Answers
Answer updated on: 12 Oct 2020
Very low RTO, close to zero
The RTO is a measure of the users tolerance to downtime. In case of critical systems, generally RTO is zero or near to zero. Low RTO indicates that system should be resumed at the earliest. For example, if RTO is 2 hours, system should be resumed within 2 hours and if RTO is 72 hours, system should be resumed within 72 hours. Thus, in case of critical system ...
Answer updated on: 03 Aug 2020
Latency, which is measured using a Ping command, represents the delay that a message/packet will have in traveling from source to destination. A decrease in amplitude as a signal propagates through a transmission medium is called attenuation. Throughput, which is the quantity of work per unit of time, is measured in bytes per second. Delay distortion represents delay in transmission because ...
Answer updated on: 21 Jul 2020
C. War driving War driving is a technique for locating and gaining access to wireless networks by driving or walking with a wireless equipped computer around a building. War dialing is a technique for gaining access to a computer or a network through the dialing of defined blocks of telephone numbers, with the hope of getting an answer from a modem. Social engineering is a technique used to ...
Answer updated on: 12 Feb 2020
C. Procedures that verify that only approved program changes are implemented While it would be preferred that strict separation of duties be adhered to and that additional staff is recruited, as suggested in choice B, this practice is not always possible in small organizations. The IS auditor must look at recommended alternative processes. Of the choices, C is the only practical one that has an ...
Answer updated on: 12 Feb 2020
C. nonrepudiation. All of the above are features of a digital signature. Nonrepudiation ensures that the claimed sender cannot later deny generating and sending the message. Data integrity refers to changes in the plaintext message that would result in the recipient failing to compute the same message hash. Since only the claimed sender has the key, authentication ensures that the message has ...
Answer updated on: 12 Feb 2020
C. participating applications will have guaranteed service levels. The main function of QoS is to optimize network performance by assigning priority to business applications and end users, through the allocation of dedicated parts of the bandwidth to specific traffic. Choice A is not true because the communication itself will not be improved, while the speed of data exchange for specific ...
Answer updated on: 12 Feb 2020
C. Periodically comparing control and current object and source programs Running the code comparison program on the control and current object and source programs allows for the detection of unauthorized changes in the production environment. Choices A, B and D are preventive controls that are effective as long as they are being applied consistently.
Answer updated on: 12 Feb 2020
B. redundancy of data. Normalization is the removal of redundant data elements from the database structure. Disabling features of normalization in relational databases will increase the likelihood of data redundancy. Audit trails are a feature of DBMS software that can be lost by not enabling them. These are not connected to normalization controls. The integrity of data is not directly affected ...
Answer updated on: 12 Feb 2020
D. protocol analyzer. Protocol analyzers are network diagnostic tools that monitor and record network information from packets traveling in the link to which the analyzer is attached. Online monitors (choice A) measure telecommunications transmissions and determine whether transmissions were accurate and complete. Downtime reports (choice B) track the availability of telecommunication lines and ...
Answer updated on: 12 Feb 2020
D. The recipient uses the sender s public key, verified with a certificate authority, to decrypt the prehash code. decrypt the prehash code. Most encrypted transactions use a combination of private keys, public keys, secret keys, hash functions and digital certificates to achieve confidentiality, message integrity and nonrepudiation by either sender or recipient. The recipient uses the senders ...
No any questions is under moderation!
Following
You are following 0 people.
Followers
You have 0 followers.
Rank
1st
RankAlfred Hook
139
Asked134
Answered37635
Total Points
2nd
RankOrion Thames
150
Asked146
Answered35233
Total Points
3rd
RankCambron Bill
148
Asked149
Answered35215
Total Points
4th
RankCatherine Halcombe
108
Asked124
Answered23036
Total Points
5th
RankSantepro
600
Asked714
Answered22559
Total Points
6th
RankGregorynaomi
15
Asked14
Answered13608
Total Points
7th
RankRN Pedia
260
Asked167
Answered10271
Total Points
8th
RankAdewumiKoju
3
Asked1
Answered9548
Total Points
9th
RankJaksiboy
24
Asked27
Answered8384
Total Points
10th
RankCripstwick
13
Asked15
Answered8226
Total Points
Load More