Which of the following controls will detect MOST effectively
the presence of bursts of errors in network transmissions?
A. Parity check
B. Echo check
C. Block sum check
D. Cyclic redundancy check
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
The cyclic redundancy check (CRC) can check for a block of
transmitted data. The workstations generate the CRC and
transmit it with the data. The receiving workstation
computes a CRC and compares it to the transmitted CRC. If
both of them are equal, then the block is assumed error
free. In this case (such as in parity error or echo check),
multiple errors can be detected. In general, CRC can detect
all single-bit and bubble-bit errors. Parity check also
(known as vertical redundancy check) involves adding a
bit-known as the parity bit-to each character during
transmission. In this case, where there is a presence of
bursts of errors (i.e., impulsing noise during high
transmission rates), it has a reliability of approximately
50 percent. In higher transmission rates, this limitation is
significant. Echo checks detect line errors by
retransmitting data back to the sending device for
comparison with the original transmission.
| Is This Answer Correct ? | 10 Yes | 1 No |
Answer / desai harshad chandrakantbhai
cyclic redudancy check
because cyclic red.check is most effectively f
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / chris leong
Buddies, can you spelled defination for each and every type
of the checking above? Thanks.
| Is This Answer Correct ? | 0 Yes | 1 No |
Which of the following manages the digital certificate life cycle to ensure adequate security and controls exist in digital signature applications related to e-commerce? A. Registration authority B. Certification authority C. Certification relocation list D. Certification practice statement
Which of the following is the FIRST step in a business process reengineering (BPR) project? A. Defining the areas to be reviewed B. Developing a project plan C. Understanding the process under review D. Reengineering and streamlining the process under review
Which of the following security techniques is the BEST method for authenticating a user's identity? A. Smart card B. Biometrics C. Challenge-response token D. User ID and password
During a review of the controls over the process of defining IT service levels, an IS auditor would MOST likely interview the: A. systems programmer. B. legal staff. C. business unit manager. D. application programmer.
Which of the following goals would you expect to find in an organization's strategic plan? A. Test a new accounting package. B. Perform an evaluation of information technology needs. C. Implement a new project planning system within the next 12 months. D. Become the supplier of choice within a given time period for the product offered.
Accountability for the maintenance of appropriate security measures over information assets resides with the: A. security administrator. B. systems administrator. C. data and systems owners. D. systems operations group.
Which of the following is MOST important to have provided for in a disaster recovery plan? A. Backup of compiled object programs B. Reciprocal processing agreement C. Phone contact list D. Supply of special forms
Information for detecting unauthorized input from a terminal would be BEST provided by the: A. console log printout. B. transaction journal. C. automated suspense file listing. D. user error report.
A utility is available to update critical tables in case of data inconsistency. This utility can be executed at the OS prompt or as one of menu options in an application. The BEST control to mitigate the risk of unauthorized manipulation of data is to: A. delete the utility software and install it as and when required. B. provide access to utility on a need-to-use basis. C. provide access to utility to user management D. define access so that the utility can be only executed in menu option.
Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)? A. Analyzer B. Administration console C. User interface D. Sensor
An IS auditor evaluating data integrity in a transaction driven system environment should review atomicity, to determine whether: A. the database survives failures (hardware or software). B. each transaction is separated from other transactions. C. integrity conditions are maintained. D. a transaction is completed or not, or a database is updated or not.
To identify the value of inventory that has been kept for more than eight weeks, an IS auditor would MOST likely use: A. test data. B. statistical sampling. C. an integrated test facility. D. generalized audit software.