Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the: A. maintenance of access logs of usage of various system resources. B. authorization and authentication of the user prior to granting access to system resources. C. adequate protection of stored data on servers by encryption or other means. D. accountability system and the ability to identify any terminal accessing system resources.

2 11733

An organization is considering connecting a critical PC-based system to the Internet. Which of the following would provide the BEST protection against hacking? A. An application-level gateway B. A remote access server C. A proxy server D. Port scanning

3 13715

If a database is restored using before-image dumps, where should the process be restarted following an interruption? A. Before the last transaction B. After the last transaction C. The first transaction after the latest checkpoint D. The last transaction before the latest checkpoint

CISA, IBM, Oracle,

2 30328

Which of the following is a practice that should be incorporated into the plan for testing disaster recovery procedures? A. Invite client participation. B. Involve all technical staff. C. Rotate recovery managers. D. Install locally stored backup.

Microsoft,

4 8628

A large chain of shops with EFT at point-of-sale devices has a central communications processor for connecting to the banking network. Which of the following is the BEST disaster recovery plan for the communications processor? A. Offsite storage of daily backups B. Alternative standby processor onsite C. Installation of duplex communication links D. Alternative standby processor at another network node

3 7651

Which of the following is an object-oriented technology characteristic that permits an enhanced degree of security over data? A. Inheritance B. Dynamic warehousing C. Encapsulation D. Polymorphism

3 6762

When implementing an application software package, which of the following presents the GREATEST risk? A. Uncontrolled multiple software versions B. Source programs that are not synchronized with object code C. Incorrectly set parameters D. Programming errors

2 6066

Which of the following controls would be MOST effective in ensuring that production source code and object code are synchronized? A. Release-to-release source and object comparison reports B. Library control software restricting changes to source code C. Restricted access to source code and object code D. Date and time-stamp reviews of source and object code

2 11858

During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.

2 12013

Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports

3 17273

The BEST method of proving the accuracy of a system tax calculation is by: A. detailed visual review and analysis of the source code of the calculation programs. B. recreating program logic using generalized audit software to calculate monthly totals. C. preparing simulated transactions for processing and comparing the results to predetermined results. D. automatic flowcharting and analysis of the source code of the calculation programs.

2 6781

IS management has recently informed the IS auditor of its decision to disable certain referential integrity controls in the payroll system to provide users with a faster report generator. This will MOST likely increase the risk of: A. data entry by unauthorized users. B. a nonexistent employee being paid. C. an employee receiving an unauthorized raise. D. duplicate data entry by authorized users.

2 8175

Which of the following pairs of functions should not be combined to provide proper segregation of duties? A. Tape librarian and computer operator B. Application programming and data entry C. Systems analyst and database administrator D. Security administrator and quality assurance

3 10653

An IS auditor who is reviewing application run manuals would expect them to contain: A. details of source documents. B. error codes and their recovery actions. C. program logic flowcharts and file definitions. D. change records for the application source code.

3 8400

Which of the following IS functions may be performed by the same individual, without compromising on control or violating segregation of duties? A. Job control analyst and applications programmer B. Mainframe operator and system programmer C. Change/problem and quality control administrator D. Applications and system programmer

4 8781


Un-Answered Questions { Certifications }

What is a digital certificate?

1980


what are the effects on the QoS in each layer of OSI model in network security?

1961


can any one give about the COGNOS and CRYSTAL REPORTS certification details?

2455


Why do you use ‘service password encryption’?

1147


How many ways to access router?

1119


How many types of ethernet?

1032


Hi can any one help me for 70-562 dumps?

2777


Hi Friends, plz tell me wht is the fee for IBM Cog-612 exam i.e for Report Authors

2285


How many types of nat?

1093


What s the formula for metric of ospf?

1166


1. your user want to display the records of the passenger traveling in the train.He can Sort the list either by the train no or by the date of journey how will the list will be displayed in the Control Level Processing in the Extract Dataset. a) The user has to create two separate internal table and sort accordingly and Two Control level Processing Blocks. b) The User has to create one internal Table with different header line and one processing Block. c) The User has to Define one internal Table and define Two control Level Processing Blocks. d) The User has to sort the internal Table Accordigly and create one Control lvel Processing Block. 2. Secondary Index will help in a) fetching the Data faster. b) Storing the of Data. 3.What does the Field statement Does. a) Delay the transport b) Go to the PAI block of the screen c) Make the Field inactive. 15. LDB NODES. a) 00 01 02 21 Get node 02 What will happen? 16. Second Question Regarding the same Context but asked about the Get Node 00 Get node 21 What will happen.? 17. Questions : - Logical Database (LDB) : a) Authorization is performed. At the LDB b)we do not have to explicit write any program to fetch the data. c)put data is used to update the Databse.

1992


In stead of 0.0.0.0 wild card mask what you can write after ip?

1036


Hi , I am planning to take up OCA certification.Can you please provide me with the path for Oracle DBA certi.If any one of you have dumps for same,please mail them to sajagporwal123@gmail.com.Please give me any tips if possible.

1847


In port based access-list which command you give instead of ip?

1085


What is size of ipv4 mac address?

1136