Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

When a PC that has been used for the storage of confidential data is sold on the open market the: A. hard disk should be demagnetized. B. hard disk should be mid-level formatted.s C. data on the hard disk should be deleted. D. data on the hard disk should be defragmented.

1 7972

As part of the business continuity planning process, which of the following should be identified FIRST in the business impact analysis (BIA)? A. Organizational risks, such as single point-of-failure and infrastructure risk B. Threats to critical business processes C. Critical business processes for ascertaining the priority for recovery D. Resources required for resumption of business

1 5244

An organization is introducing a single sign-on (SSO) system. Under the SSO system, users will be required to enter only one user ID and password for access to all application systems. Under the SSO system, unauthorized access: A. is less likely. B. is more likely. C. will have a greater impact. D. will have a smaller impact.

1 4396

Which of the following is an implementation risk within the process of decision support systems? A. Management control B. Semistructured dimensions C. Inability to specify purpose and usage patterns D. Changes in decision processes

1 14512

Which of the following provides the framework for designing and developing logical access controls? A. Information systems security policy B. Access control lists C. Password management D. System configuration files

2 10514

An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely: A. check to ensure the type of transaction is valid for that card type. B. verify the format of the number entered then locate it on the database. C. ensure that the transaction entered is within the cardholder's credit limit. D. confirm that the card is not shown as lost or stolen on the master file.

1 9691

In reviewing the IS short-range (tactical) plan, the IS auditor should determine whether: A. there is an integration of IS and business staffs within projects. B. there is a clear definition of the IS mission and vision. C. there is a strategic information technology planning methodology in place. D. the plan correlates business objectives to IS goals and objectives.

1 9375

Which of the following would contribute MOST to an effective business continuity plan (BCP)? The BCP: A. document was circulated to all interested parties. B. planning involved all user departments. C. was approved by senior management. D. was audited by an external IS auditor.

1 8756

While planning an audit, an assessment of risk should be made to provide: A. reasonable assurance that the audit will cover material items. B. definite assurance that material items will be covered during the audit work. C. reasonable assurance that all items will be covered by the audit. D. sufficient assurance that all items will be covered during the audit work.

1 8912

Which of the following processes describes risk assessment? Risk assessment is: A. subjective. B. objective. C. mathematical. D. statistical.

1 7345

An IS auditor conducting a review of disaster recovery planning at a financial processing organization has discovered the following: * The existing disaster recovery plan was compiled two years ago by a systems analyst in the organization's IT department using transaction flow projections from the operations department. * The plan was presented to the deputy CEO for approval and formal issue, but it is still awaiting his attention. * The plan has never been updated, tested or circulated to key management and staff, though interviews show that each would know what action to take for their area in the event of a disruptive incident. The basis of an organization's disaster recovery plan is to reestablish live processing at an alternative site where a similar, but not identical hardware configuration is already established. The IS auditor should: A. take no action as the lack of a current plan is the only significant finding. B. recommend that the hardware configuration at each site should be identical. C. perform a review to verify that the second configuration can support live processing. D. report that the financial expenditure on the alternative site is wasted without an effective plan.

1 5131

An IS auditor is reviewing the database administration function to ascertain whether adequate provision has been made for controlling data. The IS auditor should determine that the: A. function reports to data processing operations. B. responsibilities of the function are well defined. C. database administrator is a competent systems programmer. D. audit software has the capability of efficiently accessing the database.

1 7276

A web-based bookstore has included the customer relationship management (CRM) system in its operations. An IS auditor has been assigned to perform a call center review. Which of the following is the MOST appropriate first step for the IS auditor to take? A. Review the company's performance since the CRM was implemented. B. Review the IT strategy. C. Understand the business focus of the bookstore. D. Interview salespeople and supervisors.

1 5116

An IS auditor evaluates the test results of a modification to a system that deals with payment computation. The auditor finds that 50 percent of the calculations do not match predetermined totals. Which of the following would MOST likely be the next step in the audit? A. Design further tests of the calculations that are in error. B. Identify variables that may have caused the test results to be inaccurate. C. Examine some of the test cases to confirm the results. D. Document the results and prepare a report of findings, conclusions and recommendations.

1 4782

An IS auditor's MAJOR concern as a result of reviewing a business process reengineering (BPR) project should be whether the: A. newly designed business process has key controls in place. B. changed process will affect organization structure, finances and personnel. C. roles for suppliers have been redefined. D. process has been documented before and after reengineering.

1 5199


Un-Answered Questions { Certifications }

Please could anyone send me WebSphere Application Server (WAS Admin) Technical questions/certification dumps @    yogesh.birje@gmail.com? Thanks in advance

2021


1. What is Active Directory? 2. What is LDAP? 3. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. 4. Where is the AD database held? What other folders are related to AD? 5. What is the SYSVOL folder? 6. Name the AD NCs and replication issues for each NC 7. What are application partitions? When do I use them 8. How do you create a new application partition 9. How do you view replication properties for AD partitions and DCs? 10. What is the Global Catalog? 11. How do you view all the GCs in the forest? 12. Why not make all DCs in a large forest as GCs? 13. Trying to look at the Schema, how can I do that? 14. What are the Support Tools? Why do I need them? 15. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN? 16. What are sites? What are they used for? 17. What’s the difference between a site link’s schedule and interval? 18. What is the KCC? 19. What is the ISTG? Who has that role by default? 20. What are the requirements for installing AD on a new server? 21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link? 22. How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database? 23. What tool would I use to try to grab security related packets from the wire? 24. Name some OU design considerations. 25. What is tombstone lifetime attribute? 26. What do you do to install a new Windows 2003 DC in a Windows 2000 AD? 27. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 28. How would you find all users that have not logged on since last month? 29. What are the DS* commands? 30. What’s the difference between LDIFDE and CSVDE? Usage considerations? 31. What are the FSMO roles? Who has them by default? What happens when each one fails? 32. What FSMO placement considerations do you know of? 33. I want to look at the RID allocation table for a DC. What do I do? 34. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 35. How do you configure a “stand-by operation master” for any of the roles? 36. How do you backup AD? 37. How do you restore AD? 38. How do you change the DS Restore admin password? 39. Why can’t you restore a DC that was backed up 4 months ago? 40. What are GPOs? 41. What is the order in which GPOs are applied? 42. Name a few benefits of using GPMC. 43. What are the GPC and the GPT? Where can I find them? 44. What are GPO links? What special things can I do to them? 45. What can I do to prevent inheritance from above? 46. How can I override blocking of inheritance? 47. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 48. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 49. Name a few differences in Vista GPOs 50. Name some GPO settings in the computer and user parts. 51. What are administrative templates? 52. What’s the difference between software publishing and assigning? 53. Can I deploy non-MSI software with GPO? 54. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?

2804


Which type for communication switch do?

1144


What is DHCP stand for?

1268


Explain what is route poisoning?

1314


state bank managr can sign the character certificate

276


How many types of memories are used in cisco router?

1144


how can get electrical supervisory competency certificate in state govt.

2442


Hi, Can any one please tell me the experience of their CCNA interview,and please tell me all the questions they asked in the interview. Many Thanks...

2175


What do you understand by redundancy?

1301


What we called 64 bit mac-address in ipv6?

1262


Explain the difference between tracert and traceroute?

1148


What is the difference between unicast, multicast, broadcast, and anycast?

1127


What port does rip use?

1154


hello sir , doing certification in manual testing is good and worth to get a job ????????? if so may i know which be a good institute to learn manual testing????? i have to say about myself that i'm not gud at programming and maths so plz refer which afford to me if this not suits?

2149