Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) Electronic signatures can prevent messages from being: A. suppressed. B. repudiated. C. disclosed. D. copied.
1 7829Electromagnetic emissions from a terminal represent an exposure because they: A. affect noise pollution. B. disrupt processor functions. C. produce dangerous levels of electric current. D. can be detected and displayed.
1 12284The PRIMARY purpose of audit trails is to: A. improve response time for users. B. establish accountability and responsibility for processed transactions. C. improve the operational efficiency of the system. D. provide useful information to auditors who may wish to track transactions.
1 14813Which of the following is an object-oriented technology characteristic that permits an enhanced degree of security over data? A. Inheritance B. Dynamic warehousing C. Encapsulation D. Polymorphism
1 9926The technique used to ensure security in virtual private networks (VPNs) is: A. encapsulation. B. wrapping. C. transform. D. encryption.
1 9858Which of the following provides the GREATEST assurance of message authenticity? A. The pre-hash code is derived mathematically from the message being sent. B. The pre-hash code is encrypted using the sender's private key. C. Encryption of the pre-hash code and the message using the secret key. D. Sender attains the recipient's public key and verifies the authenticity of its digital certificate with a certificate authority.
1 8202The BEST defense against network eavesdropping is: A. encryption. B. moving the defense perimeter outward. C. reducing the amplitude of the communication signal. D. masking the signal with noise.
1 7563During an audit of a telecommunications system the IS auditor finds that the risk of intercepting data transmitted to and from remote sites is very high. The MOST effective control for reducing this exposure is: A. encryption. B. callback modems. C. message authentication. D. dedicated leased lines.
2 7766Which of the following is the MOST effective technique for providing security during data transmission? A. Communication log B. Systems software log C. Encryption D. Standard protocol
1 8680To develop a successful business continuity plan, end user involvement is critical during which of the following phases? A. Business recovery strategy B. Detailed plan development C. Business impact analysis D. Testing and maintenance
1 8483An organization is experiencing a growing backlog of undeveloped applications. As part of a plan to eliminate this backlog, end-user computing with prototyping, supported by the acquisition of an interactive application generator system is being introduced. Which of the following areas is MOST critical to the ultimate success of this venture? A. Data control B. Systems analysis C. Systems programming D. Application programming
1 4588In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems? A. Maintaining system software parameters B. Ensuring periodic dumps of transaction logs C. Ensuring grandfather-father-son file backups D. Maintaining important data at an off-site location
1 10516The purpose for requiring source code escrow in a contractual agreement is to: A. ensure the source code is available if the vendor ceases to exist. B. permit customization of the software to meet specified business requirements. C. review the source code for adequacy of controls. D. ensure the vendor has complied with legal requirements.
1 5384An IS auditor, in evaluating proposed biometric control devices reviews the false rejection rates (FRRs), false acceptance rates (FARs) and equal error rates (ERRs) of three different devices. The IS auditor should recommend acquiring the device having the: A. least ERR. B. most ERR. C. least FRR but most FAR. D. least FAR but most FRR.
1 4549Which of the following is the MOST effective control over visitor access to a data center? A. Visitors are escorted. B. Visitor badges are required. C. Visitors sign in. D. Visitors are spot-checked by operators.
1 10933
How does L2TP process?
What is difference between null Nat and NAT 0
Explain how many types of ends in wan?
What is the advantage of vlan?
Which is best insistute to learn IIS 6.0 and 7.0
What is subnetting? Why is it used?
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
In port based access-list which command u give instead of ip?
hi! i am a 3rd year engineering student pursuing a degree in computer science and engineering. i was wondering that would it be useful for me to join the IBM's CEIS program. they have said it is a 5 month program and would cost me Rs.71000. they have said that i would be placed in ibm. so would this course be of any use to me as i am an engineering student doing computer science and engineering.
Explain the difference between tracert and traceroute?
What are the different ways authentication mechanism in VPN?
Which mode called privilege mode?
Hi Friends, Do any one has ISTQB Foundation level dumps i am planning to give next month ( OCT, 2010 )Toronto,Canada. Please share with me on my E-Mail address: gauravsharma26@hotmail.com Thanks in Adavance
I am interested in doing QTP certification.Can u pls send me the details as to how to proceed with the same?Also can u pls send me the required study materials,question pattern and sample questions?My email id is archana_nit2002@yahoo.co.in
Differentiate full-duplex from half-duplex.