Which of the following functions is performed by a virtual private network (VPN)? A. Hiding information from sniffers on the net B. Enforcing security policies C. Detecting misuse or mistakes D. Regulating access
1 7369Which of the following BEST describes the objectives of following a standard system development methodology? A. To ensure that appropriate staffing is assigned and to provide a method of controlling costs and schedules B. To provide a method of controlling costs and schedules and to ensure communication among users, IS auditors, management and IS personnel C. To provide a method of controlling costs and schedules and an effective means of auditing project development D. To ensure communication among users, IS auditors, management and personnel and to ensure that appropriate staffing is assigned
1 4951Which of the following will help detect changes made by an intruder to the system log of a server? A. Mirroring of the system log on another server B. Simultaneously duplicating the system log on a write-once disk C. Write protecting the directory containing the system log D. Storing the backup of the system log offsite
1 10027Access rules normally are included in which of the following documentation categories? A. Technical reference documentation B. User manuals C. Functional design specifications D. System development methodology documents
1 4648An IS auditor reviewing operating system access discovers that the system is not secured properly. In this situation, the IS auditor is LEAST likely to be concerned that the user might: A. create new users. B. delete database and log files. C. access the system utility tools. D. access the system writeable directories.
1 5280Which of the following is the MOST critical and contributes the MOST to the quality of data in a data warehouse? A. Accuracy of the source data B. Credibility of the data source C. Accuracy of the extraction process D. Accuracy of the data transformation
1 5775Which of the following physical access controls would provide the highest degree of security over unauthorized access? A. Bolting door lock B. Cipher lock C. Electronic door lock D. Fingerprint scanner
1 7046Which of the following processes is the FIRST step in developing a business continuity and disaster recovery plan for an organization? A. Alternate site selection B. Business impact analysis C. Test procedures and frequency D. Information classification
1 5636Which of the following techniques or tools would assist an IS auditor when performing a statistical sampling of financial transactions maintained in a financial management information system? A. Spreadsheets B. Parallel simulation C. Generalized audit software D. Regression testing
1 5351Which of the following is a disadvantage of image processing? A. Verifies signatures B. Improves service C. Relatively inexpensive to use D. Reduces deterioration due to handling
3 14111Which of the following is the MOST important reason for an IS auditor to be involved in a system development project? A. Evaluate the efficiency of resource utilization. B. Develop audit programs for subsequent audits of the system. C. Evaluate the selection of hardware to be used by the system. D. Ensure that adequate controls are built into the system during development.
1 4390Which of the following would BEST ensure continuity of a wide area network (WAN) across the organization? A. Built-in alternative routing B. Full system backup taken daily C. A repair contract with a service provider D. A duplicate machine alongside each server
1 11457Which of the following is a strength of a client-server security system? A. Change control and change management procedures are inherently strong. B. Users can manipulate data without controlling resources on the mainframe. C. Network components seldom become obsolete. D. Access to confidential data or data manipulation is controlled tightly.
2 6414Which of the following applet intrusion issues poses the GREATEST risk of disruption to an organization? A. A program that deposits a virus on a client machine B. Applets recording keystrokes and, therefore, passwords C. Downloaded code that reads files on a client's hard drive D. Applets opening connections from the client machine
1 9803Reconfiguring which of the following firewall types will prevent inward downloading of files through the file transfer protocol (FTP)? A. Circuit gateway B. Application gateway C. Packet filter D. Screening router
1 8004
What are advantages of using Java?s layout managers than windowing systems?
How to synchronize slow growing bacterial species of Cyanobacteria, Thiobacilli, Mycoplasma?
What Testing process U r following in ur organization?
what r the strategies & methodologies r u following in preperation of test cases based on usecase?
Which one of the following activities is the most efficient and most cost effective at identifying defects? 1. Prototyping 2. Unit test 3. Beta test 4. Design/code inspection 5. Risk analysis
The Following Characterstics posses some XYZ company. * Uses formal standards and policies * Conducts software inspections * Has advanced configuration management and change control * Uses CASE tools * Has a software engineering process group * Gathers metrics on process and quality * Requires that developers have formal software engineering training * Practices continued process improvement Based on aboue , Tell me which CMM Level is the company..? 1. Level 1 - Initial 2. Level 2 - Repeatable 3. Level 3 - Defined 4. Level 4 - Managed 5. Level 5 - Optimizing
Rules of civil law are different than that of criminal law. Are you prepared to enter this knowing that there is little guidance from within our office?
During a heart attack, blood flowing to the heart muscle is interrupted by blockage of a coronary artery. How would you expect the metabolism in the heart to change?
A 22 year old woman collapses following Neville Barnes forceps delivery of the second twin. She is hypotensive and tachycardic and the estimated blood loss is now 800ml. How would you manage this situation?
I'm new to sewing, and I need to know what are some good pieces to start with?
Which namespace do the classes, allowing you to support COM functionality, are located?
Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??
Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??
What is the trouble in growing streptococcus species?
What are the Conditions for growing slow-growing mycobacteria?