do you schedule automated backup in NT 4.0 92. What is ISINTEGand ESEUTIL in Exch Server ? 93. What is the use of ExchService account in Exchange Server ? 94. what are the Pre requisites for Exchange server installation ? 95. Can my Exchange server check POP3 mail ?

3075


What is difference between flsm and vlsm?

1201


Can you explain PPP protocol?

2315


Hi i m a pst graduate in commerce and having wotking exp more than 3 yrs in bpo sector (web based) my company moved my self to software testing, i m not sure whether i should continue there or not also i knoe this is better career opp for me in software testing, can u people pls guide me for a gud sotware testing institute which can provide gud training, located in delhi (pref west delhi or in south delhi)

2019


hi, 2012 I got an invitation for a organization conference and I was deny in 2013, I also got an invitation form my friend who is American citizen to visit her just two weeks and I was also deny. can I still apply for a visa if the possibility is there?

2055


Define topology?

1033