(i_________ uses radio waves to identify tagged objects within a limited
radius.
(ii)__________ tag consists of microchip and an antenna.
The __________ stores information along with ID to identify a product.
__________ transmits the information to RFID reader.
(i)Radio Frequency identification (RFID) uses radio waves to identify
tagged objects within a limited radius.
(ii)RFID tag consists of microchip and an antenna. The microchip
stores information along with ID to identify a product. Antenna
transmits the information to RFID reader.
**** In a day, back-up is taken twice i.e at 12 AM & at 12 PM. What is
RPO?
RPO-12 hours
For critical systems/data, RTO and RPO, should be __________.
(a)Low or (b) high.
Which of the following controls will detect MOST effectively the
presence of bursts of errors in network transmissions?
(a) Parity check Or (b) Cyclic redundancy check
*** Nucleus is a highly privileged area where access by most users is
restricted. Functions of the nucleus relate to basic processes associated
with the OS, which include
• Interrupt handling
• Process creation/destruction
• Process state switching
• Dispatching
• Process synchronization
• Interprocess comn1unication
• Support of l/0 processes
• Support of the allocation and reallocation/release of memory
Fiber-optic________cables have proven to be more secure than the other
media. They have very low transmission loss, not affected by EMI and
preferred choice for high volumes and long distance calls.
*** When RTO is low, most suitable site is _____
(a) hot or (b) cold.
**** Concurrency__________ controls prevent data integrity problems,
which can arise when two update processes access the same data item
at the same time.
Which of the following devices has the capacity to store frames and
act as a storage and forward device
1-Hub
2-Bridge
*** Below devices operate at which layer of OSI :
Hub – Physical Layer (1st Layer)
Switch – Data Link Layer (2nd Layer)
Bridge – Data Link Layer (2nd Layer)
Router – Network Layer (3rd Layer)
Gateway-Application Layer (7th Layer)
*** What is Recovery Point Objective (RPO)?
(a) The extent of acceptable system downtime or
(b) The extent of acceptable data loss.
Which of the following is MOST directly affected by network
performance monitoring tools?
(a)Integrity Or (b) Availability
If RTO and RPO are low (i.e. zero or near zero) then systems and data
are __________
(a) critical or (b) non-critical.
‘Hub’ operates at which of the following OSI layer? Physical layer (1st
layer)
**** Backup scheme wherein backup of data is taken only for data
changed/modified either after full backup or incremental backup is known
as:
A. Incremental Backup
B. Differential Backup
******************
(i)A communications handler transmits and receives electronic
documents between trading partners and/or wide area networks
(WANs).
(ii)An EDI translator translates data between the standard format
and a trading partner’s proprietary format.
(iii)An application interface moves electronic transactions to or from
the application system and performs data mapping.
(iv)An EDI interface manipulates and routes data between the
application system and the communications handler.
Below devices operates either at MAC address or IP address. Please
select the correct answer:
Switch – MAC Address
Bridge – MAC Address
Router – IP Address
The _________
Operating System_contains programs that interface between the user,
processor and applications software. It is the control program that runs
the computer and acts as a scheduler and traffic controller. It provides the
primary means of managing the sharing and use of computer resources
such as processors, real memory (e.g., RAM), a~xiliary memory
(e.g., disk storage) and VO devices.
**** To evaluate the referential integrity of a database, an IS auditor
should review the:
(a) composite keys Or (b) foreign keys
foreign keys.A foreign key is a column in a table that references a primary
key of another table, thusproviding the referential integrity. Composite
keys consist of two or more columns designated together as a table’s
primary key.
How to differentiate between last mile circuit protection & long haul
network diversity?
Last mile circuit protection provides redundancy for local communication
loop.
Long haul network diversity provides redundancy for long distance
availability.
____ RPO ______of 2 hours indicates that organization needs to ensure that
their data loss should not exceed 2 hours of data captured. (a) RPO or (b)
RTO
Last mile circuit protection provides redundancy for local communication
loop. __________ provides redundancy for local communication loop. (last
mile circuit protection/long haul network diversity)
How to differentiate between last mile circuit protection & long haul
network diversity? Last mile circuit protection provides redundancy for
local communication loop.
Long haul network diversity provides redundancy for long distance
availability.
**** Which of the following would be the MOST secure firewall
system?
(a)Screened-host firewall Or (b)Screened-subnet firewall
Which of the following exists both in wired as well as wireless
transmissions?
Attenuation/EMI/Cross Talks
Attenuation exists in both wired and wireless transmissions.
An organisation is considering type of transmission media which provide
best security against unauthorized access. Which of the following provides
best security? (UTP/STP/Co-axial/Fiber Optic)
Which of the following is the BEST way to handle obsolete magnetic tapes
before
disposing of them?
A. Overwriting the tapes
B. Initializing the tape labels
C. Degaussing the tapes
D. Erasing the tapes
---- A critical function of a firewall is to act as a:
(a)special router that connects the Internet to a LAN Or
(b) server used to connect authorized users to private, trusted
network resources.
By examining the IP address, router can make intelligent decisions
to direct the packet to its destination? (IP address or MAC address)
If RTO and RPO are low (i.e. zero or near zero) then systems and
data are ____ critical ______ (a) critical or (b) non-critical.
A hot site should be implemented as a recovery strategy when the:
(a)recovery time objective (RTO) is low Or (b) recovery time
objective (RTO) is high.
In a Virtual Environment, software is used to partition one physical server
into multiple independent servers. Each of these environments can then
run its own (and if required different) OS. To the operator, the OS behaves
as if it were running on a physical server.
Which of the following devices extends the network and has the
capacity to store frames and act as a storage and forward device?
Router Or (b) Bridge
A bridge connects two separate networks to form a logical network and has
the storage capacity to store frames and act as a storage and forwarding
device.
A hot site should be implemented as a recovery strategy when the:
(a)recovery time objective (RTO) is low Or (b) recovery time
objective (RTO) is high.
When RTO is high, most suitable site is __________. (a) hot or (b) cold.
Which of the propagation problems do wired and wireless
transmissions have in common? Attenuation exists in both wired and
wireless transmissions.
Nucleus is a highly privileged area where access by most users is
restricted. Functions of the nucleus relate to basic processes associated
with the OS, which include:
• Interrupt handling
• Process creation/destruction
• Process state switching
• Dispatching
• Process synchronization
• Interprocess comn1unication
• Support of l/0 processes
• Support of the allocation and reallocation/release of memory
Below devices operates either at MAC address or IP address. Please
select the correct answer:
Switch – MAC Address
Bridge – MAC Address
Router – IP Address
An independent software program that connects two otherwise
separate applicationssharing computing resources across
heterogeneous technologies is known as:(a) middleware. Or
(b)firmware.
Which types of transmission media provide the BEST security against
unauthorized access? fibre-optics
-Attenuation is the weakening of signals during transmission.
-Attenuation exists in both wired and wireless transmissions.
-Length of wire impacts the severity of attenuation. Higher the length,
more chances of attenuation.
What is the major difference between Hub & Switch?
(i)Hub is a dumb device. It forwards message to all the connected
computers irrespective of whether message is intended for them or
not. Switch is a smarter than Hub. It forwards message to only that
computer for which message is intended.
(ii)Hub operates at physical layer (1st layer) of OSI whereas Switch
operates at datalink layer (2nd layer) of OSI.
(iii)Switch can identify MAC address. However, Hub do not have
functionality to identify MAC address.
Alternative routing is the method of routing information via an alternative
medium, such as copper cable or fiber optics.
Full Backup- Every time data backup is taken of full database
irrespective of earlier backup.
Incremental Backup-Backup is taken only of data changed/modified
since last backup (last backup can be either full backup or
incremental backup).
Differential Backup-Backup is taken only of data changed/modified
since last full backup (last back to be full back-up only).
What is Electromagnetic Interference (EMI) ?
-EMI is a disturbance generated by an external source that affects an
electrical circuit.
-The disturbance may degrade the performance of the circuit or even stop
it from functioning. In the case of a data path, these effects can range from
an increase in error rate to a total loss of the data.
-EMI is caused by electrical storms or noisy electrical equipments (e.g.
motors, fluorescent lighting, radio transmitters etc.)
Which of the following controls would be MOST effective in ensuring
that production source code and object code are synchronized?
(a)Release-to-release source and object comparison reports Or
(b) Date and time-stamp reviews of source and object code
Diverse routing is the method of routing traffic through split-cable
facilities or duplicate-cable facilities.
Alternative routing is the method of routing information via an alternative
medium, such as copper cable or fiber optics.
A Ping command is used to measure: (a)attenuation. Or (b)latency
Latency, which is measured using a Ping command, represents the delay
that a message/packet will have in travelling from source to destination.
A ____ Gateway ______performs the job of translating e-mail formats from
one network to another, so messages can make their way through all the
networks.
In aVirtual environment, software is used to partition one physical server
into multiple independent servers. Each of these environments can then
run its own (and if required different) OS. To the operator, the OS behaves
as if it were running on a physical server
foreign keys.A foreign key is a column in a table that references a primary
key of another table, thus providing the referential integrity. Composite
keys consist of two or more columns designated together as a table’s
primary key.
Capacity management is the planning and monitoring of computing and
network resources to ensure that the available resources are used
efficiently and effectively.
Which of the following exists both in wired as well as wireless
transmissions?
Attenuation/EMI/Cross Talks
Weakening of signals during transmission is known as ____ Attenuation
_____
By examining the IP address, which of the following device can make
intelligent decisions to direct the packet to its destination?
A.Hub
B.Layer-2 Switch
C.Bridge
D.Router
Answer: D.Router
Explanation: Router operates at Network Layer (i.e. 3rd Layer) of OSI
Model. By examining the IP address, the router can make intelligent
decisions to direct the packet to its destination. Router can block
broadcast information, block traffic to unknown addresses, and filter
traffic based on network or host information
A bridge connects two separate networks to form a logical network and has
the storage capacity to store frames and act as a storage and forwarding
device.
In which recovery processing site, only arrangement for electricity and
HVAC is available? cold site
____ Referential integrity ______ constraints ensure that a change in a
primary key of one table is automatically updated in the matching foreign
keys of other tables.