Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

Which of the following would not prevent the loss of an asset but would assist in recovery by transferring part of the risk to a third party? A. Full system backups B. Insurance C. Testing D. Business impact analysis

1 5379

A control for a company that wants to prevent virus-infected programs (or other type of unauthorized modified programs) would be to: A. utilize integrity checkers. B. verify program's lengths. C. backup the source and object code. D. implement segregation of duties.

2 4461

Which of the following is the MOST effective type of antivirus software? A. Scanners B. Active monitors C. Integrity checkers D. Vaccines

2 19799

Testing the connection of two or more system components that pass information from one area to another is: A. pilot testing. B. parallel testing C. interface testing. D. regression testing.

2 5848

Which of the following are data file controls? A. Internal and external labeling B. Limit check and logical relationship checks C. Total items and hash totals D. Report distribution procedures

2 5569

Which of the following is an example of a passive attack, initiated through the Internet? A. Traffic analysis B. Masquerading C. Denial of service D. E-mail spoofing

2 33217

Which of the following Internet security threats could compromise integrity? A. Theft of data from the client B. Exposure of network configuration information C. A trojan horse browser D. Eavesdropping on the net

2 7840

IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that: A. a substantive test would be too costly. B. the control environment is poor. C. inherent risk is low. D. control risks are within the acceptable limits.

2 8984

The IS department of an organization wants to ensure that the computer files, used in the information processing facility, are backed up adequately to allow for proper recovery. This is a/an: A. control procedure. B. control objective. C. corrective control. D. operational control.

2 10147

Which of the following reports should an IS auditor use to check compliance with a service level agreement (SLA) requirement for uptime? A. Utilization reports B. Hardware error reports C. System logs D. Availability reports

2 9677

Various standards have emerged to assist IS organizations in achieving an operational environment that is predictable, measurable and repeatable. The standard that provides the definition of the characteristics and the associated quality evaluation process to be used when specifying the requirements for and evaluating the quality of software products throughout their life cycle is: A. ISO 9001. B. ISO 9002. C. ISO 9126. D. ISO 9003.

2 4983

To help mitigate the effects of a denial of service attack, which mechanism can an Internet service provider (ISP) use to identify Internet protocol (IP) packets from unauthorized sources? A. Inbound traffic filtering B. Rate limiting C. Reverse address lookup D. Network performance monitoring

2 5158

An organization is moving its application maintenance in-house from an outside source. Which of the following should be the main concern of an IS auditor? A. Regression testing B. Job scheduling C. User manuals D. Change control procedures

2 5220

The phases and deliverables of a systems development life cycle (SDLC) project should be determined: A. during the initial planning stages of the project. B. after early planning has been completed, but before work has begun. C. through out the work stages based on risks and exposures. D. only after all risks and exposures have been identified and the IS auditor has recommended appropriate controls.

2 11004

An IS auditor performing a review of the IS department discovers that formal project approval procedures do not exist. In the absence of these procedures the IS manager has been arbitrarily approving projects that can be completed in a short duration and referring other more complicated projects to higher levels of management for approval. The IS auditor should recommend as a FIRST course of action that: A. users participate in the review and approval process. B. formal approval procedures be adopted and documented. C. projects be referred to appropriate levels of management for approval. D. the IS manager's job description be changed to include approval authority.

2 5485


Un-Answered Questions { Certifications }

Which multicast ip eigrp protocol use?

1158


Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities

2468


Which command we give for live view of remote site routers?

1076


I completed MCA and also I have OCA certification. Now I am working as a Application Developer in Asp.net but I need a job in Oracle Application or related to Sql or Pl/Sql.

2702


What is 10base5 ethernet lans?

1103


i was rejected in 2011 for UK visa from gujarat ,india ..i lost that rejection letter..can any one who help me to tell me how to apply for rejected letter in UK embassy. Anybody please give me any idea or email id for it.. I hav tried a lot on www.gov.uk web site...please help me

1644


Which command we use for ping in ipv6?

1301


What are the different types of passwords used in securing a CISCO router?

1286


Mention what BOOTP is?

1177


.What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 14. How would you find all users that have not logged on since last month? 15. What are the DS* commands? 16. What’s the difference between LDIFDE and CSVDE? Usage considerations? 17. What are the FSMO roles? Who has them by default? What happens when each one fails? 18. What FSMO placement considerations do you know of? 19. I want to look at the RID allocation table for a DC. What do I do? 20. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 21. How do you configure a “stand-by operation master” for any of the roles? 22. How do you backup AD? 23. How do you restore AD? 24. How do you change the DS Restore admin password? 25. Why can’t you restore a DC that was backed up 4 months ago? 26. What are GPOs? 27. What is the order in which GPOs are applied? 28. Name a few benefits of using GPMC. 29. What are the GPC and the GPT? Where can I find them? 30. What are GPO links? What special things can I do to them? 31. What can I do to prevent inheritance from above? 32. How can I override blocking of inheritance? 33. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 34. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 35. Name a few differences in Vista GPOs 36. Name some GPO settings in the computer and user parts. 37. What are administrative templates? 38. What’s the difference between software publishing and assigning? 39. Can I deploy non-MSI software with GPO? 40. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that? 1.What Is the diff b/w Win NT & win 2000 ? 2. What is difference b/w WIN NT DNS,DhCP and Win 2000 DNS,DHCp ? 3. What are the seven Layers of OSI model ? 4. what Is TCP /IP / 5. What is the difference b/w Netbios name & Hostname resolution ? 6. What are the Features of AD ?What are the diff roles of AD ?(FsmO) 7. How do you carry out migration from NT 4.0 to Windows 2000 ? 8. What is the size of SAM DB in NT 4.0 and how many objects can be created in win NT / Win 2k / 9. How do uimplement group policy and what is the difference b/w s/w deployment and publishing in AD ? 10. Where does u change the role in AD FSMO roles ? 11. What is dynamic DNS and how dows it register with DHCP ? 12. What are the new features of windows 2000 ? 13. Can u rename a domain in win 2k environment ? 14. What is the backup policy that is taken in your company and what is the s/w that is used for taking back up ? 15. How do you update Antivirus on all machines (is it Auto update or manual update) 16. What is the system state data in Win 2k / 17. How do you repair a Blue Screen error ? 18. How is OS hardening done in Servers ? 19. How is auditing is carried out a workstations? 20. Hopw RAs setup in NT and hopw is the permission given for a NT user ? 21. what are the feautures of AD ? 22. by default what is the trust relation ship in Win2k ?] 23. What is native mode in win2k and can we have prewin2k environment(Win nt,win95,98,Me etc)in native mode ? Ans No, only it possible in mIxed mode.it support Pre windows 2000. 24. What is Global catalog server ? 25. Where do you Promote a BDC and PDC ? Ans : Server Manager 26. By default when Win 2k is installed what is the role it assumes and how do you promote it to dC ? 27. what is LDAP protocol / 28. What are EFS , DFS and Kerberos in Win 2k / 29. What is forest , Tree, Organization Unit and site in Win 2k3 ? 30. Can you establish Trust relation ship b/w win 2k and Win Nt machine in native mode environment ? 31. What are the files systems supported Win 2k and 2k3 ? 32. What is tool used to manage disk management tasks ? 33. What is the different between a Basic disc and Dynamic disc ? Can you revert dynamic disk to basic disk ? 34. What are the different levels of RAID that can be setup ? 35. What are the different roles played by a DNS server ? 36. What is a ZONE in DNS ? 37. What is the tool used to move an object with in a domain ? . 38. What is delegation in Ad and what are the benefits ? 39. What is thea System policy in Win NT ? 40. What is folder redirection and how is it accomplished ? 41. Where do you create a group policy in Win 2k nd 2k3 ? 42. How do you setup Disk quotas in Win 2k and 2k3? 43. What is subnet mask Default gateway and router ? 44. How do you configuring auditing in Win 2k and what tools do you use to view the results / 45. What are the 5 different type of backup strategy followed ? 46. What is ERD and how it is created in WIN NT / 2000 / 2003 ? 47. What is the data that is backed up when you backup system state data in win 2k ? 48. How is VPN setup in Windows 2000/2003 ? 49. What is a WINS Server and what is the role in NT/2000/20003 environment ? 50. What is IP Sec in Win 2k /2003 ? 51. What is the tool used manage IIS / 52. How do you secure IIS Website ? 53. How do you setup Multiple websites using a single IP address ? 54. What are Certificate Services in Win 2k nd 2k3? 55. How do you setup RIS and what are the requrirements on client ends ? 56. How many Licenses are provided by default when you setup Terminal services and what are the 2 different modes that a Terminal services can be setup ? 57. What is the tool used to measure the performance in win2k server ? 58. How do you authorize DHCP Server in AD ? 59. What are the prerequisites for installing AD ? 60. What are the file systems supported by Win NT ? 61. How do you remotely start and stop the services in IIS and Controlpanel on a remote machine ? 62. How do you debug the blue screen problem ? 63. Have You Subscribed Technet , MSDN ? 64. How do you troubleshoot a NTLDR,NTDETECT missing issues in Win NT /2000 ? 65. How do you change Boot time in NT/2000/2003 ? 66. what is the regular maintainance on Win Nt server (Event log,chkdisk,rdisk ) 67. What is the difference b/w Exchnage 5.5 and Exchange 2000 /2003? 68. Which are the services in Exchange Server 2003 ? 69. What are the storage groups in Exchange 2k and how many mailbox per storage group can be setup per storage grouping Exch 2k and 2k3 ? 70. What are connectors in Exchange Server and what are the different type of connectors in exchange 2000/2003 ? 71. What is a Site in terms on Exch Server and Win 2000 ? 72. What is circular logging in Exch 2000 ? 73. What are the circular logging in Excjh 2000 ? 74. What are the ifferent authentication methods used in IIS ?Where do you Configure this is IIS ? 75. What are the 4 steps involved in getting IP address from DHCP server ? 76. What is push and pull partners in terms if WINs Server ? 77. How do you back up WINS DB and what format is it stored ? 78. What is the difference WIN NT DHCP and WIN 2k DHcp ? 79. In MS Exch is there any option to forward all my incoming e-mails to another e-mail address ? 80. In what format are the mails and public folder data stored on Exch server ? 81. In what format are the mails stored on client side ? 82. What is Clustering and what are the different methodology in which clustering can be implemented ? 83. What are the 4 domains models defined by MS relating to NT 4.0 ? 84. What is the diff and advantage and disadvantages between a workgroup and domain model ? 85. What is a Trust Real;tion ship & How is it established in NT 4.0 ? 86. What is LAN and WAN ? 87. What is the diff b/w Local group and global group ? 88. What is distributed file system and different types of dfs model and how is it implemented in 2000/2003 ? 89. What is a Hosts and LM Hosts file and how is it useful ? 90. What is B Node,P-node,H-node and M-node in terms of WINS ? 91. What is AT command and how do you schedule automated backup in NT 4.0 92. What is ISINTEGand ESEUTIL in Exch Server ? 93. What is the use of ExchService account in Exchange Server ? 94. what are the Pre requisites for Exchange server installation ? 95. Can my Exchange server check POP3 mail ?

3078


What is overlaod?

1078


What is the simplest way to remotely configure a router?

1098


In port based access-list which command you give instead of ip?

1141


How does rip differs from igrp?

1116


what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

1236