Which techniques establish an order in which a node can gain access to a channel ?
Correct
Incorrect
Question 2 of 30
2. Question
1 points
Category: Enterprise Information System
Which is not the Report Control?
Correct
Incorrect
Question 3 of 30
3. Question
1 points
Category: Enterprise Information System
Which is the activity considered under audit environmental control ?
Correct
Incorrect
Question 4 of 30
4. Question
1 points
Category: Enterprise Information System
Google & yahoo are the example of ______ which should consultant to see what information about organization is available?
Correct
Incorrect
Question 5 of 30
5. Question
1 points
Category: Enterprise Information System
Which is not the functional unit of processing device ?
Correct
Incorrect
Question 6 of 30
6. Question
1 points
Category: Enterprise Information System
Which type of primary memory is volatile in nature ?
Correct
Incorrect
Question 7 of 30
7. Question
1 points
Category: Enterprise Information System
MS Office 2010 has MS World, MS Excel, MS Access etc. this is example of _______ .
Correct
Incorrect
Question 8 of 30
8. Question
1 points
Category: Enterprise Information System
Which of these is collection of Records?
Correct
Incorrect
Question 9 of 30
9. Question
1 points
Category: Enterprise Information System
Which is collection of computers & other hardware interconnected by communication channels that allows sharing of resources & information ?
Correct
Incorrect
Question 10 of 30
10. Question
1 points
Category: Enterprise Information System
Which generates the signal over the same network before the signal becomes too weak ?
Correct
Incorrect
Question 11 of 30
11. Question
1 points
Category: Enterprise Information System
In which each node is connected by a dedicated point to point link to every node ?
Correct
Incorrect
Question 12 of 30
12. Question
1 points
Category: Enterprise Information System
Anti-virus software & Firewalls are the example of _______ .
Correct
Incorrect
Question 13 of 30
13. Question
1 points
Category: Enterprise Information System
Which control has a pair of doors that are typically found in entries to facilities such as computer rooms and document stations .
Correct
Incorrect
Question 14 of 30
14. Question
1 points
Category: Enterprise Information System
Which Involves forging one’s source address in which user think that s/he is interacting with the operating system?
Correct
Incorrect
Question 15 of 30
15. Question
1 points
Category: Enterprise Information System
Motivating, guiding & communicating with personal is known as _______?
Correct
Incorrect
Question 16 of 30
16. Question
1 points
Category: Enterprise Information System
Which is not the example of biometric Devices :
Correct
Incorrect
Question 17 of 30
17. Question
1 points
Category: Enterprise Information System
Which of these checks against entry into processing of incorrect/invalid character ?
Correct
Incorrect
Question 18 of 30
18. Question
1 points
Category: Enterprise Information System
By which method nodes in a network must compete with each other to gain access to a channel?
Correct
Incorrect
Question 19 of 30
19. Question
1 points
Category: Enterprise Information System
Which is an acronym for ‘Simultaneous peripherals Operations Online’?
Correct
Incorrect
Question 20 of 30
20. Question
1 points
Category: Enterprise Information System
Which is not the role of IS auditor in auditing physical access control?
Correct
Incorrect
Question 21 of 30
21. Question
1 points
Category: Enterprise Information System
Facebook, LinkedIn, My space, and twitter are the example of _______ .
Correct
Incorrect
Question 22 of 30
22. Question
1 points
Category: Enterprise Information System
Which function of the processing device performs operations as addition, subtraction, multiplication & logical comparison of numbers?
Correct
Incorrect
Question 23 of 30
23. Question
1 points
Category: Enterprise Information System
In which type of Primary memory information can be read only and not be modified?
Correct
Incorrect
Question 24 of 30
24. Question
1 points
Category: Enterprise Information System
Which is not the benefit of the application software?
Correct
Incorrect
Question 25 of 30
25. Question
1 points
Category: Enterprise Information System
Which database model allows the definition of the data & their structures, storage and retrieval operations & integrity constrains that can be organized in a table structure ?
Correct
Incorrect
Question 26 of 30
26. Question
1 points
Category: Enterprise Information System
Which is not the characteristics of corrective controls ?
Correct
Incorrect
Question 27 of 30
27. Question
1 points
Category: Enterprise Information System
Fencing at boundary of the facility may also enhance the security mechanism, this is known as______.
Correct
Incorrect
Question 28 of 30
28. Question
1 points
Category: Enterprise Information System
Who is the logical access violators?
Correct
Incorrect
Question 29 of 30
29. Question
1 points
Category: Enterprise Information System
Which is the control activity involved in maintaining the integrity of the database ?
Correct
Incorrect
Question 30 of 30
30. Question
1 points
Category: Enterprise Information System
Which error occur when an extra digit or character is added to code?
OR
83276 is recorded as 832766. which type of error is it?
Correct
Incorrect
Ekvij provides MCQ Tests For CA,CMA and CS examinations