Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) Which of the following is the MOST important issue to the IS auditor in a business process re-engineering (BPR) project would be? A. The loss of middle management, which often is a result of a BPR project B. That controls are usually given low priority in a BPR project C. The considerable negative impact that information protection could have on BPR D. The risk of failure due to the large size of the task usually undertaken in a BPR project
2 5040To meet pre-defined criteria, which of the following continuous audit techniques would BEST identify transactions to audit? A. Systems Control Audit Review File and Embedded Audit Modules (SCARF/EAM) B. Continuous and Intermittent Simulation (CIS) C. Integrated Test Facilities (ITF) D. Audit hooks
2 9077In a risk-based audit approach, an IS auditor, in addition to risk, would be influenced by: A. the availability of CAATs. B. management's representation. C. organizational structure and job responsibilities. D. the existence of internal and operational controls
2 10480The extent to which data will be collected during an IS audit should be determined, based on the: A. availability of critical and required information. B. auditor's familiarity with the circumstances. C. auditee's ability to find relevant evidence. D. purpose and scope of the audit being done.
3 7020The PRIMARY advantage of a continuous audit approach is that it: A. does not require an IS auditor to collect evidence on system reliability while processing is taking place. B. requires the IS auditor to review and follow up immediately on all information collected. C. can improve system security when used in time-sharing environments that process a large number of transactions. D. does not depend on the complexity of an organization's computer systems.
3 12157Which of the following data entry controls provides the GREATEST assurance that the data is entered correctly? A. Using key verification B. Segregating the data entry function from data entry verification C. Maintaining a log/record detailing the time, date, employee's initials/user id and progress of various data preparation and verification tasks D. Adding check digits
2 7205Capacity monitoring software is used to ensure: A. maximum use of available capacity. B. that future acquisitions meet user needs. C. concurrent use by a large number of users. D. continuity of efficient operations.
2 5281Which of the following exposures associated with the spooling of sensitive reports for offline printing would an IS auditor consider to be the MOST serious? A. Sensitive data can be read by operators. B. Data can be amended without authorization. C. Unauthorized report copies can be printed. D. Output can be lost in the event of system failure.
2 9697Which of the following types of firewalls would BEST protect a network from an Internet attack? A. Screened subnet firewall B. Application filtering gateway C. Packet filtering router D. Circuit-level gateway
2 11110Applying a retention date on a file will ensure that: A. data cannot be read until the date is set. B. data will not be deleted before that date. C. backup copies are not retained after that date. D. datasets having the same name are differentiated.
2 13337A digital signature contains a message digest to: A. show if the message has been altered after transmission. B. define the encryption algorithm. C. confirm the identity of the originator. D. enable message transmission in a digital format.
2 16500Which of the following would be the BEST method for ensuring that critical fields in a master record have been updated properly? A. Field checks B. Control totals C. Reasonableness checks D. A before-and-after maintenance report
2 6391A TCP/IP-based environment is exposed to the Internet. Which of the following BEST ensures that complete encryption and authentication protocols exist for protecting information while transmitted? A. Work is completed in tunnel mode with IP security using the nested services of authentication header (AH) and encapsulating security payload (ESP). B. A digital signature with RSA has been implemented. C. Digital certificates with RSA are being used. D. Work is being completed in TCP services.
2 7444To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.
2 5031An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.
2 7886
Hi Friends, I planning to write my ISTQB Foundation level exam in August 30,2010.. Any one please send the Dumps for me.... My email-id is: onyxontesting@gmail.com Thanks in advance..
I am beginner in Mainframe, so Pls tel me how to crack IBM DB2 certification exam and where will get more information.
Briefly explain the conversion steps in data encapsulation.
Which command we give on privilege mode for coming back to user execution mode?
Why mac address called physical address?
What is the difference between private ip and public ip?
Why we used Virtual MAC in GLBP
What we called 64 bit mac-address in ipv6?
WHAT IS EBIND IN DB2 HOW WOULD YOU DO IT. IF ANYONE KNOW THE ANSWER PLEASE POST IT HERE.
What is 10base2 ethernet lans?
Tell me why we use filter option?
Given the Following program IF X < Y THEN Statement 1; ELSE IF Y >= Z THEN Statement 2; END McCabe’s Cyclomatic Complexity is :
What is a Window in networking terms?
What is GRE in PPTP?
1. The Write statement was written and suddenly the program
was showing something different what can be the reason WRITE
'MOHAN'(001).
a)User must have choosen a different language
b) User must have made the line inactive at the Runtime.
c)There must something different Written on the Text element .
d)If nothing is mentioned in the Multilingual Table what
will be the output.
2. how the Transaction Variant.will be helpful to the Enduser?
a)hide the screen Field.
b)To change the Flow Logic.
c)To schedule background process
3. Rollback to be done at the dialog work process what will
you write.
a) Rollback work
b) Message A
c) Message E
d) Rollback work at the End of the PAI.
4) Rollback at the LUW concept.
a)You will write the Code at the PAI Block of the Each
Dialog process
b)You will write the Code ROLLBACK work at the End of the
LUW PAI block.
5. Field statement regarding the CHAIN INPUT
If the user has committed any wrong value on the one Field
of the Cain Input.
And what will be the syntax.
a) Field