Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Wing





Wing Interview Questions
Questions Answers Views Company eMail

Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network? A. The use of diskless workstations B. Periodic checking of hard drives C. The use of current antivirus software D. Policies that result in instant dismissal if violated

1 5921

An IS auditor reviewing an organization's IS disaster recovery plan should verify that it is: A. tested every 6 months. B. regularly reviewed and updated. C. approved by the chief executive officer (CEO). D. communicated to every departmental head in the organization.

2 10839

Which of the following group/individuals should assume overall direction and responsibility for costs and timetables of system development projects? A. User management B. Project steering committee C. Senior management D. Systems development management

1 5925

Which of the following is LEAST likely to be contained in a digital certificate for the purposes of verification by a trusted third party (TTP)/certification authority (CA)? A. Name of the TTP/CA B. Public key of the sender C. Name of the public key holder D. Time period for which the key is valid

1 4793

Which of the following is critical to the selection and acquisition of the correct operating system software? A. Competitive bids B. User department approval C. Hardware-configuration analysis D. Purchasing department approval

1 14391

Which of the following is the primary purpose for conducting parallel testing? A. To determine if the system is cost-effective. B. To enable comprehensive unit and system testing. C. To highlight errors in the program interfaces with files. D. To ensure the new system meets user requirements.

1 16770

Which of the following has the LEAST effect on controlling physical access? A. Access to the work area is restricted through a swipe card. B. All physical assets have an identification tag and are properly recorded. C. Access to the premises is restricted and all visitors authorized for entry. D. Visitors are issued a pass and escorted in and out by a concerned employee.

1 5110

Which of the following LAN physical layouts is subject to total loss if one device fails? A. Star B. Bus C. Ring D. Completely connected

2 9086

Which of the following is a benefit of a risk-based approach to audit planning? Audit: A. scheduling may be performed months in advance. B. budgets are more likely to be met by the IS audit staff. C. staff will be exposed to a variety of technologies. D. resources are allocated to the areas of highest concern.

1 8891

Which of the following should be included in an organization's IS security policy? A. A list of key IT resources to be secured B. The basis for access authorization C. Identity of sensitive security features D. Relevant software security features

1 11467

In the ISO/OSI model, which of the following protocols is the FIRST to establish security for the user application? A. Session layer. B. Transport layer C. Network layer D. Presentation layer

1 7528

Which of the following protocols would be involved in the implementation of a router and interconnectivity device monitoring system? A. Simple network management B. File transfer C. Simple Mail Transfer Protocol D. Telnet

1 6654

Which of the following is a concern when data is transmitted through secure socket layer (SSL) encryption implemented on a trading partner's server? A. Organization does not have control over encryption. B. Messages are subjected to wire tapping. C. Data might not reach the intended recipient. D. The communication may not be secure.

2 5792

In which of the following network configurations would problem resolution be the easiest? A. Bus B. Ring C.Star D. Mesh

1 4993

Which of the following is the operating system mode in which all instructions can be executed? A. Problem B. Interrupt C. Supervisor D. Standard processing

1 4296




Related Topics


Un-Answered Questions { Wing }

What are advantages of using Java?s layout managers than windowing systems?

2383


How to synchronize slow growing bacterial species of Cyanobacteria, Thiobacilli, Mycoplasma?

1930


What Testing process U r following in ur organization?

2391


what r the strategies & methodologies r u following in preperation of test cases based on usecase?

2105


Which one of the following activities is the most efficient and most cost effective at identifying defects? 1. Prototyping 2. Unit test 3. Beta test 4. Design/code inspection 5. Risk analysis

2096


The Following Characterstics posses some XYZ company. * Uses formal standards and policies * Conducts software inspections * Has advanced configuration management and change control * Uses CASE tools * Has a software engineering process group * Gathers metrics on process and quality * Requires that developers have formal software engineering training * Practices continued process improvement Based on aboue , Tell me which CMM Level is the company..? 1. Level 1 - Initial 2. Level 2 - Repeatable 3. Level 3 - Defined 4. Level 4 - Managed 5. Level 5 - Optimizing

2196


Rules of civil law are different than that of criminal law. Are you prepared to enter this knowing that there is little guidance from within our office?

2288


During a heart attack, blood flowing to the heart muscle is interrupted by blockage of a coronary artery. How would you expect the metabolism in the heart to change?

3090


A 22 year old woman collapses following Neville Barnes forceps delivery of the second twin. She is hypotensive and tachycardic and the estimated blood loss is now 800ml. How would you manage this situation?

3474


I'm new to sewing, and I need to know what are some good pieces to start with?

2187


Which namespace do the classes, allowing you to support COM functionality, are located?

2629


Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??

2072


Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??

2014


What is the trouble in growing streptococcus species?

2194


What are the Conditions for growing slow-growing mycobacteria?

1978