Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following controls will detect MOST effectively
the presence of bursts of errors in network transmissions?

A. Parity check

B. Echo check

C. Block sum check

D. Cyclic redundancy check

Answers were Sorted based on User's Feedback



Which of the following controls will detect MOST effectively the presence of bursts of errors in ne..

Answer / guest

Answer: D

The cyclic redundancy check (CRC) can check for a block of
transmitted data. The workstations generate the CRC and
transmit it with the data. The receiving workstation
computes a CRC and compares it to the transmitted CRC. If
both of them are equal, then the block is assumed error
free. In this case (such as in parity error or echo check),
multiple errors can be detected. In general, CRC can detect
all single-bit and bubble-bit errors. Parity check also
(known as vertical redundancy check) involves adding a
bit-known as the parity bit-to each character during
transmission. In this case, where there is a presence of
bursts of errors (i.e., impulsing noise during high
transmission rates), it has a reliability of approximately
50 percent. In higher transmission rates, this limitation is
significant. Echo checks detect line errors by
retransmitting data back to the sending device for
comparison with the original transmission.

Is This Answer Correct ?    10 Yes 1 No

Which of the following controls will detect MOST effectively the presence of bursts of errors in ne..

Answer / desai harshad chandrakantbhai

cyclic redudancy check
because cyclic red.check is most effectively f

Is This Answer Correct ?    4 Yes 0 No

Which of the following controls will detect MOST effectively the presence of bursts of errors in ne..

Answer / chris leong

Buddies, can you spelled defination for each and every type
of the checking above? Thanks.

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CISA Certification Interview Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

0 Answers   TEC,


Which of the following is the BEST form of transaction validation? A. Use of key field verification techniques in data entry B. Use of programs to check the transaction against criteria set by management C. Authorization of the transaction by supervisory personnel in an adjacent department D. Authorization of the transaction by a department supervisor prior to the batch process

1 Answers  


The PRIMARY objective of a firewall is to protect: A. internal systems from exploitation by external threats. B. external systems from exploitation by internal threats. C. internal systems from exploitation by internal threats. D. itself and attached systems against being used to attack other systems.

1 Answers  


A PRIMARY benefit derived from an organization employing control self-assessment (CSA) techniques is that it: A. can identify high-risk areas that might need a detailed review later. B. allows IS auditors to independently assess risk. C. can be used as a replacement for traditional audits. D. allows management to relinquish responsibility for control.

1 Answers  


Information requirement definitions, feasibility studies and user requirements are significant considerations when: A. defining and managing service levels. B. identifying IT solutions. C. managing changes. D. assessing internal IT control.

1 Answers  


An IS auditor should be involved in: A. observing tests of the disaster recovery plan. B. developing the disaster recovery plan. C. maintaining the disaster recovery plan. D. reviewing the disaster recovery requirements of supplier contracts.

1 Answers  


Which of the following is a data validation edit and control? A. Hash totals B. Reasonableness checks C. Online access controls D. Before and after image reporting

1 Answers  


Which of the following would be the BEST population to take a sample from when testing program changes? A. Test library listings B. Source program listings C. Program change requests D. Production library listings

1 Answers  


Antivirus software should be used as a: A. detective control. B. preventive control. C. corrective control. D. compensating control.

1 Answers  


Which of the following is an example of a passive attack, initiated through the Internet? A. Traffic analysis B. Masquerading C. Denial of service D. E-mail spoofing

2 Answers  


The method of routing traffic through split cable facilities or duplicate cable facilities is called: A. alternative routing. B. diverse routing. C. redundancy. D. circular routing.

1 Answers  


Which of the following access control functions is LEAST likely to be performed by a database management system (DBMS) software package? A. User access to field data B. User sign-on at the network level C. User authentication at the program level D. User authentication at the transaction level

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)