Confidential data stored on a laptop is BEST protected by: A. storage on optical disks. B. logon ID and password. C. data encryption. D. physical locks.
1 4592Which of the following would be the BEST population to take a sample from when testing program changes? A. Test library listings B. Source program listings C. Program change requests D. Production library listings
1 6069A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy: A. payroll reports should be compared to input forms. B. gross payroll should be recalculated manually. C. checks (cheques) should be compared to input forms. D. checks (cheques) should be reconciled with output reports.
1 5548Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them? A. Overwriting the tapes B. Initializing the tape labels C. Degaussing the tapes D. Erasing the tapes
1 14269Business continuity/disaster recovery is PRIMARILY the responsibility of: A. IS management. B. business unit managers. C. the security administrator. D. the board of directors.
1 4157An advantage in using a bottom-up versus a top-down approach to software testing is that: A. interface errors are detected earlier. B. confidence in the system is achieved earlier. C. errors in critical modules are detected earlier. D. major functions and processing are tested earlier.
1 22108During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used in the establishment of its commercial relations. To substantiate this, the IS auditor must prove that which of the following is used? A. A biometric, digitalized and encrypted parameter with the customer's public key B. A hash of the data that is transmitted and encrypted with the customer's private key C. A hash of the data that is transmitted and encrypted with the customer's public key D. The customer's scanned signature, encrypted with the customer's public key
1 4709Which of the following manages the digital certificate life cycle to ensure adequate security and controls exist in digital signature applications related to e-commerce? A. Registration authority B. Certification authority C. Certification relocation list D. Certification practice statement
1 4510Which of the following IS functions may be performed by the same individual, without compromising on control or violating segregation of duties? A. Job control analyst and applications programmer B. Mainframe operator and system programmer C. Change/problem and quality control administrator D. Applications and system programmer
2 3980In a web server, a common gateway interface (CGI) is MOST often used as a(n): A. consistent way for transferring data to the application program and back to the user. B. computer graphics imaging method for movies and TV. C. graphic user interface for web design. D. interface to access the private gateway domain.
1 6087A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential losses the team should: A. compute the amortization of the related assets. B. calculate a return on investment (ROI). C. apply a qualitative approach. D. spend the time needed to define exactly the loss amount.
1 6628Receiving an EDI transaction and passing it through the communications interface stage usually requires: A. translating and unbundling transactions. B. routing verification procedures. C. passing data to the appropriate application system. D. creating a point of receipt audit log.
1 6735If an application program is modified and proper system maintenance procedures are in place, which of the following should be tested? The: A. integrity of the database B. access controls for the applications programmer C. complete program, including any interface systems D. segment of the program containing the revised code
1 4985Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the user name and password are the same. The BEST control to mitigate this risk is to: A. change the company's security policy. B. educate users about the risk of weak passwords. C. build in validations to prevent this during user creation and password change. D. require a periodic review of matching user ID and passwords for detection and correction.
1 4529What is a risk associated with attempting to control physical access to sensitive areas, such as computer rooms, through card keys, locks, etc.? A. Unauthorized individuals wait for controlled doors to open and walk in behind those authorized. B. The contingency plan for the organization cannot effectively test controlled access practices. C. Access cards, keys, and pads can be easily duplicated allowing easy compromise of the control. D. Removing access for people no longer authorized is complex.
1 5860
In which ios version 182 people can access router through telenet?
Sir, I am diploma in electronic engineering student and having five years experience in electrical maintenance including three years in switchgear electrical.... Can I am eligible for electrical supervisor certificate.... Please write me..
Hi Every One, This is K.Srinivasarao. I am in teradata side. i am interested to do certifications in teradata. please help me. for this i want teradata dumps. please mail me teradata dumps to tkanisrinivasa@gmail.com Thanks in advance K.Srinivasarao
which defined peer ip address an local subnet belong to crete? (Choose two)
Explain how many types of ends in wan?
Explain the difference between named and extended acl?
Mention what are the ranges for the private ips?
How do you create a new application partition
Are Silicon mutual funds and investment plans under SEBI registration and is it safe to invest in Silicon mutual funds?
i have passed my 10 +2 in 2007 and then i got my 12 certificate .in back of that certificate there is a place where school principal has to sign.but in 2007 i could sign it and later in 2010 i got the principal sign on my 12 passing certificate.will it cause any problem in bank job interview.
Tell me which multicast ip eigrp protocol use?
Please could anyone send me WebSphere Application Server (WAS Admin) Technical questions/certification dumps @ yogesh.birje@gmail.com? Thanks in advance
Explain the matric of eigrp protocol?
Hi Jitendera, Wat do u do..?? I mean r u working anywhere???? Basically where r u from??? If u don't hv any problem, u can say..?? Or else mail me mr.shahin07@gmail.com
What is loop back ip in ipv6?