Login
Remember
Register
User Robindeniel
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by Robindeniel
0
votes
1
answer
What is Load Order?
asked
May 25, 2023
in
Informatica
loadorder
0
votes
1
answer
What is XML Source Qualifier Transformation in Informatica?
asked
May 25, 2023
in
Informatica
xml
source
qualifier
transformation
0
votes
1
answer
Which is the T/R that builts only single cache memory?
asked
May 25, 2023
in
Informatica
trbuilts
single
cachememory
0
votes
1
answer
What is the difference between the variable port and the Mapping variable?
asked
May 25, 2023
in
Informatica
variableport
mappingvariable
0
votes
1
answer
How to use PowerCenter Command-Line in Informatica?
asked
May 25, 2023
in
Informatica
powercenter
command-line
informatica
0
votes
1
answer
What is Dynamic Lookup Cache?
asked
May 25, 2023
in
Informatica
dynamiclookupcache
0
votes
1
answer
How do I scheduling a Workflow?
asked
May 25, 2023
in
Informatica
schedulingworkflow
0
votes
1
answer
How to use PMCMD Utility Command?
asked
May 25, 2023
in
Informatica
pmcmdutility
command
0
votes
1
answer
When a system moves into production and changes are needed, which of the following is the final step in the change control process?
asked
May 20, 2023
in
CISA
system
moves
0
votes
1
answer
Which database-related term refers to the process of combining several low-sensitivity items to produce a high-sensitivity data item?
asked
May 20, 2023
in
CISA
database-related
term
0
votes
1
answer
In the NIST version of the SDLC process, the system or program performs the work for which it was designed in which waterfall phase?
asked
May 20, 2023
in
CISA
nist-version
0
votes
1
answer
During which step of the audit life cycle does an auditor identify which skills are needed for the audit, how many auditors are required, and what other resources are needed?
asked
May 20, 2023
in
CISA
auditoridentify
0
votes
1
answer
Observation and testing can be used effectively in which of the following areas?
asked
May 20, 2023
in
CISA
observation
testing
0
votes
1
answer
In project management, which of the following is a task related to closing a project?
asked
May 20, 2023
in
CISA
project
management
0
votes
1
answer
Where should an organization keep copies of the business continuity plan?
asked
May 20, 2023
in
CISA
businesscontinuityplan
0
votes
1
answer
From an auditing perspective, which of the following standards most closely maps to a Plan-Do-Check-Act (PDCA) approach?
asked
May 20, 2023
in
CISA
cmm
0
votes
1
answer
An auditor should recommend the use of which of the following to determine the minimum level of service needed at an alternate site?
asked
May 20, 2023
in
CISA
level
of
service
0
votes
1
answer
Which of the following symmetric algorithms is a block cipher that the U.S. government adopted as AES to replace DES?
asked
May 20, 2023
in
CISA
symmetric
algorithms
0
votes
1
answer
The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
asked
May 20, 2023
in
CISA
organizationnetwork
0
votes
1
answer
A company has decided to implement an electronic signature scheme based on public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a
asked
May 20, 2023
in
CISA
public
key
infrastructure
0
votes
1
answer
An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?
asked
May 20, 2023
in
CISA
is
auditor
0
votes
1
answer
After observing suspicious activities in a server, a manager requests a forensic analysis.
asked
May 20, 2023
in
CISA
forensic
analysis
0
votes
1
answer
Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?
asked
May 20, 2023
in
CISA
https
protocol
0
votes
1
answer
A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
asked
May 20, 2023
in
CISA
firewall
successful
deployment
0
votes
1
answer
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet.
asked
May 20, 2023
in
CISA
ssl
encryption
0
votes
1
answer
What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?is
asked
May 20, 2023
in
CISA
vpn
logon
0
votes
1
answer
The use of digital signatures:
asked
May 20, 2023
in
CISA
digital
signatures
0
votes
1
answer
The FIRST step in a successful attack to a system would be:
asked
May 20, 2023
in
CISA
successful-attack
0
votes
1
answer
Can you think of a time when you had to use your communication skills to resolve a conflict on a project?
asked
May 15, 2023
in
2D Animation
animation-communication
0
votes
1
answer
How do you stay up-to-date with new trends and technologies in the animation industry?
asked
May 15, 2023
in
2D Animation
animationtechnologies
Page:
« prev
1
...
9
10
11
12
13
14
15
16
17
18
19
...
148
next »
...