Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) A programmer managed to gain access to the production library, modified a program that was then used to update a sensitive table in the payroll database and restored the original program. Which of the following methods would MOST effectively detect this type of unauthorized changes? A. Source code comparison B. Executable code comparison C. Integrated test facilities (ITF) D. Review of transaction log files
1 4160In a business continuity plan, there are several methods of providing telecommunication continuity. One method is diverse routing which involves: A. providing extra capacity with the intent of using the surplus capacity should the normal primary transmission capability not be available. B. routing information via other alternate media such as copper cable or fiber optics. C. providing diverse long-distance network availability utilizing T-1 circuits among the major long-distance carriers. D. routing traffic through split-cable facilities or duplicate-cable facilities.
CISA,
2 6345The responsibilities of a disaster recovery relocation team include: A. obtaining, packaging and shipping media and records to the recovery facilities, as well as establishing and overseeing an offsite storage schedule. B. locating a recovery site if one has not been predetermined and coordinating the transport of company employees to the recovery site. C. managing the relocation project and conducting a more detailed assessment of the damage to the facilities and equipment. D. coordinating the process of moving from the hot site to a new location or to the restored original location.
1 9523Which of the following findings would an IS auditor be MOST concerned about when performing an audit of backup and recovery and the offsite storage vault? A. There are three individuals with a key to enter the area. B. Paper documents also are stored in the offsite vault. C. Data files, which are stored in the vault, are synchronized. D. The offsite vault is located in a separate facility.
1 8768Which of the following functions, if performed by scheduling and operations personnel, would be in conflict with a policy requiring a proper segregation of duties? A. Job submission B. Resource management C. Code correction D. Output distribution
1 5034Which of the following facilitates program maintenance? A. More cohesive and loosely coupled programs B. Less cohesive and loosely coupled programs C. More cohesive and strongly coupled programs D. Less cohesive and strongly coupled programs
1 8665During an audit of the tape management system at a data center, an IS auditor discovered that parameters are set to bypass or ignore the labels written on tape header records. The IS auditor also determined that effective staging and job setup procedures were in place. In this situation, the IS auditor should conclude that the: A. tape headers should be manually logged and checked by the operators. B. staging and job setup procedures are not appropriate compensating controls. C. staging and job setup procedures compensate for the tape label control weakness. D. tape management system parameters must be set to check all labels.
1 21378Compensating controls are intended to: A. reduce the risk of an existing or potential control weakness. B. predict potential problems before they occur. C. remedy problems discovered by detective controls. D. report errors or omissions.
1 6826A distinction that can be made between compliance testing and substantive testing is that compliance testing tests: A. details, while substantive testing tests procedures. B. controls, while substantive testing tests details. C. plans, while substantive testing tests procedures. D. for regulatory requirements, while substantive testing tests validations.
3 17122When an IS auditor obtains a list of current users with access to a WAN/LAN and verifies that those listed are active associates, the IS auditor is performing a: A. compliance test. B. substantive test. C. statistical sample. D. risk assessment.
1 4961The use of coding standards is encouraged by IS auditors because they: A. define access control tables. B. detail program documentation. C. standardize dataflow diagram methodology. D. ensure compliance with field naming conventions.
1 5179During a review of a large data center an IS auditor observed computer operators acting as backup tape librarians and security administrators. Which of these situations would be MOST critical to report? A. Computer operators acting as tape librarians B. Computer operators acting as security administrators C. Computer operators acting as a tape librarian and security administrator D. It is not necessary to report any of these situations.
1 4539Which of the following is widely accepted as one of the critical components in networking management? A. Configuration management B. Topological mappings C. Application of monitoring tools D. Proxy server trouble shooting
1 10506Connection-oriented protocols in the TCP/IP suite are implemented in the: A. transport layer. B. application layer. C. physical layer. D. network layer.
1 4901Which of the following should be in place to protect the purchaser of an application package in the event that the vendor ceases to trade? A. Source code held in escrow. B. Object code held by a trusted third party. C. Contractual obligation for software maintenance. D. Adequate training for internal programming staff.
1 4220
Tell me when we use standard access-list?
Which is best among dotnet and dotnet diploma? Friends Please answer this question as soon as possible.
hi can any suggest me about websphere program? ie WAS i m thinking to do this course from Hyderabad? will it be beneficial for my future carrer? i have completed my B.e
State the difference between dynamic IP and static IP addressing?
Which works router do?
Explain the difference between arp and rarp?
How does PPP use LCP for link control?
.What do you do to install a new Windows 2003 R2 DC in a
Windows 2003 AD?
14. How would you find all users that have not logged on
since last month?
15. What are the DS* commands?
16. What’s the difference between LDIFDE and CSVDE? Usage
considerations?
17. What are the FSMO roles? Who has them by default? What
happens when each one fails?
18. What FSMO placement considerations do you know of?
19. I want to look at the RID allocation table for a DC.
What do I do?
20. What’s the difference between transferring a FSMO role
and seizing one? Which one should you NOT seize? Why?
21. How do you configure a “stand-by operation
master†for any of the roles?
22. How do you backup AD?
23. How do you restore AD?
24. How do you change the DS Restore admin password?
25. Why can’t you restore a DC that was backed up 4 months ago?
26. What are GPOs?
27. What is the order in which GPOs are applied?
28. Name a few benefits of using GPMC.
29. What are the GPC and the GPT? Where can I find them?
30. What are GPO links? What special things can I do to them?
31. What can I do to prevent inheritance from above?
32. How can I override blocking of inheritance?
33. How can you determine what GPO was and was not applied
for a user? Name a few ways to do that.
34. A user claims he did not receive a GPO, yet his user and
computer accounts are in the right OU, and everyone else
there gets the GPO. What will you look for?
35. Name a few differences in Vista GPOs
36. Name some GPO settings in the computer and user parts.
37. What are administrative templates?
38. What’s the difference between software publishing and
assigning?
39. Can I deploy non-MSI software with GPO?
40. You want to standardize the desktop environments
(wallpaper, My Documents, Start menu, printers etc.) on the
computers in one department. How would you do that?
1.What Is the diff b/w Win NT & win 2000 ?
2. What is difference b/w WIN NT DNS,DhCP and Win 2000
DNS,DHCp ?
3. What are the seven Layers of OSI model ?
4. what Is TCP /IP /
5. What is the difference b/w Netbios name & Hostname
resolution ?
6. What are the Features of AD ?What are the diff roles
of AD ?(FsmO)
7. How do you carry out migration from NT 4.0 to
Windows 2000 ?
8. What is the size of SAM DB in NT 4.0 and how many
objects can be created in win NT / Win 2k /
9. How do uimplement group policy and what is the
difference b/w s/w deployment and publishing in AD ?
10. Where does u change the role in AD FSMO roles ?
11. What is dynamic DNS and how dows it register with
DHCP ?
12. What are the new features of windows 2000 ?
13. Can u rename a domain in win 2k environment ?
14. What is the backup policy that is taken in your
company and what is the s/w that is used for taking back up ?
15. How do you update Antivirus on all machines (is it
Auto update or manual update)
16. What is the system state data in Win 2k /
17. How do you repair a Blue Screen error ?
18. How is OS hardening done in Servers ?
19. How is auditing is carried out a workstations?
20. Hopw RAs setup in NT and hopw is the permission
given for a NT user ?
21. what are the feautures of AD ?
22. by default what is the trust relation ship in Win2k ?]
23. What is native mode in win2k and can we have
prewin2k environment(Win nt,win95,98,Me etc)in native mode ?
Ans No, only it possible in mIxed mode.it support Pre
windows 2000.
24. What is Global catalog server ?
25. Where do you Promote a BDC and PDC ? Ans : Server
Manager
26. By default when Win 2k is installed what is the
role it assumes and how do you promote it to dC ?
27. what is LDAP protocol /
28. What are EFS , DFS and Kerberos in Win 2k /
29. What is forest , Tree, Organization Unit and site
in Win 2k3 ?
30. Can you establish Trust relation ship b/w win 2k
and Win Nt machine in native mode environment ?
31. What are the files systems supported Win 2k and 2k3 ?
32. What is tool used to manage disk management tasks ?
33. What is the different between a Basic disc and
Dynamic disc ? Can you revert dynamic disk to basic disk ?
34. What are the different levels of RAID that can be
setup ?
35. What are the different roles played by a DNS server ?
36. What is a ZONE in DNS ?
37. What is the tool used to move an object with in a
domain ?
Tell me which protocol called rapid protocol?
Explain the difference between bus topology and hub?
How many valid ip will b in /21 in route summarization?
What are the possible ways of data exchange in ccna?
Why subnetting is used?
Define the logical link control?
I am an iti holder i have passed at 2010 how i can get electrical supervisor licence in banglore or in chittoor (dist) A P