Which of the following controls will detect MOST effectively
the presence of bursts of errors in network transmissions?

A. Parity check

B. Echo check

C. Block sum check

D. Cyclic redundancy check

Answers were Sorted based on User's Feedback



Which of the following controls will detect MOST effectively the presence of bursts of errors in ne..

Answer / guest

Answer: D

The cyclic redundancy check (CRC) can check for a block of
transmitted data. The workstations generate the CRC and
transmit it with the data. The receiving workstation
computes a CRC and compares it to the transmitted CRC. If
both of them are equal, then the block is assumed error
free. In this case (such as in parity error or echo check),
multiple errors can be detected. In general, CRC can detect
all single-bit and bubble-bit errors. Parity check also
(known as vertical redundancy check) involves adding a
bit-known as the parity bit-to each character during
transmission. In this case, where there is a presence of
bursts of errors (i.e., impulsing noise during high
transmission rates), it has a reliability of approximately
50 percent. In higher transmission rates, this limitation is
significant. Echo checks detect line errors by
retransmitting data back to the sending device for
comparison with the original transmission.

Is This Answer Correct ?    10 Yes 1 No

Which of the following controls will detect MOST effectively the presence of bursts of errors in ne..

Answer / desai harshad chandrakantbhai

cyclic redudancy check
because cyclic red.check is most effectively f

Is This Answer Correct ?    4 Yes 0 No

Which of the following controls will detect MOST effectively the presence of bursts of errors in ne..

Answer / chris leong

Buddies, can you spelled defination for each and every type
of the checking above? Thanks.

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CISA Certification Interview Questions

Receiving an EDI transaction and passing it through the communications interface stage usually requires: A. translating and unbundling transactions. B. routing verification procedures. C. passing data to the appropriate application system. D. creating a point of receipt audit log.

1 Answers  


A request for a change to a report format in a module (subsystem) was made. After making the required changes, the programmer should carry out: A. unit testing. B. unit and module testing. C. unit, module and regression testing. D. module testing.

2 Answers  


Which of the following tests confirm that the new system can operate in its target environment? A. Sociability testing B. Regression testing C. Validation testing D. Black box testing

1 Answers  


Which of the following is a measure of the size of an information system based on the number and complexity of a system's inputs, outputs and files? A. Program evaluation review technique (PERT) B. Rapid application development (RAD) C. Function point analysis (FPA) D. Critical path method (CPM)

1 Answers  


The responsibility for designing, implementing and maintaining a system of internal control lies with: A. the IS auditor. B. management. C. the external auditor. D. the programming staff.

2 Answers  






A debugging tool, which reports on the sequence of steps executed by a program, is called a/an: A. output analyzer. B. memory dump. C. compiler. D. logic path monitor.

2 Answers  


Using test data as part of a comprehensive test of program controls in a continuous online manner is called a/an: A. test data/deck. B. base case system evaluation. C. integrated test facility (ITF). D. parallel simulation.

1 Answers  


A decrease in amplitude as a signal propagates along a transmission medium is known as: A. noise. B. crosstalk. C. attenuation. D. delay distortion.

1 Answers  


For an online transaction processing system, transactions per second is a measure of: A. throughput. B. response time. C. turnaround time. D. uptime.

1 Answers  


While reviewing the business continuity plan of an organization, the IS auditor observed that the organization's data and software files are backed up on a periodic basis. Which characteristic of an effective plan does this demonstrate? A. Deterrence B. Mitigation C. Recovery D. Response

1 Answers  


E-cash is a form of electronic money that: A. can be used over any computer network. B. utilizes reusable e-cash coins to make payments. C. does not require the use of an Internet digital bank. D. contains unique serial numbering to track the identity of the buyer.

1 Answers  


Which of the following processes is the FIRST step in developing a business continuity and disaster recovery plan for an organization? A. Alternate site selection B. Business impact analysis C. Test procedures and frequency D. Information classification

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)