Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) The PRIMARY objective of a business continuity and disaster recovery plan should be to: A. safeguard critical IS assets. B. provide for continuity of operations. C. minimize the loss to an organization. D. protect human life.
2 8923Which of the following is the MOST effective control procedure for security of a stand-alone small business computer environment? A. Supervision of computer usage B. Daily management review of the trouble log C. Storage of computer media in a locked cabinet D. Independent review of an application system design
1 5464Which of the following represents the GREATEST potential risk in an EDI environment? A. Transaction authorization B. Loss or duplication of EDI transmissions C. Transmission delay D. Deletion or manipulation of transactions prior to or after establishment of application controls
CTS,
1 11964During a review of a customer master file an IS auditor discovered numerous customer name duplications arising from variations in customer first names. To determine the extent of the duplication the IS auditor would use: A. test data to validate data input. B. test data to determine system sort capabilities. C. generalized audit software to search for address field duplications. D. generalized audit software to search for account field duplications.
1 9061A control log basic to a real-time application system is a(n): A. audit log. B. console log. C. terminal log. D. transaction log.
1 5232Which of the following is a technique that could be used to capture network user passwords? A. Encryption B. Sniffing C. Spoofing D. A signed document cannot be altered.
1 5262The process of using interpersonal communication skills to get unauthorized access to company assets is called: A. wire tapping. B. trap doors. C. war dialing. D. social engineering.
1 6071A hacker could obtain passwords without the use of computer tools or programs through the technique of: A. social engineering. B. sniffers. C. backdoors. D. trojan horses.
1 11406If the decision has been made to acquire software rather than develop it internally, this decision is normally made during the: A. requirements definition phase of the project. B. feasibility study phase of the project. C. detailed design phase of the project. D. programming phase of the project.
1 4911The secure socket layer (SSL) protocol addresses the confidentiality of a message through: A. symmetric encryption. B. message authentication code. C. hash function. D. digital signature certificates.
2 12674Which of the following represents the MOST pervasive control over application development? A. IS auditors B. Standard development methodologies C. Extensive acceptance testing D. Quality assurance groups
1 5831With regard to sampling it can be said that: A. sampling is generally applicable when the population relates to an intangible or undocumented control. B. if an auditor knows internal controls are strong, the confidence coefficient may be lowered. C. attribute sampling would help prevent excessive sampling of an attribute by stopping an audit test at the earliest possible moment. D. variable sampling is a technique to estimate the rate of occurrence of a given control or set of related controls.
1 4415Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IS strategy? That it: A. has been approved by line management. B. does not vary from the IS department's preliminary budget. C. complies with procurement procedures. D. supports the business objectives of the organization.
1 7444Which of the following goals would you expect to find in an organization's strategic plan? A. Test a new accounting package. B. Perform an evaluation of information technology needs. C. Implement a new project planning system within the next 12 months. D. Become the supplier of choice within a given time period for the product offered.
1 7678
hi, i am planning for a cognos certification. if any one has certification dump for COG112, please send to my id mutty_maddy@yahoo.com. i appreciate your help. thanks Muthu
For WebSphere MQ clients on some platforms, if a security exit is not defined, the values of two environment variables MQ_USER_ID and MQ_PASSWORD are transmitted to the server. On which of the following platforms are these environment variables used?
any one send sql 2008 certification dumps to my mail id chowdaryboddapati@yahoo.com
Please could any send me Informatica power center developer certification dumps @ tsailunet@gmail.com? Thanks in advance
Can anyone give me Teradata TA0-121 certification exam dumps.....If anyone has plz send me on my mail Id bpshekhawat@gmail.com Thanx in advance.................
mcse 2003 to mcitp upgrade paper
Please forward me the latest dumps for base and advance SAS. My email id is-- sudhvimal@gmail.com/soumyajit07@gmail.com
plese forward scjp 1.6 dumps to my mail pleaseeeeeee siddu.eld@gmail.com
Where can I get LAtest qtp 2010 exam questions ?
Does anyone of test questions for the NCCER Instrument Technician V3 test?
Please can any one provide me the latest informatica certification(8x)dumps? Please send it to my below mail id...Thanks shanthveer@gmail.com
provide the best institute details in pune, which takes ISTQB preparation as well as exams to clear certification. send it on my mail id u_baride@yahoo.co.in
Can any one provide dumps for Oracle Fusion CRM certification (1Z1-456)
can anybody send sample question on RHCE exam to my maid id ca6thi@gmail.com
What is the fees of dot net? in various institutes? Frzs plz reply...