Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) When reviewing the implementation of a LAN the IS auditor should FIRST review the: A. node list. B. acceptance test report. C. network diagram. D. user's list.
1 4918Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility? A. Security awareness B. Reading the security policy C. Security committee D. Logical access controls
1 8097Which of the following would be considered an essential feature of a network management system? A. A graphical interface to map the network topology B. Capacity to interact with the Internet to solve the problems C. Connectivity to a help desk for advice on difficult issues D. An export facility for piping data to spreadsheets
1 5738Which of the following testing methods is MOST effective during the initial phases of prototyping? A. System B. Parallel C. Volume D. Top-down
2 5482Which of the following implementation modes would provide the GREATEST amount of security for outbound data connecting to the Internet? A. Transport mode with authentication header plus encapsulating security payload (ESP) B. Secure socket layer (SSL) mode C. Tunnel mode with AH plus ESP D. Triple-DES encryption mode
1 5823A TCP/IP-based environment is exposed to the Internet. Which of the following BEST ensures that complete encryption and authentication protocols exist for protecting information while transmitted? A. Work is completed in tunnel mode with IP security using the nested services of authentication header (AH) and encapsulating security payload (ESP). B. A digital signature with RSA has been implemented. C. Digital certificates with RSA are being used. D. Work is being completed in.TCP services.
1 5500During a review of the controls over the process of defining IT service levels, an IS auditor would MOST likely interview the: A. systems programmer. B. legal staff. C. business unit manager. D. application programmer.
1 12254Which of the following describes a difference between unit testing and system testing? A. Unit testing is more comprehensive. B. Programmers are not involved in system testing. C. System testing relates to interfaces between programs. D. System testing proves user requirements are complete.
IBM,
2 8003A request for a change to a report format in a module (subsystem) was made. After making the required changes, the programmer should carry out: A. unit testing. B. unit and module testing. C. unit, module and regression testing. D. module testing.
2 7535Which of the following exposures associated with the spooling of sensitive reports for offline printing would an IS auditor consider to be the MOST serious? A. Sensitive data can be read by operators. B. Data can be amended without authorization. C. Unauthorized report copies can be printed. D. Output can be lost in the event of system failure.
1 4424An IS auditor's primary concern when application developers wish to use a copy of yesterday's production transaction file for volume tests is that: A. users may prefer to use contrived data for testing. B. unauthorized access to sensitive data may result. C. error handling and credibility checks may not be fully proven. D. full functionality of the new process is not necessarily tested.
1 5512A retail company recently installed data warehousing client software at geographically diverse sites. Due to time zone differences between the sites, updates to the warehouse are not synchronized. Which of the following will be affected the MOST? A. Data availability B. Data completeness C. Data redundancy D. Data inaccuracy
1 5405Which of the following is the BEST form of transaction validation? A. Use of key field verification techniques in data entry B. Use of programs to check the transaction against criteria set by management C. Authorization of the transaction by supervisory personnel in an adjacent department D. Authorization of the transaction by a department supervisor prior to the batch process
1 5189Which of the following is MOST effective in controlling application maintenance? A. Informing users of the status of changes B. Establishing priorities on program changes C. Obtaining user approval of program changes D. Requiring documented user specifications for changes
1 9249Following the development of an application system, it is determined that several design objectives have not been achieved. This is MOST likely to have been caused by: A. insufficient user involvement. B. early dismissal of the project manager. C. inadequate quality assurance (QA) tools. D. noncompliance with defined approval points.
1 5141
How many collision domains are in switch?
What technique would you use to fix the 10 leftmost columns on a list when scrolling to the right? a) Set Left Scroll-Boundary Column 10 b) Set Right Scroll-Boundary Column 10 c) Scroll List PS+<10> d) Scroll List Left Note: My answer for this question is A. But if you think different then pls give link or explain how.
WHAT IS EBIND IN DB2 HOW WOULD YOU DO IT. IF ANYONE KNOW THE ANSWER PLEASE POST IT HERE.
Hi , I am planning to take up OCA certification.Can you please provide me with the path for Oracle DBA certi.If any one of you have dumps for same,please mail them to sajagporwal123@gmail.com.Please give me any tips if possible.
What is passive topology in ccna?
Sun Certificatio details.
What are partial updates?
I am diploma in electrical engineering from maharshtr and wolud like issue the electrcal supervisor certificate , what is the process , where to apply , is it facility to apply online.
how can get electrical supervisory competency certificate in state govt.
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
can someone send me which is the best sas training institute in chennai?
What are the different memories used in a CISCO router?
What is a switch and why we are using switches?
What is the terminal emulation?