Created by - Mary Smith
Questions 1. While evaluating logical access control the IS auditor should follow all of the steps mentioned below EXCEPT one?1. Obtain general understanding of security risk facing information processing, through a review of relevant documentation, inquiry and observation,etc2. Document and evaluate controls over potential access paths into the system to assess their adequacy, efficiency and effectiveness3. Test Control over access paths to determine whether they are functioning and effective by applying appropriate audit technique4. Evaluate the access control environment to determine if the control objective is achieved by analyzing test result and other audit evidence5. Evaluate the security environment to assess its adequacy by reviewing written policies, observing practices and procedures, and comparing them with appropriate security standard or practice and procedures used by other organization.6. Evaluate and deploy technical controls to mitigate all identified risks during audit.A) 2B) 3C) 1D) 62. Identify the correct sequence which needs to be followed as a chain of event in regards to evidence handling in computer forensics?A) Identify, Analyze, preserve and PresentB) Analyze, Identify, preserve and presentC) Preserve, Identify, Analyze and PresentD) Identify, Preserve, Analyze and Present3. In computer forensics, which of the following is the process that allows bit-for-bit copy of a data to avoid damage of original data or information when multiple analysis may be performed?A) ImagingB) ExtractionC) Data ProtectionD) Data Acquisition4. In computer forensic which of the following describe the process that converts the information extracted into a format that can be understood by investigator?A) InvestigationB) InterrogationC) ReportingD) Extraction5. Which of the following process consist of identification and selection of data from the imaged data set in computer forensics?A) InvestigationB) InterrogationC) ReportingD) Extraction Right Answer and Explanation: 1. Right Answer: DExplanation: The word EXCEPT is the keyword used in the question. You need find out the item an IS auditor should not perform while evaluating logical access control. It is not an IT auditor's responsibility to evaluate and deploy technical controls to mitigate all identified risks during audit.For CISA exam you should know below information about auditing logical access:Obtain general understanding of security risk facing information processing, through a review of relevant documentation, inquiry and observation,etcDocument and evaluate controls over potential access paths into the system to assess their adequacy, efficiency and effectivenessTest Control over access paths to determine whether they are functioning and effective by applying appropriate audit techniqueEvaluate the access control environment to determine if the control objective are achieved by analyzing test result and other audit evidenceEvaluate the security environment to assess its adequacy by reviewing written policies, observing practices and procedures, and comparing them with appropriate security standard or practice and procedures used by other organization.The following were incorrect answers:The other options presented are valid choices which IS auditor needs to follow while evaluating logical access control.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 3622. Right Answer: DExplanation: There are 4 major considerations in the chain of event in regards to evidence in computer forensics:Identify -Refers to identification of information that is available and might form evidence of an accidentPreserve -Refers to the practice of retrieving identified information and preserving it as evidence. The practice generally includes the imaging of original media in presence of an independent third party. The process also requires being able to document chain-of-custody so that it can be established in a court law.Analyze '' Involves extracting, processing and interpreting the evidence. Extracted data could be unintelligible binary data after it has been processed and converted into human readable format. Interpreting the data requires an in-depth knowledge of how different pieces of evidences may fit together. The analysis should be performed using an image of media and not the original.Present -Involves a presentation of the various audiences such as management, attorneys, court, etc.Acceptance of evidence depends upon the manner of presentation, qualification of the presenter, and credibility of the process used to preserve and analyze the evidence.The following were incorrect answers:The other options presented are not a valid sequence which needs to be followed in the chain of events in regards to evidence in computer forensic.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number3673. Right Answer: AExplanation: Imaging is the process that allows one to obtain a bit-for bit copy of a data to avoid damage to the original data or information when multiple analysis may be performed. The imaging process is made to obtain residual data, such as deleted files, fragments of deleted files and other information present, from the disk for analysis. This is possible because imaging duplicates the disk surface, sector by sector.For CISA exam you should know below mentioned key elements of computer forensics during audit planning.Data Protection -To prevent sought-after information from being altered, all measures must be in place. It is important to establish specific protocol to inform appropriate parties that electronic evidence will be sought and not destroy it by any means.Data Acquisition '' All information and data required should transferred into a controlled location; this includes all types of electronic media such as fixed disk drives and removable media. Each device must be checked to ensure that it is write protected. This may be achieved by using device known as write blocker.Imaging -The Imaging is a process that allows one to obtain bit-for bit copy of a data to avoid damage of original data or information when multiple analyses may be performed. The imaging process is made to obtain residual data, such as deleted files, fragments of deleted files and other information present, from the disk for analysis. This is possible because imaging duplicates the disk surface, sector by sector.Extraction - This process consists of identification and selection of data from the imaged data set. This process should include standards of quality, integrity and reliability. The extraction process includes software used and media where an image was made. The extraction process could include different sources such as system logs, firewall logs, audit trails and network management information.Interrogation -Integration is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.Investigation/ Normalization -This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.Reporting- The information obtained from computer forensic has limited value when it is not collected and reported in proper way. When an IS auditor writes report, he/she must include why the system was reviewed, how the computer data were reviewed and what conclusion were made from analysis. The report should achieve the following goalsAccurately describes the details of an incident.Be understandable to decision makers.Be able to withstand a barrage of legal securityBe unambiguous and not open to misinterpretation.Be easily referenced -Contains all information required to explain conclusions reachedOffer valid conclusions, opinions or recommendations when neededBe created in timely manner.The following were incorrect answers:Extraction - This process consists of identification and selection of data from the imaged data set. This process should include standards of quality, integrity and reliability.Data Protection -To prevent sought-after information from being altered, all measures must be in place. It is important to establish specific protocol to inform appropriate parties that electronic evidence will be sought and not destroy it by any means.Data Acquisition '' All information and data required should transferred into a controlled location; this includes all types of electronic media such as fixed disk drives and removable media. Each device must be checked to ensure that it is write protected. This may be achieved by using device known as write blocker.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number367 and 3684. Right Answer: AExplanation: Investigation is the process that converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.For CISA exam you should know below mentioned key elements of computer forensics during audit planning.Data Protection -To prevent sought-after information from being altered, all measures must be in place. It is important to establish specific protocol to inform appropriate parties that electronic evidence will be sought and not destroy it by any means.Data Acquisition '' All information and data required should transferred into a controlled location; this includes all types of electronic media such as fixed disk drives and removable media. Each device must be checked to ensure that it is write protected. This may be achieved by using device known as write blocker.Imaging -The Imaging is a process that allows one to obtain bit-for bit copy of a data to avoid damage of original data or information when multiple analyses may be performed. The imaging process is made to obtain residual data, such as deleted files, fragments of deleted files and other information present, from the disk for analysis. This is possible because imaging duplicates the disk surface, sector by sector.Extraction - This process consists of identification and selection of data from the imaged data set. This process should include standards of quality, integrity and reliability. The extraction process includes software used and media where an image was made. The extraction process could include different sources such as system logs, firewall logs, audit trails and network management information.Interrogation -Integration is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.Investigation/ Normalization -This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.Reporting- The information obtained from computer forensic has limited value when it is not collected and reported in proper way. When an IS auditor writes report, he/she must include why the system was reviewed, how the computer data were reviewed and what conclusion were made from analysis. The report should achieve the following goalsAccurately describes the details of an incident.Be understandable to decision makers.Be able to withstand a barrage of legal securityBe unambiguous and not open to misinterpretation.Be easily referenced -Contains all information required to explain conclusions reachedOffer valid conclusions, opinions or recommendations when neededBe created in timely manner.The following were incorrect answers:Interrogation -Integration is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.Extraction - This process consists of identification and selection of data from the imaged data set. This process should include standards of quality, integrity and reliability.Reporting -The information obtained from computer forensic has limited value when it is not collected and reported in proper way. When an IS auditor writes report, he/she must include why the system was reviewed, how the computer data were reviewed and what conclusion were made from analysis.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 367 and 3685. Right Answer: DExplanation: Extraction is the process of identification and selection of data from the imaged data set. This process should include standards of quality, integrity and reliability.The extraction process includes software used and media where an image was made. The extraction process could include different sources such as system logs, firewall logs, audit trails and network management information.For CISA exam you should know below mentioned key elements of computer forensics during audit planning.Data Protection -To prevent sought-after information from being altered, all measures must be in place. It is important to establish specific protocol to inform appropriate parties that electronic evidence will be sought and not destroy it by any means.Data Acquisition '' All information and data required should transferred into a controlled location; this includes all types of electronic media such as fixed disk drives and removable media. Each device must be checked to ensure that it is write protected. This may be achieved by using device known as write blocker.Imaging -The Imaging is a process that allows one to obtain bit-for bit copy of a data to avoid damage of original data or information when multiple analyses may be performed. The imaging process is made to obtain residual data, such as deleted files, fragments of deleted files and other information present, from the disk for analysis. This is possible because imaging duplicates the disk surface, sector by sector.Extraction - This process consists of identification and selection of data from the imaged data set. This process should include standards of quality, integrity and reliability. The extraction process includes software used and media where an image was made. The extraction process could include different sources such as system logs, firewall logs, audit trails and network management information.Interrogation -Integration is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.Investigation/ Normalization -This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.Reporting- The information obtained from computer forensic has limited value when it is not collected and reported in proper way. When an IS auditor writes report, he/she must include why the system was reviewed, how the computer data were reviewed and what conclusion were made from analysis. The report should achieve the following goalsAccurately describes the details of an incident.Be understandable to decision makers.Be able to withstand a barrage of legal securityBe unambiguous and not open to misinterpretation.Be easily referenced -Contains all information required to explain conclusions reachedOffer valid conclusions, opinions or recommendations when neededBe created in timely manner.The following were incorrect answers:Investigation/ Normalization -This process converts the information extracted to a format that can be understood by investigator. It includes conversion of hexadecimal or binary data into readable characters or a format suitable for data analysis tool.Interrogation -Integration is used to obtain prior indicators or relationships, including telephone numbers, IP addresses, and names of individuals from extracted data.Reporting -The information obtained from computer forensic has limited value when it is not collected and reported in proper way. When an IS auditor writes report, he/she must include why the system was reviewed, how the computer data were reviewed and what conclusion were made from analysis.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 367 and 368 .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is a reason for implementing a decentralized IT governance model?A) Standardized controls and economies of scaleB) IT synergy among business unitsC) Greater consistency among business unitsD) Greater responsiveness to business needs2. The use of symmetric key encryption controls to protect sensitive data transmitted over a communications network requires that:A) primary keys for encrypting the data be stored in encrypted form.B) encryption keys be changed only when a compromise is detected at both ends.C) encryption keys at one end be changed on a regular basis.D) public keys be stored in encrypted form.3. A purpose of project closure is to determine the:A) potential risks affecting the quality of deliverables.B) lessons learned for use in future projects.C) project feasibility requirementsD) professional expertise of the project manager.4. When providing a vendor with data containing personally identifiable information (PII) for offsite testing, the data should be:A) currentB) encrypted.C) sanitized.D) backed up.5. Which of the following should be the PRIMARY basis for prioritizing follow-up audits?A) Complexity of management's actions plansB) Recommendation from executive managementC) Audit cycle defined in the audit planD) Residual risk from the findings of previous audits Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Senior management commitment and support will MOSTlikely be offered when the value of information security governance is presented from a:A) threat perspective.B) compliance perspective.C) risk perspective.D) policy perspective.2. Which of the following would provide nonrepudiation of electronic transactions?A) Two-factor authenticationB) Periodic reaccreditationsC) Third-party certificatesD) Receipt acknowledgment3. The MAIN reason for an information security manager to monitor industry level changes in the business and IT is to:A) evaluate the effect of the changes on the levels of residual risk.B) identity changes in the risk environment.C) update information security policies in accordance with the changes.D) change business objectives based on potential impact.4. Exceptions to a security policy should be approved based PRIMARILY on:A) risk appetite.B) the external threat probability.C) results of a business impact analysis (BIA).D) the number of security incidents.5. Which of the following is the BEST way to increase the visibility of information security within an organization's culture?A) Requiring cross-functional information security trainingB) Implementing user awareness campaigns for the entire companyC) Publishing an acceptable use policyD) Establishing security policies based on industry standards Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use?A) A. Initiate a factory resetB) B. Perform a hard resetC) C. Remove the MicroSD cardD) D. Rollback the OS update2. A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?A) A. AESB) B. VPNC) C. UTMD) D. WPA23. A user reports that any URL entered redirects to the same web page. A technician concludes that the user-s computer has been compromised. Which of the following tools would the technician use to resolve the issue?A) A. Last known good configurationB) B. Anti-malwareC) C. System restoreD) D. Rogue antivirus4. Which of the following is an example of client-side virtualization?A) A. Compatibility mode on a program icon properties menuB) B. Running a DOS application on a Windows 7 32-bit operating systemC) C. Cloud hosted office applicationsD) D. XP mode running in Windows 7 64-bit operating system5. A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?A) A. Emergency Repair DiskB) B. Restore from OEM imageC) C. System RecoveryD) D. Restore from backup Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Depending on the host's configuration, which of the following files can be used to turn on and off network services running on a host? (Choose TWO correct answers.)(Select 2answers)A) A. /etc/profileB) B. /etc/servicesC) C. /etc/inetd.confD) D. /etc/xinetd.confE) E. /etc/host.conf2. How do shadow passwords improve the password security in comparison to standard passwd passwords?A) A. Shadow passwords are stored in plain text and can be checked for weak passwords.B) B. Every shadow password is valid for 45 days and must be changed afterwards.C) C. The system's host key is used to strongly encrypt all shadow passwords.D) D. Shadow passwords are always combined with a public key that has to match the user's private key.E) E. Regular users do not have access to the password hashes of shadow passwords.3. What is true regarding public and private SSH keys? (Choose TWO correct answers.)(Select 2answers)A) A. Several different public keys may be generated for the same private key.B) B. The private key must never be revealed to anyone.C) C. For each user account, there is exactly one key pair that can be used to log into that account.D) D. To maintain the private key's confidentiality, the SSH key pair must be created by its owner.E) E. To allow remote logins, the user's private key must be copied to the remote server.4. Which of the following commands gets the GnuPG public key with the id 63B4835B from the keyserver example.com?A) A. gpg --keyserver hkp://example.com --recv-key 63B4835BB) B. gpg --search-key hkp://63B4835B@example.comC) C. gpg --keyserver gpg://example.com --get-key 63B4835BD) D. gpg --keyserver hkp://example.com --add-key 63B4835BE) E. gpg --keyserver gpg://example.com --key 63B4835B5. What is the difference between the commands test -e path and test -f path?A) A. They are equivalent options with the same behaviour.B) B. The -f option tests for a regular file. The -e option tests for an empty file.C) C. Both options check the existence of the path. The -f option also confirms that it is a regular file.D) D. The -f option tests for a regular file. The -e option tests for an executable file. Right Answer and Explanation: 1. Right Answer: C,DExplanation: 2. Right Answer: EExplanation: 3. Right Answer: B,DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization plans to implement multifactor authentication techniques within the enterprise network architecture. Each authentication factor is expected to be a unique control. Which of the following BEST describes the proper employment of multifactor authentication?A) Proximity card,fingerprint scanner,PINB) Fingerprint scanner,voice recognition,proximity cardC) Smart card,user PKI certificate,privileged user certificateD) Voice recognition,smart card,proximity card2. An organization relies heavily on an application that has a high frequency of security updates. At present,the security team only updates the application on the first Monday of each month,even though the security updates are released as often as twice a week. Which of the following would be the BEST method of updating this application?A) Configure testing and automate patch management for the application.B) Configure security control testing for the application.C) Manually apply updates for the application when they are released.D) Configure a sandbox for testing patches before the scheduled monthly update.3. An organization requires users to provide their fingerprints to access an application. To improve security,the application developers intend to implement multifactor authentication. Which of the following should be implemented?A) Use a camera for facial recognitionB) Have users sign their name naturallyC) Require a palm geometry scanD) Implement iris recognition4. An organization's employees currently use three different sets of credentials to access multiple internal resources. Management wants to make this process less complex. Which of the following would be the BEST option to meet this goal?A) Transitive trustB) Single sign-onC) FederationD) Secure token5. An organization's file server has been virtualized to reduce costs. Which of the following types of backups would be MOST appropriate for the particular file server?A) SnapshotB) FullC) IncrementalD) Differential Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is NOT a valid way to enter data into an Excel cell?A) Typing directly into the cellB) Copying and pasting from another cellC) Importing from a PDF fileD) Dragging and dropping from another cell2. Which of the following formats cannot be applied to a cell in Excel?A) CurrencyB) DateC) PercentageD) Sound3. Which of the following functions can be used to round up a number to the nearest whole number?A) ROUNDB) ROUNDDOWNC) ROUNDUPD) CEILING4. What is the result of the formula =ROUND(3.14159, 2) in Excel?A) 3.15B) 3.16C) 3.1D) 3.145. What is the shortcut key to insert a new worksheet in Excel?A) Shift+F11B) Alt + NC) Alt + Shift + ND) Ctrl + N Right Answer and Explanation: 1. Right Answer: DExplanation: Importing data from a PDF file is not a valid way to enter data into an Excel cell.2. Right Answer: DExplanation: Sound is not a valid format in Excel.3. Right Answer: CExplanation: The ROUNDUP function can be used to round up a number to the nearest whole number.4. Right Answer: DExplanation: The ROUND function rounds a number to a specified number of digits. Therefore, the formula calculates as ROUND(3.14159, 2) = 3.14.5. Right Answer: AExplanation: The shortcut key to insert a new worksheet in Excel is Shift + F11. .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A company has a single manufacturing facility. It distributes the products through retail stores located in various regions. Which of the following distribution strategies will minimize the company's warehousing costs?A) Utilizing third-party logistics (3PL) providersB) Pooling inventory in regional warehouses shipping to multiple retailC) Shipping directly from the manufacturing facility to retail locationsD) Cross-docking at regional warehouses shipping to multiple retail stores2. A firm has identified key benefits for developing a strategic alliance and has selected appropriate supply chain partners. Which of the following actions should the firm take to build a successful alliance with a supplier who is also a competitor?A) Establish processes to control shared information.B) Negotiate contracts that maximize the firm×?â?¬â?¢s profits.C) Instruct employees to ignore the competitive aspect of the relationship.D) Analyze market for competitive advantage.3. Which of the following considerations are essential to a company's advanced supply chain strategy that utilizes cloud computing?A) Understanding the history and evolution of supply chain technologiesB) Understanding the complexity of information services configurationC) Understanding the content and scope of a company×?â?¬â?¢s cloud implementationD) Understanding the product offering of local and global internet service providers (ISPs)4. Which of the following supply chain fulfillment strategies is more commonly associated with e-commerce enabled supply chains?A) Push systemB) Parcel shipmentsC) Small number of niche customersD) Fewer reverse logistics activities5. Which of the following distribution strategies is characterized by items flowing through a warehouse in an almost continuous manner?A) Cross-dockingB) Direct shipmentC) MultilevelD) One-piece flow Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: Cross-docking is a distribution technique in which items are brought into a distribution center for immediate dispatch. Instead of being received and stored away, these items are loaded into the distribution center×?â?¬â?¢s sorting system or are taken directly to shipping for sorting and dispatch. This may require the vendor to perform some additional value-added step, such as hanging garments on hangers, repackaging the item for easier sorting, or adding labels such as a price tag to the item. .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An engineer is configuring SAML SSO for a Cisco Unified Communications Manager. After completing all required steps, the engineer wants to verify the status. Which CLI command provides the status of SAML SSO?A) utils sso statusB) show saml statusC) show sso statusD) 2. An end user opened a ticket, stating that before logging in to Jabber for Windows, a warning is displayed that a server certificate has expired. Which two certificates must be verified on the Cisco Unified Communications Manager and IM&P deployment? (Choose two.)(Select 2answers)A) cup-xmpp on IM&PB) callmanager on Cisco Unified CMC) tomcat on Cisco Unified CMD) capf on Cisco Unified CM3. Which two Cisco Unity Connection logs are used to troubleshoot issues with Message Waiting Indicators? (Choose two.)(Select 2answers)A) Connection Conversation ManagerB) Connection IMAP ServerC) Connection Mailbox SyncD) Connection NotifierE) Connection Message Transfer Agent4. What are two Cisco Jabber 12.6 on-premises deployment types that can be run on a Windows-enabled PC? (Choose two.)(Select 2answers)A) Full UCB) IM-onlyC) multicloud-basedD) Contact Center Agent5. Which statement about SIP federation between Cisco Unified Communications IM and Presence and Microsoft Skype for Business is true?A) The role of SIP Proxy service is to process the XMPP packet in from Jabber and convert it to SIPB) TLS is optional.C) Add the federated user as a contact in Jabber to view its presence status.D) Use of directory URI as an IM addressing scheme is not supported Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: A,DExplanation: 3. Right Answer: A,EExplanation: 4. Right Answer: A,BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review