Certifications Interview Questions
Questions Answers Views Company eMail

Losses can be minimized MOST effectively by using outside storage facilities to do which of the following? A. Provide current, critical information in backup files B. Ensure that current documentation is maintained at the backup facility C. Test backup hardware D. Train personnel in backup procedures

1 3734

Which of the following can consume valuable network bandwidth? A. Trojan horses B. Trap doors C. Worms D. Vaccines

1 6489

Programs that can run independently and travel from machine to machine across network connections, with the ability to destroy data or utilize tremendous computer and communication resources, are referred to as: A. trojan horses. B. viruses. C. worms. D. logic bombs.

7 15560

An organization acquiring other businesses continues using its legacy EDI systems, and uses three separate value added network (VAN) providers. No written VAN agreements exist. The IS auditor should recommend that management: A. obtain independent assurance of the third party service providers. B. set up a process for monitoring the service delivery of the third party. C. ensure that formal contracts are in place. D. consider agreements with third party service providers in the development of continuity plans.

1 5887

The role of IT auditor in complying with the Management Assessment of Internal Controls (Section 404 of the Sarbanes-Oxley Act) is: A. planning internal controls B. documenting internal controls C. designing internal controls D. implementing internal controls

1 4323

A primary function of risk management is the identification of cost-effective controls. In selecting appropriate controls, which of the following methods is best to study the effectiveness of adding various safeguards in reducing vulnerabilities? A. "What if" analysis B. Traditional cost/benefit analysis C. Screening analysis D. A "back-of-the-envelope" analysis

1 3702

According to the Committee of Sponsoring Organizations (COSO), the internal control framework consists of which of the following? A. Processes, people, objectives. B. Profits, products, processes. C. Costs, revenues, margins. D. Return on investment, earnings per share, market share.

1 4379

An IS auditor, performing a review of an application?s controls, discovers a weakness in system software, which could materially impact the application. The IS auditor should: A. Disregard these control weaknesses as a system software review is beyond the scope of this review. B. Conduct a detailed system software review and report the control weaknesses. C. Include in the report a statement that the audit was limited to a review of the application?s controls. D. Review the system software controls as relevant and recommend a detailed system software review.

1 9429

The reason for having controls in an IS environment: A. remains unchanged from a manual environment, but the implemented control features may be different. B. changes from a manual environment, therefore the implemented control features may be different. C. changes from a manual environment, but the implemented control features will be the same. D. remains unchanged from a manual environment and the implemented control features will also be the same.

2 6199

Which of the following types of risks assumes an absence of compensating controls in the area being reviewed? A. Control risk B. Detection risk C. Inherent risk D. Sampling risk

1 12673

An IS auditor is conducting substantive audit tests of a new accounts receivable module. The IS auditor has a tight schedule and limited computer expertise. Which would be the BEST audit technique to use in this situation? A. Test data B. Parallel simulation C. Integrated test facility D. Embedded audit module

1 5837

The PRIMARY purpose of compliance tests is to verify whether: A. controls are implemented as prescribed. B. documentation is accurate and current. C. access to users is provided as specified. D. data validation procedures are provided.

1 5265

Which of the following BEST describes the early stages of an IS audit? A. Observing key organizational facilities. B. Assessing the IS environment. C. Understanding business process and environment applicable to the review. D. Reviewing prior IS audit reports.

1 9714

The document used by the top management of organizations to delegate authority to the IS audit function is the: A. long-term audit plan. B. audit charter. C. audit planning methodology. D. steering committee minutes.

1 6275

Before reporting results of an audit to senior management, an IS auditor should: A. Confirm the findings with auditees. B. Prepare an executive summary and send it to auditee management. C. Define recommendations and present the findings to the audit committee. D. Obtain agreement from the auditee on findings and actions to be taken.

TPA,

1 4754


Un-Answered Questions { Certifications }

what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

734


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

618


Name the 2 protocols are in wan technology?

3233


What causes a triggered update to reset the router hold-down timer?

732


When dr communicate with bdr which multicast ip it use?

656






After how long keep alive messages exchange in eigrp?

614


What is the difference between static and dynamic ip addressing?

694


What is HDLC?

685


In a GLP facility who will decide whether the study is as per GLP or Non_GLP

235


What is the passive topology in ccna?

673


What is syntax of ipv4?

690


1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?

1945


What metric does rip use? How is the metric used to indicate an unreachable network?

796


Explian what is a node?

618


Where can I get LAtest qtp 2010 exam questions ?

1917