A User is stored in which table?
A User is stored in which table?A . User [sys_user] B. User [ sys_user_group] C. User [ syst_user_profile] D. User [user_profile]View AnswerAnswer: A
A User is stored in which table?A . User [sys_user] B. User [ sys_user_group] C. User [ syst_user_profile] D. User [user_profile]View AnswerAnswer: A
Myles, a security professional at an organization, provided laptops for all the employees to carry out the business processes from remote locations. While installing necessary applications required for the business, Myles has also installed antivirus software on each laptop following the company's policy to detect and protect the machines from...
Which term refers to application menus and modules which you may want to access quickly and often?A . Breadcrumb B. Favorite C. Tag D. BookmarkView AnswerAnswer: B
An internal auditor conducted interviews with several employees, documented the interviews analyzed the summaries, and drew a number of conclusions. What sort of audit evidence has the internal auditor primarily obtained?A . Documentary evidence B. Testimonial evidence C. Analytical evidence D. Physical evidenceView AnswerAnswer: A
A community manager runs a Facebook group for people who have challenged themselves to refrain from drinking alcohol for 30 days. The group has grown organically over two years after the founder completed a 30-day challenge and invited people to join. The group now has includes over 3,000 members who...
The value that logistics provides within the supply chain can best be summarized as:A . satisfying customer expectations about availability and delivery at an acceptable total cost. B. meeting promised location and on-time delivery goals with minimal use of expediting. C. establishing inventory and delivery goals with various customers that...
Which of the following is one of the process goals in the transition stage?A . Produce a potentially consumable solution B. Develop common vision C. Ensure production readiness D. Address riskView AnswerAnswer: C
A security analyst conducted a risk assessment on an organization's wireless network and identified a high-risk element in the implementation of data confidentially protection. Which of the following is the BEST technical security control to mitigate this risk?A . Switch to RADIUS technology B. Switch to TACACS+ technology. C. Switch...
An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?A . Copies of prior...
An engineer is experiencing unexpected reboots on a graphics workstation when rendering complex 3-D models. The workstation is configured with a 115V power supply that is rated at 200W and connected to a UPS. The central processing unit contains 16 hyperthreaded cores, and a discrete graphics solution utilizing an 8-pin...