Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) Confidential data stored on a laptop is BEST protected by: A. storage on optical disks. B. logon ID and password. C. data encryption. D. physical locks.
1 5532Which of the following would be the BEST population to take a sample from when testing program changes? A. Test library listings B. Source program listings C. Program change requests D. Production library listings
1 7067A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy: A. payroll reports should be compared to input forms. B. gross payroll should be recalculated manually. C. checks (cheques) should be compared to input forms. D. checks (cheques) should be reconciled with output reports.
1 6842Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them? A. Overwriting the tapes B. Initializing the tape labels C. Degaussing the tapes D. Erasing the tapes
1 15261Business continuity/disaster recovery is PRIMARILY the responsibility of: A. IS management. B. business unit managers. C. the security administrator. D. the board of directors.
1 5037An advantage in using a bottom-up versus a top-down approach to software testing is that: A. interface errors are detected earlier. B. confidence in the system is achieved earlier. C. errors in critical modules are detected earlier. D. major functions and processing are tested earlier.
1 23457During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used in the establishment of its commercial relations. To substantiate this, the IS auditor must prove that which of the following is used? A. A biometric, digitalized and encrypted parameter with the customer's public key B. A hash of the data that is transmitted and encrypted with the customer's private key C. A hash of the data that is transmitted and encrypted with the customer's public key D. The customer's scanned signature, encrypted with the customer's public key
1 5696Which of the following manages the digital certificate life cycle to ensure adequate security and controls exist in digital signature applications related to e-commerce? A. Registration authority B. Certification authority C. Certification relocation list D. Certification practice statement
1 5494Which of the following IS functions may be performed by the same individual, without compromising on control or violating segregation of duties? A. Job control analyst and applications programmer B. Mainframe operator and system programmer C. Change/problem and quality control administrator D. Applications and system programmer
2 5111In a web server, a common gateway interface (CGI) is MOST often used as a(n): A. consistent way for transferring data to the application program and back to the user. B. computer graphics imaging method for movies and TV. C. graphic user interface for web design. D. interface to access the private gateway domain.
1 7084A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential losses the team should: A. compute the amortization of the related assets. B. calculate a return on investment (ROI). C. apply a qualitative approach. D. spend the time needed to define exactly the loss amount.
1 7774Receiving an EDI transaction and passing it through the communications interface stage usually requires: A. translating and unbundling transactions. B. routing verification procedures. C. passing data to the appropriate application system. D. creating a point of receipt audit log.
1 7541If an application program is modified and proper system maintenance procedures are in place, which of the following should be tested? The: A. integrity of the database B. access controls for the applications programmer C. complete program, including any interface systems D. segment of the program containing the revised code
1 6421Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the user name and password are the same. The BEST control to mitigate this risk is to: A. change the company's security policy. B. educate users about the risk of weak passwords. C. build in validations to prevent this during user creation and password change. D. require a periodic review of matching user ID and passwords for detection and correction.
1 5406What is a risk associated with attempting to control physical access to sensitive areas, such as computer rooms, through card keys, locks, etc.? A. Unauthorized individuals wait for controlled doors to open and walk in behind those authorized. B. The contingency plan for the organization cannot effectively test controlled access practices. C. Access cards, keys, and pads can be easily duplicated allowing easy compromise of the control. D. Removing access for people no longer authorized is complex.
1 6793
Please could any send me Informatica power center developer certification dumps @ tsailunet@gmail.com? Thanks in advance
i want to write scjp 1.6 exam in august/september. iam from bangalore. any one who sells scjp 1.6 vocher can contact me in my mail id b.surendra85@gmail.com. the vocher cost should be around 4500-5000.
Hi Friends, I planning to write my ISTQB Foundation level exam in August 30,2010.. Any one please send the Dumps for me.... My email-id is: onyxontesting@gmail.com Thanks in advance..
Hi Every One, This is K.Srinivasarao. I am in teradata side. i am interested to do certifications in teradata. please help me. for this i want teradata dumps. please mail me teradata dumps to tkanisrinivasa@gmail.com Thanks in advance K.Srinivasarao
plese forward scjp 1.6 dumps to my mail pleaseeeeeee siddu.eld@gmail.com
hi, i did ocp dba 9i in 2009 but not get job on oracle,now i want to continue my career as oracle dba what i do next .?
Do you have a set of questions regarding to M.I.S.[Management Information System] profile(Means Excel Test)?
Hi Friends, i am planning to give ISTQB Foundation level exam this month (20th September 2010),can anyone please send me the Dumps to my id?? lkokila8@gmail.com "Thanks in Adavance"
For WebSphere MQ clients on some platforms, if a security exit is not defined, the values of two environment variables MQ_USER_ID and MQ_PASSWORD are transmitted to the server. On which of the following platforms are these environment variables used?
Do any of you have SCJP 6.0 certification voucher valid till Aug 2010?
Where can I get LAtest qtp 2010 exam questions ?
mcse 2003 to mcitp upgrade paper
hi, i am planning for a cognos certification. if any one has certification dump for COG112, please send to my id mutty_maddy@yahoo.com. i appreciate your help. thanks Muthu
hi ,i am going to give advance sas exm but i dnt have dumps so if any one have recently advance paper and answer please mail me- diffmail172@gmail.com tHank you
Can any one provide dumps for Oracle Fusion CRM certification (1Z1-456)