0% found this document useful (0 votes)
12 views

Flash 2

Uploaded by

Fares Salman
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Flash 2

Uploaded by

Fares Salman
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

(i_________ uses radio waves to identify tagged objects within a limited

radius.

(ii)__________ tag consists of microchip and an antenna.

The __________ stores information along with ID to identify a product.


__________ transmits the information to RFID reader.

(i)Radio Frequency identification (RFID) uses radio waves to identify


tagged objects within a limited radius.

(ii)RFID tag consists of microchip and an antenna. The microchip


stores information along with ID to identify a product. Antenna
transmits the information to RFID reader.

**** In a day, back-up is taken twice i.e at 12 AM & at 12 PM. What is


RPO?

RPO-12 hours

For critical systems/data, RTO and RPO, should be __________.

(a)Low or (b) high.

Which of the following controls will detect MOST effectively the


presence of bursts of errors in network transmissions?

(a) Parity check Or (b) Cyclic redundancy check

*** Nucleus is a highly privileged area where access by most users is


restricted. Functions of the nucleus relate to basic processes associated
with the OS, which include

• Interrupt handling
• Process creation/destruction
• Process state switching
• Dispatching
• Process synchronization
• Interprocess comn1unication
• Support of l/0 processes
• Support of the allocation and reallocation/release of memory

Fiber-optic________cables have proven to be more secure than the other


media. They have very low transmission loss, not affected by EMI and
preferred choice for high volumes and long distance calls.

*** When RTO is low, most suitable site is _____

(a) hot or (b) cold.

**** Concurrency__________ controls prevent data integrity problems,


which can arise when two update processes access the same data item
at the same time.

Which of the following devices has the capacity to store frames and
act as a storage and forward device

1-Hub

2-Bridge

*** Below devices operate at which layer of OSI :

Hub – Physical Layer (1st Layer)

Switch – Data Link Layer (2nd Layer)

Bridge – Data Link Layer (2nd Layer)

Router – Network Layer (3rd Layer)

Gateway-Application Layer (7th Layer)


*** What is Recovery Point Objective (RPO)?

(a) The extent of acceptable system downtime or

(b) The extent of acceptable data loss.

Which of the following is MOST directly affected by network


performance monitoring tools?

(a)Integrity Or (b) Availability

If RTO and RPO are low (i.e. zero or near zero) then systems and data
are __________

(a) critical or (b) non-critical.

‘Hub’ operates at which of the following OSI layer? Physical layer (1st
layer)

**** Backup scheme wherein backup of data is taken only for data
changed/modified either after full backup or incremental backup is known
as:
A. Incremental Backup
B. Differential Backup

******************

(i)A communications handler transmits and receives electronic


documents between trading partners and/or wide area networks
(WANs).

(ii)An EDI translator translates data between the standard format


and a trading partner’s proprietary format.
(iii)An application interface moves electronic transactions to or from
the application system and performs data mapping.

(iv)An EDI interface manipulates and routes data between the


application system and the communications handler.

Below devices operates either at MAC address or IP address. Please


select the correct answer:

Switch – MAC Address

Bridge – MAC Address

Router – IP Address

The _________
Operating System_contains programs that interface between the user,
processor and applications software. It is the control program that runs
the computer and acts as a scheduler and traffic controller. It provides the
primary means of managing the sharing and use of computer resources
such as processors, real memory (e.g., RAM), a~xiliary memory
(e.g., disk storage) and VO devices.

**** To evaluate the referential integrity of a database, an IS auditor


should review the:

(a) composite keys Or (b) foreign keys

foreign keys.A foreign key is a column in a table that references a primary


key of another table, thusproviding the referential integrity. Composite
keys consist of two or more columns designated together as a table’s
primary key.
How to differentiate between last mile circuit protection & long haul
network diversity?

Last mile circuit protection provides redundancy for local communication


loop.
Long haul network diversity provides redundancy for long distance
availability.

____ RPO ______of 2 hours indicates that organization needs to ensure that
their data loss should not exceed 2 hours of data captured. (a) RPO or (b)
RTO

Last mile circuit protection provides redundancy for local communication


loop. __________ provides redundancy for local communication loop. (last
mile circuit protection/long haul network diversity)

How to differentiate between last mile circuit protection & long haul
network diversity? Last mile circuit protection provides redundancy for
local communication loop.
Long haul network diversity provides redundancy for long distance
availability.

**** Which of the following would be the MOST secure firewall


system?

(a)Screened-host firewall Or (b)Screened-subnet firewall

Which of the following exists both in wired as well as wireless


transmissions?
Attenuation/EMI/Cross Talks

Attenuation exists in both wired and wireless transmissions.


An organisation is considering type of transmission media which provide
best security against unauthorized access. Which of the following provides
best security? (UTP/STP/Co-axial/Fiber Optic)

Which of the following is the BEST way to handle obsolete magnetic tapes
before
disposing of them?
A. Overwriting the tapes
B. Initializing the tape labels
C. Degaussing the tapes
D. Erasing the tapes

---- A critical function of a firewall is to act as a:

(a)special router that connects the Internet to a LAN Or


(b) server used to connect authorized users to private, trusted
network resources.

By examining the IP address, router can make intelligent decisions


to direct the packet to its destination? (IP address or MAC address)

If RTO and RPO are low (i.e. zero or near zero) then systems and
data are ____ critical ______ (a) critical or (b) non-critical.

A hot site should be implemented as a recovery strategy when the:

(a)recovery time objective (RTO) is low Or (b) recovery time


objective (RTO) is high.

In a Virtual Environment, software is used to partition one physical server


into multiple independent servers. Each of these environments can then
run its own (and if required different) OS. To the operator, the OS behaves
as if it were running on a physical server.

Which of the following devices extends the network and has the
capacity to store frames and act as a storage and forward device?
Router Or (b) Bridge

A bridge connects two separate networks to form a logical network and has
the storage capacity to store frames and act as a storage and forwarding
device.

A hot site should be implemented as a recovery strategy when the:

(a)recovery time objective (RTO) is low Or (b) recovery time


objective (RTO) is high.

When RTO is high, most suitable site is __________. (a) hot or (b) cold.

Which of the propagation problems do wired and wireless


transmissions have in common? Attenuation exists in both wired and
wireless transmissions.

Nucleus is a highly privileged area where access by most users is


restricted. Functions of the nucleus relate to basic processes associated
with the OS, which include:
• Interrupt handling
• Process creation/destruction
• Process state switching
• Dispatching
• Process synchronization
• Interprocess comn1unication
• Support of l/0 processes
• Support of the allocation and reallocation/release of memory

Below devices operates either at MAC address or IP address. Please


select the correct answer:

Switch – MAC Address

Bridge – MAC Address

Router – IP Address
An independent software program that connects two otherwise
separate applicationssharing computing resources across
heterogeneous technologies is known as:(a) middleware. Or
(b)firmware.

Which types of transmission media provide the BEST security against


unauthorized access? fibre-optics

-Attenuation is the weakening of signals during transmission.


-Attenuation exists in both wired and wireless transmissions.
-Length of wire impacts the severity of attenuation. Higher the length,
more chances of attenuation.

What is the major difference between Hub & Switch?

(i)Hub is a dumb device. It forwards message to all the connected


computers irrespective of whether message is intended for them or
not. Switch is a smarter than Hub. It forwards message to only that
computer for which message is intended.

(ii)Hub operates at physical layer (1st layer) of OSI whereas Switch


operates at datalink layer (2nd layer) of OSI.

(iii)Switch can identify MAC address. However, Hub do not have


functionality to identify MAC address.

Alternative routing is the method of routing information via an alternative


medium, such as copper cable or fiber optics.

Full Backup- Every time data backup is taken of full database


irrespective of earlier backup.
Incremental Backup-Backup is taken only of data changed/modified
since last backup (last backup can be either full backup or
incremental backup).

Differential Backup-Backup is taken only of data changed/modified


since last full backup (last back to be full back-up only).

What is Electromagnetic Interference (EMI) ?

-EMI is a disturbance generated by an external source that affects an


electrical circuit.
-The disturbance may degrade the performance of the circuit or even stop
it from functioning. In the case of a data path, these effects can range from
an increase in error rate to a total loss of the data.
-EMI is caused by electrical storms or noisy electrical equipments (e.g.
motors, fluorescent lighting, radio transmitters etc.)

Which of the following controls would be MOST effective in ensuring


that production source code and object code are synchronized?

(a)Release-to-release source and object comparison reports Or


(b) Date and time-stamp reviews of source and object code

Diverse routing is the method of routing traffic through split-cable


facilities or duplicate-cable facilities.

Alternative routing is the method of routing information via an alternative


medium, such as copper cable or fiber optics.

A Ping command is used to measure: (a)attenuation. Or (b)latency


Latency, which is measured using a Ping command, represents the delay
that a message/packet will have in travelling from source to destination.

A ____ Gateway ______performs the job of translating e-mail formats from


one network to another, so messages can make their way through all the
networks.

In aVirtual environment, software is used to partition one physical server


into multiple independent servers. Each of these environments can then
run its own (and if required different) OS. To the operator, the OS behaves
as if it were running on a physical server

foreign keys.A foreign key is a column in a table that references a primary


key of another table, thus providing the referential integrity. Composite
keys consist of two or more columns designated together as a table’s
primary key.

Capacity management is the planning and monitoring of computing and


network resources to ensure that the available resources are used
efficiently and effectively.

Which of the following exists both in wired as well as wireless


transmissions?
Attenuation/EMI/Cross Talks

Weakening of signals during transmission is known as ____ Attenuation


_____

By examining the IP address, which of the following device can make


intelligent decisions to direct the packet to its destination?

A.Hub

B.Layer-2 Switch

C.Bridge

D.Router
Answer: D.Router

Explanation: Router operates at Network Layer (i.e. 3rd Layer) of OSI


Model. By examining the IP address, the router can make intelligent
decisions to direct the packet to its destination. Router can block
broadcast information, block traffic to unknown addresses, and filter
traffic based on network or host information

A bridge connects two separate networks to form a logical network and has
the storage capacity to store frames and act as a storage and forwarding
device.

In which recovery processing site, only arrangement for electricity and


HVAC is available? cold site

____ Referential integrity ______ constraints ensure that a change in a


primary key of one table is automatically updated in the matching foreign
keys of other tables.

You might also like