Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured
1 4386The Cisco Discovery Protocol (CDP) periodically sends out a multicast packet (at layer 2). Which command will alter the default interval of 60 seconds? A.) cdp hold 111 B.) cdp wait 111 C.) cdp interval 111 D.) cdp 111 E.) cdp timer 111
1 4791Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verifies connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured
1 6450For which of the following applications would rapid recovery be MOST crucial? A. Point-of-sale system B. Corporate planning C. Regulatory reporting D. Departmental chargeback
2 6742During the review of an organization's disaster recovery and business continuity plan, the IS auditor found that a paper test was performed to verify the existence of all necessary procedures and actions within the recovery plan. This is a: A. preparedness test. B. module test. C. full test. D. walk-through test.
1 4424An IS auditor reviewing operating system access discovers that the system is not secured properly. In this situation, the IS auditor is LEAST likely to be concerned that the user might: A. create new users. B. delete database and log files. C. access the system utility tools. D. access the system writeable directories.
1 5108An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to recommend improving the: A. EDI trading partner agreements. B. physical controls for terminals. C. authentication techniques for sending and receiving messages. D. program change control procedures.
1 6574An IS auditor discovers that programmers have update access to the live environment. In this situation, the IS auditor is LEAST likely to be concerned that programmers can: A. authorize transactions. B. add transactions directly to the database. C. make modifications to programs directly. D. access data from live environment and provide faster maintenance.
1 4725An organization's disaster recovery plan should address early recovery of: A. all information systems processes. B. all financial processing applications. C. only those applications designated by the IS manager. D. processing in priority order, as defined by business management.
1 11430The responsibilities of a disaster recovery relocation team include: A. obtaining, packaging and shipping media and records to the recovery facilities, as well as establishing and overseeing an offsite storage schedule. B. locating a recovery site if one has not been predetermined and coordinating the transport of company employees to the recovery site. C. managing the relocation project and conducting a more detailed assessment of the damage to the facilities and equipment. D. coordinating the process of moving from the hot site to a new location or to the restored original location.
1 9408
What is log shipping? Can we do logshipping with SQL Server 7.0 - Logshipping is a new feature of SQL Server 2000. We should have two SQL Server - Enterprise Editions. From Enterprise Manager we can configure the logshipping. In logshipping the transactional log file from one server is automatically updated into the backup database on the other server. If one server fails, the other server will have the same db and we can use this as the DR (disaster recovery) plan.
What is Discover and Execute in XMLA?
This position requires travel, sometimes frequent, sometimes infrequent, to Independence to cover the civil docket there. Are you willing to travel?
In your opinion, what has been the single biggest news item from this past year? How did the media cover this event?
Do you think that the media covers too much bad news and not enough good news?
In which centuries were decorative black velvet or silk patches used to cover smallpox scars?
Regency era sleeves often covered the hand. What were they called?
How do internal quality audits cover requirements management activities in the project?
What are covert channels ?
How H.pylori DNA is recovered?
How to Covert string of (zeros and ones) to binary?
what is the difference and similarities between the outer body covering of free-living and parasitic flatworms?
How does dynamic discovery (in case of *.vsdisco) work? What goes on behind the scenes?
create a daily status report or list the items you will cover in a status report
What is PBX Testing & What is Test coverage?