Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) Which of the following would not prevent the loss of an asset but would assist in recovery by transferring part of the risk to a third party? A. Full system backups B. Insurance C. Testing D. Business impact analysis
1 5379A control for a company that wants to prevent virus-infected programs (or other type of unauthorized modified programs) would be to: A. utilize integrity checkers. B. verify program's lengths. C. backup the source and object code. D. implement segregation of duties.
2 4461Which of the following is the MOST effective type of antivirus software? A. Scanners B. Active monitors C. Integrity checkers D. Vaccines
2 19799Testing the connection of two or more system components that pass information from one area to another is: A. pilot testing. B. parallel testing C. interface testing. D. regression testing.
2 5848Which of the following are data file controls? A. Internal and external labeling B. Limit check and logical relationship checks C. Total items and hash totals D. Report distribution procedures
2 5569Which of the following is an example of a passive attack, initiated through the Internet? A. Traffic analysis B. Masquerading C. Denial of service D. E-mail spoofing
2 33217Which of the following Internet security threats could compromise integrity? A. Theft of data from the client B. Exposure of network configuration information C. A trojan horse browser D. Eavesdropping on the net
2 7840IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that: A. a substantive test would be too costly. B. the control environment is poor. C. inherent risk is low. D. control risks are within the acceptable limits.
2 8984The IS department of an organization wants to ensure that the computer files, used in the information processing facility, are backed up adequately to allow for proper recovery. This is a/an: A. control procedure. B. control objective. C. corrective control. D. operational control.
2 10147Which of the following reports should an IS auditor use to check compliance with a service level agreement (SLA) requirement for uptime? A. Utilization reports B. Hardware error reports C. System logs D. Availability reports
2 9677Various standards have emerged to assist IS organizations in achieving an operational environment that is predictable, measurable and repeatable. The standard that provides the definition of the characteristics and the associated quality evaluation process to be used when specifying the requirements for and evaluating the quality of software products throughout their life cycle is: A. ISO 9001. B. ISO 9002. C. ISO 9126. D. ISO 9003.
2 4983To help mitigate the effects of a denial of service attack, which mechanism can an Internet service provider (ISP) use to identify Internet protocol (IP) packets from unauthorized sources? A. Inbound traffic filtering B. Rate limiting C. Reverse address lookup D. Network performance monitoring
2 5158An organization is moving its application maintenance in-house from an outside source. Which of the following should be the main concern of an IS auditor? A. Regression testing B. Job scheduling C. User manuals D. Change control procedures
2 5220The phases and deliverables of a systems development life cycle (SDLC) project should be determined: A. during the initial planning stages of the project. B. after early planning has been completed, but before work has begun. C. through out the work stages based on risks and exposures. D. only after all risks and exposures have been identified and the IS auditor has recommended appropriate controls.
2 11004An IS auditor performing a review of the IS department discovers that formal project approval procedures do not exist. In the absence of these procedures the IS manager has been arbitrarily approving projects that can be completed in a short duration and referring other more complicated projects to higher levels of management for approval. The IS auditor should recommend as a FIRST course of action that: A. users participate in the review and approval process. B. formal approval procedures be adopted and documented. C. projects be referred to appropriate levels of management for approval. D. the IS manager's job description be changed to include approval authority.
2 5485
Which multicast ip eigrp protocol use?
Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities
Which command we give for live view of remote site routers?
I completed MCA and also I have OCA certification. Now I am working as a Application Developer in Asp.net but I need a job in Oracle Application or related to Sql or Pl/Sql.
What is 10base5 ethernet lans?
i was rejected in 2011 for UK visa from gujarat ,india ..i lost that rejection letter..can any one who help me to tell me how to apply for rejected letter in UK embassy. Anybody please give me any idea or email id for it.. I hav tried a lot on www.gov.uk web site...please help me
Which command we use for ping in ipv6?
What are the different types of passwords used in securing a CISCO router?
Mention what BOOTP is?
.What do you do to install a new Windows 2003 R2 DC in a
Windows 2003 AD?
14. How would you find all users that have not logged on
since last month?
15. What are the DS* commands?
16. What’s the difference between LDIFDE and CSVDE? Usage
considerations?
17. What are the FSMO roles? Who has them by default? What
happens when each one fails?
18. What FSMO placement considerations do you know of?
19. I want to look at the RID allocation table for a DC.
What do I do?
20. What’s the difference between transferring a FSMO role
and seizing one? Which one should you NOT seize? Why?
21. How do you configure a “stand-by operation
master†for any of the roles?
22. How do you backup AD?
23. How do you restore AD?
24. How do you change the DS Restore admin password?
25. Why can’t you restore a DC that was backed up 4 months ago?
26. What are GPOs?
27. What is the order in which GPOs are applied?
28. Name a few benefits of using GPMC.
29. What are the GPC and the GPT? Where can I find them?
30. What are GPO links? What special things can I do to them?
31. What can I do to prevent inheritance from above?
32. How can I override blocking of inheritance?
33. How can you determine what GPO was and was not applied
for a user? Name a few ways to do that.
34. A user claims he did not receive a GPO, yet his user and
computer accounts are in the right OU, and everyone else
there gets the GPO. What will you look for?
35. Name a few differences in Vista GPOs
36. Name some GPO settings in the computer and user parts.
37. What are administrative templates?
38. What’s the difference between software publishing and
assigning?
39. Can I deploy non-MSI software with GPO?
40. You want to standardize the desktop environments
(wallpaper, My Documents, Start menu, printers etc.) on the
computers in one department. How would you do that?
1.What Is the diff b/w Win NT & win 2000 ?
2. What is difference b/w WIN NT DNS,DhCP and Win 2000
DNS,DHCp ?
3. What are the seven Layers of OSI model ?
4. what Is TCP /IP /
5. What is the difference b/w Netbios name & Hostname
resolution ?
6. What are the Features of AD ?What are the diff roles
of AD ?(FsmO)
7. How do you carry out migration from NT 4.0 to
Windows 2000 ?
8. What is the size of SAM DB in NT 4.0 and how many
objects can be created in win NT / Win 2k /
9. How do uimplement group policy and what is the
difference b/w s/w deployment and publishing in AD ?
10. Where does u change the role in AD FSMO roles ?
11. What is dynamic DNS and how dows it register with
DHCP ?
12. What are the new features of windows 2000 ?
13. Can u rename a domain in win 2k environment ?
14. What is the backup policy that is taken in your
company and what is the s/w that is used for taking back up ?
15. How do you update Antivirus on all machines (is it
Auto update or manual update)
16. What is the system state data in Win 2k /
17. How do you repair a Blue Screen error ?
18. How is OS hardening done in Servers ?
19. How is auditing is carried out a workstations?
20. Hopw RAs setup in NT and hopw is the permission
given for a NT user ?
21. what are the feautures of AD ?
22. by default what is the trust relation ship in Win2k ?]
23. What is native mode in win2k and can we have
prewin2k environment(Win nt,win95,98,Me etc)in native mode ?
Ans No, only it possible in mIxed mode.it support Pre
windows 2000.
24. What is Global catalog server ?
25. Where do you Promote a BDC and PDC ? Ans : Server
Manager
26. By default when Win 2k is installed what is the
role it assumes and how do you promote it to dC ?
27. what is LDAP protocol /
28. What are EFS , DFS and Kerberos in Win 2k /
29. What is forest , Tree, Organization Unit and site
in Win 2k3 ?
30. Can you establish Trust relation ship b/w win 2k
and Win Nt machine in native mode environment ?
31. What are the files systems supported Win 2k and 2k3 ?
32. What is tool used to manage disk management tasks ?
33. What is the different between a Basic disc and
Dynamic disc ? Can you revert dynamic disk to basic disk ?
34. What are the different levels of RAID that can be
setup ?
35. What are the different roles played by a DNS server ?
36. What is a ZONE in DNS ?
37. What is the tool used to move an object with in a
domain ?
What is overlaod?
What is the simplest way to remotely configure a router?
In port based access-list which command you give instead of ip?
How does rip differs from igrp?
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?