Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

A programmer managed to gain access to the production library, modified a program that was then used to update a sensitive table in the payroll database and restored the original program. Which of the following methods would MOST effectively detect this type of unauthorized changes? A. Source code comparison B. Executable code comparison C. Integrated test facilities (ITF) D. Review of transaction log files

1 4160

In a business continuity plan, there are several methods of providing telecommunication continuity. One method is diverse routing which involves: A. providing extra capacity with the intent of using the surplus capacity should the normal primary transmission capability not be available. B. routing information via other alternate media such as copper cable or fiber optics. C. providing diverse long-distance network availability utilizing T-1 circuits among the major long-distance carriers. D. routing traffic through split-cable facilities or duplicate-cable facilities.

CISA,

2 6345

The responsibilities of a disaster recovery relocation team include: A. obtaining, packaging and shipping media and records to the recovery facilities, as well as establishing and overseeing an offsite storage schedule. B. locating a recovery site if one has not been predetermined and coordinating the transport of company employees to the recovery site. C. managing the relocation project and conducting a more detailed assessment of the damage to the facilities and equipment. D. coordinating the process of moving from the hot site to a new location or to the restored original location.

1 9523

Which of the following findings would an IS auditor be MOST concerned about when performing an audit of backup and recovery and the offsite storage vault? A. There are three individuals with a key to enter the area. B. Paper documents also are stored in the offsite vault. C. Data files, which are stored in the vault, are synchronized. D. The offsite vault is located in a separate facility.

Apple,

1 8768

Which of the following functions, if performed by scheduling and operations personnel, would be in conflict with a policy requiring a proper segregation of duties? A. Job submission B. Resource management C. Code correction D. Output distribution

1 5034

Which of the following facilitates program maintenance? A. More cohesive and loosely coupled programs B. Less cohesive and loosely coupled programs C. More cohesive and strongly coupled programs D. Less cohesive and strongly coupled programs

1 8665

During an audit of the tape management system at a data center, an IS auditor discovered that parameters are set to bypass or ignore the labels written on tape header records. The IS auditor also determined that effective staging and job setup procedures were in place. In this situation, the IS auditor should conclude that the: A. tape headers should be manually logged and checked by the operators. B. staging and job setup procedures are not appropriate compensating controls. C. staging and job setup procedures compensate for the tape label control weakness. D. tape management system parameters must be set to check all labels.

1 21378

Compensating controls are intended to: A. reduce the risk of an existing or potential control weakness. B. predict potential problems before they occur. C. remedy problems discovered by detective controls. D. report errors or omissions.

1 6826

A distinction that can be made between compliance testing and substantive testing is that compliance testing tests: A. details, while substantive testing tests procedures. B. controls, while substantive testing tests details. C. plans, while substantive testing tests procedures. D. for regulatory requirements, while substantive testing tests validations.

3 17122

When an IS auditor obtains a list of current users with access to a WAN/LAN and verifies that those listed are active associates, the IS auditor is performing a: A. compliance test. B. substantive test. C. statistical sample. D. risk assessment.

1 4961

The use of coding standards is encouraged by IS auditors because they: A. define access control tables. B. detail program documentation. C. standardize dataflow diagram methodology. D. ensure compliance with field naming conventions.

1 5179

During a review of a large data center an IS auditor observed computer operators acting as backup tape librarians and security administrators. Which of these situations would be MOST critical to report? A. Computer operators acting as tape librarians B. Computer operators acting as security administrators C. Computer operators acting as a tape librarian and security administrator D. It is not necessary to report any of these situations.

1 4539

Which of the following is widely accepted as one of the critical components in networking management? A. Configuration management B. Topological mappings C. Application of monitoring tools D. Proxy server trouble shooting

1 10506

Connection-oriented protocols in the TCP/IP suite are implemented in the: A. transport layer. B. application layer. C. physical layer. D. network layer.

1 4901

Which of the following should be in place to protect the purchaser of an application package in the event that the vendor ceases to trade? A. Source code held in escrow. B. Object code held by a trusted third party. C. Contractual obligation for software maintenance. D. Adequate training for internal programming staff.

1 4220


Un-Answered Questions { Certifications }

Tell me when we use standard access-list?

1192


Which is best among dotnet and dotnet diploma? Friends Please answer this question as soon as possible.

2372


hi can any suggest me about websphere program? ie WAS i m thinking to do this course from Hyderabad? will it be beneficial for my future carrer? i have completed my B.e

2675


State the difference between dynamic IP and static IP addressing?

1277


Which works router do?

1182


Explain the difference between arp and rarp?

1608


How does PPP use LCP for link control?

1970


.What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 14. How would you find all users that have not logged on since last month? 15. What are the DS* commands? 16. What’s the difference between LDIFDE and CSVDE? Usage considerations? 17. What are the FSMO roles? Who has them by default? What happens when each one fails? 18. What FSMO placement considerations do you know of? 19. I want to look at the RID allocation table for a DC. What do I do? 20. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 21. How do you configure a “stand-by operation master” for any of the roles? 22. How do you backup AD? 23. How do you restore AD? 24. How do you change the DS Restore admin password? 25. Why can’t you restore a DC that was backed up 4 months ago? 26. What are GPOs? 27. What is the order in which GPOs are applied? 28. Name a few benefits of using GPMC. 29. What are the GPC and the GPT? Where can I find them? 30. What are GPO links? What special things can I do to them? 31. What can I do to prevent inheritance from above? 32. How can I override blocking of inheritance? 33. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 34. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 35. Name a few differences in Vista GPOs 36. Name some GPO settings in the computer and user parts. 37. What are administrative templates? 38. What’s the difference between software publishing and assigning? 39. Can I deploy non-MSI software with GPO? 40. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that? 1.What Is the diff b/w Win NT & win 2000 ? 2. What is difference b/w WIN NT DNS,DhCP and Win 2000 DNS,DHCp ? 3. What are the seven Layers of OSI model ? 4. what Is TCP /IP / 5. What is the difference b/w Netbios name & Hostname resolution ? 6. What are the Features of AD ?What are the diff roles of AD ?(FsmO) 7. How do you carry out migration from NT 4.0 to Windows 2000 ? 8. What is the size of SAM DB in NT 4.0 and how many objects can be created in win NT / Win 2k / 9. How do uimplement group policy and what is the difference b/w s/w deployment and publishing in AD ? 10. Where does u change the role in AD FSMO roles ? 11. What is dynamic DNS and how dows it register with DHCP ? 12. What are the new features of windows 2000 ? 13. Can u rename a domain in win 2k environment ? 14. What is the backup policy that is taken in your company and what is the s/w that is used for taking back up ? 15. How do you update Antivirus on all machines (is it Auto update or manual update) 16. What is the system state data in Win 2k / 17. How do you repair a Blue Screen error ? 18. How is OS hardening done in Servers ? 19. How is auditing is carried out a workstations? 20. Hopw RAs setup in NT and hopw is the permission given for a NT user ? 21. what are the feautures of AD ? 22. by default what is the trust relation ship in Win2k ?] 23. What is native mode in win2k and can we have prewin2k environment(Win nt,win95,98,Me etc)in native mode ? Ans No, only it possible in mIxed mode.it support Pre windows 2000. 24. What is Global catalog server ? 25. Where do you Promote a BDC and PDC ? Ans : Server Manager 26. By default when Win 2k is installed what is the role it assumes and how do you promote it to dC ? 27. what is LDAP protocol / 28. What are EFS , DFS and Kerberos in Win 2k / 29. What is forest , Tree, Organization Unit and site in Win 2k3 ? 30. Can you establish Trust relation ship b/w win 2k and Win Nt machine in native mode environment ? 31. What are the files systems supported Win 2k and 2k3 ? 32. What is tool used to manage disk management tasks ? 33. What is the different between a Basic disc and Dynamic disc ? Can you revert dynamic disk to basic disk ? 34. What are the different levels of RAID that can be setup ? 35. What are the different roles played by a DNS server ? 36. What is a ZONE in DNS ? 37. What is the tool used to move an object with in a domain ? . 38. What is delegation in Ad and what are the benefits ? 39. What is thea System policy in Win NT ? 40. What is folder redirection and how is it accomplished ? 41. Where do you create a group policy in Win 2k nd 2k3 ? 42. How do you setup Disk quotas in Win 2k and 2k3? 43. What is subnet mask Default gateway and router ? 44. How do you configuring auditing in Win 2k and what tools do you use to view the results / 45. What are the 5 different type of backup strategy followed ? 46. What is ERD and how it is created in WIN NT / 2000 / 2003 ? 47. What is the data that is backed up when you backup system state data in win 2k ? 48. How is VPN setup in Windows 2000/2003 ? 49. What is a WINS Server and what is the role in NT/2000/20003 environment ? 50. What is IP Sec in Win 2k /2003 ? 51. What is the tool used manage IIS / 52. How do you secure IIS Website ? 53. How do you setup Multiple websites using a single IP address ? 54. What are Certificate Services in Win 2k nd 2k3? 55. How do you setup RIS and what are the requrirements on client ends ? 56. How many Licenses are provided by default when you setup Terminal services and what are the 2 different modes that a Terminal services can be setup ? 57. What is the tool used to measure the performance in win2k server ? 58. How do you authorize DHCP Server in AD ? 59. What are the prerequisites for installing AD ? 60. What are the file systems supported by Win NT ? 61. How do you remotely start and stop the services in IIS and Controlpanel on a remote machine ? 62. How do you debug the blue screen problem ? 63. Have You Subscribed Technet , MSDN ? 64. How do you troubleshoot a NTLDR,NTDETECT missing issues in Win NT /2000 ? 65. How do you change Boot time in NT/2000/2003 ? 66. what is the regular maintainance on Win Nt server (Event log,chkdisk,rdisk ) 67. What is the difference b/w Exchnage 5.5 and Exchange 2000 /2003? 68. Which are the services in Exchange Server 2003 ? 69. What are the storage groups in Exchange 2k and how many mailbox per storage group can be setup per storage grouping Exch 2k and 2k3 ? 70. What are connectors in Exchange Server and what are the different type of connectors in exchange 2000/2003 ? 71. What is a Site in terms on Exch Server and Win 2000 ? 72. What is circular logging in Exch 2000 ? 73. What are the circular logging in Excjh 2000 ? 74. What are the ifferent authentication methods used in IIS ?Where do you Configure this is IIS ? 75. What are the 4 steps involved in getting IP address from DHCP server ? 76. What is push and pull partners in terms if WINs Server ? 77. How do you back up WINS DB and what format is it stored ? 78. What is the difference WIN NT DHCP and WIN 2k DHcp ? 79. In MS Exch is there any option to forward all my incoming e-mails to another e-mail address ? 80. In what format are the mails and public folder data stored on Exch server ? 81. In what format are the mails stored on client side ? 82. What is Clustering and what are the different methodology in which clustering can be implemented ? 83. What are the 4 domains models defined by MS relating to NT 4.0 ? 84. What is the diff and advantage and disadvantages between a workgroup and domain model ? 85. What is a Trust Real;tion ship & How is it established in NT 4.0 ? 86. What is LAN and WAN ? 87. What is the diff b/w Local group and global group ? 88. What is distributed file system and different types of dfs model and how is it implemented in 2000/2003 ? 89. What is a Hosts and LM Hosts file and how is it useful ? 90. What is B Node,P-node,H-node and M-node in terms of WINS ? 91. What is AT command and how do you schedule automated backup in NT 4.0 92. What is ISINTEGand ESEUTIL in Exch Server ? 93. What is the use of ExchService account in Exchange Server ? 94. what are the Pre requisites for Exchange server installation ? 95. Can my Exchange server check POP3 mail ?

3080


Tell me which protocol called rapid protocol?

1112


Explain the difference between bus topology and hub?

1136


How many valid ip will b in /21 in route summarization?

1144


What are the possible ways of data exchange in ccna?

1151


Why subnetting is used?

1228


Define the logical link control?

1074


I am an iti holder i have passed at 2010 how i can get electrical supervisor licence in banglore or in chittoor (dist) A P

2182