Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

Confidential data stored on a laptop is BEST protected by: A. storage on optical disks. B. logon ID and password. C. data encryption. D. physical locks.

1 5532

Which of the following would be the BEST population to take a sample from when testing program changes? A. Test library listings B. Source program listings C. Program change requests D. Production library listings

1 7067

A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy: A. payroll reports should be compared to input forms. B. gross payroll should be recalculated manually. C. checks (cheques) should be compared to input forms. D. checks (cheques) should be reconciled with output reports.

1 6842

Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them? A. Overwriting the tapes B. Initializing the tape labels C. Degaussing the tapes D. Erasing the tapes

1 15261

Business continuity/disaster recovery is PRIMARILY the responsibility of: A. IS management. B. business unit managers. C. the security administrator. D. the board of directors.

1 5037

An advantage in using a bottom-up versus a top-down approach to software testing is that: A. interface errors are detected earlier. B. confidence in the system is achieved earlier. C. errors in critical modules are detected earlier. D. major functions and processing are tested earlier.

HCL, KPMG, Misys,

1 23457

During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used in the establishment of its commercial relations. To substantiate this, the IS auditor must prove that which of the following is used? A. A biometric, digitalized and encrypted parameter with the customer's public key B. A hash of the data that is transmitted and encrypted with the customer's private key C. A hash of the data that is transmitted and encrypted with the customer's public key D. The customer's scanned signature, encrypted with the customer's public key

1 5696

Which of the following manages the digital certificate life cycle to ensure adequate security and controls exist in digital signature applications related to e-commerce? A. Registration authority B. Certification authority C. Certification relocation list D. Certification practice statement

1 5494

Which of the following IS functions may be performed by the same individual, without compromising on control or violating segregation of duties? A. Job control analyst and applications programmer B. Mainframe operator and system programmer C. Change/problem and quality control administrator D. Applications and system programmer

2 5111

In a web server, a common gateway interface (CGI) is MOST often used as a(n): A. consistent way for transferring data to the application program and back to the user. B. computer graphics imaging method for movies and TV. C. graphic user interface for web design. D. interface to access the private gateway domain.

1 7084

A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential losses the team should: A. compute the amortization of the related assets. B. calculate a return on investment (ROI). C. apply a qualitative approach. D. spend the time needed to define exactly the loss amount.

1 7774

Receiving an EDI transaction and passing it through the communications interface stage usually requires: A. translating and unbundling transactions. B. routing verification procedures. C. passing data to the appropriate application system. D. creating a point of receipt audit log.

1 7541

If an application program is modified and proper system maintenance procedures are in place, which of the following should be tested? The: A. integrity of the database B. access controls for the applications programmer C. complete program, including any interface systems D. segment of the program containing the revised code

1 6421

Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the user name and password are the same. The BEST control to mitigate this risk is to: A. change the company's security policy. B. educate users about the risk of weak passwords. C. build in validations to prevent this during user creation and password change. D. require a periodic review of matching user ID and passwords for detection and correction.

1 5406

What is a risk associated with attempting to control physical access to sensitive areas, such as computer rooms, through card keys, locks, etc.? A. Unauthorized individuals wait for controlled doors to open and walk in behind those authorized. B. The contingency plan for the organization cannot effectively test controlled access practices. C. Access cards, keys, and pads can be easily duplicated allowing easy compromise of the control. D. Removing access for people no longer authorized is complex.

1 6793


Un-Answered Questions { Certifications }

Please could any send me Informatica power center developer certification dumps @    tsailunet@gmail.com? Thanks in advance

2678


i want to write scjp 1.6 exam in august/september. iam from bangalore. any one who sells scjp 1.6 vocher can contact me in my mail id b.surendra85@gmail.com. the vocher cost should be around 4500-5000.

3776


Hi Friends, I planning to write my ISTQB Foundation level exam in August 30,2010.. Any one please send the Dumps for me.... My email-id is: onyxontesting@gmail.com Thanks in advance..

2396


Hi Every One, This is K.Srinivasarao. I am in teradata side. i am interested to do certifications in teradata. please help me. for this i want teradata dumps. please mail me teradata dumps to tkanisrinivasa@gmail.com Thanks in advance K.Srinivasarao

2187


plese forward scjp 1.6 dumps to my mail pleaseeeeeee siddu.eld@gmail.com

3669


hi, i did ocp dba 9i in 2009 but not get job on oracle,now i want to continue my career as oracle dba what i do next .?

2765


Do you have a set of questions regarding to M.I.S.[Management Information System] profile(Means Excel Test)?

1338


Hi Friends, i am planning to give ISTQB Foundation level exam this month (20th September 2010),can anyone please send me the Dumps to my id?? lkokila8@gmail.com "Thanks in Adavance"

2199


For WebSphere MQ clients on some platforms, if a security exit is not defined, the values of two environment variables MQ_USER_ID and MQ_PASSWORD are transmitted to the server. On which of the following platforms are these environment variables used?

2331


Do any of you have SCJP 6.0 certification voucher valid till Aug 2010?

2496


Where can I get LAtest qtp 2010 exam questions ?

2565


mcse 2003 to mcitp upgrade paper

3489


hi, i am planning for a cognos certification. if any one has certification dump for COG112, please send to my id mutty_maddy@yahoo.com. i appreciate your help. thanks Muthu

2165


hi ,i am going to give advance sas exm but i dnt have dumps so if any one have recently advance paper and answer please mail me- diffmail172@gmail.com tHank you

2606


Can any one provide dumps for Oracle Fusion CRM certification (1Z1-456)

5080