Information Technology Interview Questions

 
1.
Explain 3G?
2.
What is International Telecommunication Union?
3.
What is Universal Mobile Telecommunications System?
4.
What is 2G?
5.
What is 4G?
6.
Explain CDMA2000?
7.
Explain Digital Enhanced Cordless Telecommunications?
8.
Explain WiMAX?
9.
Explain Enhanced Data Rates for GSM Evolution?
10.
Explain High Speed Packet Access?
11.
What is 3GPP Long Term Evolution?
12.
What is Evolution-Data Optimized?
13.
As updates to an online order entry system are processed, the updates are recorded on a transaction tape and a hard copy transaction log. At the end of the day, the order entry files are backed up on tape. During the backup procedure, a drive malfunctions and the order entry files are lost. Which of the following are necessary to restore these files?
14.
While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be:
15.
Which of the following types of testing would determine whether a new or modified system can operate in its target environment without adversely impacting other existing systems?
16.
Which of the following risks could result from inadequate software baselining?
17.
A programmer, using firecall IDs, as provided in the manufactures manual, gained access to the production environment and made an unauthorized change. Which of the following could have prevented this from happening?
18.
Which of the following is a dynamic analysis tool for the purpose of testing software modules?
19.
Online banking transactions are being posted to the database when processing suddenly comes to a halt. The integrity of the transaction processing is BEST ensured by:
20.
A retail company recently installed data warehousing client software at geographically diverse sites. Due to time zone differences between the sites, updates to the warehouse are not synchronized. Which of the following will be affected the MOST?
21.
An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?
22.
Which of the following represents the GREATEST potential risk in an EDI environment?
23.
Corrective action has been taken by an auditee immediately after the identification of a reportable finding. The auditor should:
24.
In a risk-based audit approach, an IS auditor, in addition to risk, would be influenced by:
25.
The PRIMARY advantage of a continuous audit approach is that it:
26.
Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?
27.
IT control objectives are useful to IS auditors, as they provide the basis for understanding the:
28.
In reviewing the IS short-range (tactical) plan, the IS auditor should determine whether:
29.
An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the IS auditor should review?
30.
An IS auditor is performing a network security review of a telecom company that provides Internet connection services to shopping malls for their wireless customers. The company uses wireless transport layer security (WTLS) and secure socket layers (SSL) technology for protecting their customers payment information. The IS auditor should be MOST concerned, if a hacker:
31.
An organization provides information to its supply-chain partners and customers through an extranet infrastructure. Which of the following should be the GREATEST concern to an IS auditor reviewing the firewall security architecture?
32.
Which of the following cryptography options would increase overhead/cost?
33.
Which of the following acts as a decoy to detect active Internet attacks?
34.
Which of the following is the MOST effective control when granting temporary access to vendors?
35.
A certifying authority (CA) can delegate the processes of:
36.
An organization with extremely high security requirements is evaluating the effectiveness of biometric systems. Which of the following performance indicators is MOST important?
37.
To develop a successful business continuity plan, end-user involvement is critical during which of the following phases?
38.
What is GPRS (General Packet Radio Service)?
39.
What is Packet switching?
40.
What is Mobile phone?
41.
What is GSM (Global System for Mobile Communications)?
42.
Explain Time division multiple access?
43.
What is Cellular digital packet data?
44.
Explain i-mode?
45.
What is Dual Transfer Mode?
46.
What is Access Point Name?
47.
What is GPRS Core Network?
48.
What is Base transceiver station (BTS)?
49.
What Is GPS?
50.
Explain portable GPS?
51.
How Does GPS Work?
52.
What is IS-95?
53.
What is NMEA 2000?
54.
What is NMEA 0183?
55.
Explain 2d Space Operations Squadron (2 SOPS)?
56.
What is Interagency GPS Executive Board?
57.
What is GPS modernization?
58.
What is MMS (Multimedia Messaging Service)?
59.
What is Enhanced Messaging Service?
60.
Explain 3GPP?
61.
What is WAP 1.X?
62.
What is WAP Push?
63.
How Multimedia Messaging Service (MMS) Works?
64.
Do all handsets support MMS?
65.
How to explain what is ss7?
66.
What is a matrix in Telecommunication?
67.
What is the best Rx power and Tx power at good RF Conditions?
68.
Buffering is?
a) the process of temporarily storing the data to allow for small variation in device speeds
b) a method to reduce cross talks
c) storage of data within transmitting medium until the receiver is ready to receive.
d) a method to reduce routing overhead.
69.
When a C function call is made, the order in which parameters passed to the function are pushed into the stack is?
a) left to right
b) right to left
c) bigger variables are moved first than the smaller variables.
d) smaller variables are moved first than the bigger ones.
e) none of the above.
70.
To send a data packet using datagram , connection will be established?
a) before data transmission.
b) connection is not established before data transmission.
c) no connection is required.
d) none of the above.
71.
A 2MB PCM(pulse code modulation) has?
a) 32 channels
b) 30 voice channels & 1 signaling channel.
c) 31 voice channels & 1 signaling channel.
d) 32 channels out of which 30 voice channels, 1 signaling channel, & 1 synchronization channel.
72.
Memory allocation of variables declared in a program is?
a) allocated in RAM.
b) allocated in ROM.
c) allocated on stack.
d) assigned to registers.
73.
What is TCSM ?
74.
Time taken for 1 satellite hop in voice communication is?
a) 1/2 second
b) 1 seconds
c) 4 seconds
d) 2 seconds
75.
Line of sight is?
a) Straight Line
b) Parabolic
c) Tx & Rx should be visible to each other
d) none of the above
76.
What is the need of CPG message in ISUP protocol?
77.
Purpose of PC(Program Counter) in a Microprocessor is?
a) To store address of TOS(Top Of Stack)
b) To store address of next instruction to be executed.
c) count the number of instructions.
d) to store base address of the stack.
78.
Conditional results after execution of an instruction in a micro processor is stored in?
a) register
b) accumulator
c) flag register
d) flag register part of PSW(Program Status Word)
79.
What is the nominal voltage required in subscriber loop connected to local exchange
a) +48 volts
b) -48 volts
c) 230 volts
d) 110 volts
80.
The status of the Kernel is?
a) task
b) process
c) not defined.
d) none of the above.
81.
What is the maximal decimal number that can be accommodated in a byte?
a) 128
b) 256
c) 255
d) 512
82.
Frequency at which VOICE is sampled is?
a) 4 KHz
b) 8 KHz
c) 16 KHz
d) 64 KHz
83.
What is the type of signaling used between two exchanges?
a) inband
b) common channel signaling
c) any of the above
d) none of the above.
84.
A software that allows a personal computer to pretend as a computer terminal is ?
a) terminal adapter
b) bulletin board
c) modem
d) terminal emulation
85.
How many T1 facilities the company needs between its office and the PSTN if it has 47 digital telephones, each operating at 64kbps
3 low-speed video machines, each operating at 384kbps
1 interactive video system, requiring 1.536 mbps.
86.
What action is taken when the processor under execution is interrupted by a non-maskable interrupt?
a) Processor serves the interrupt request after completing the execution of the current instruction.
b) Processor serves the interrupt request after completing the current task.
c) Processor serves the interrupt request immediately.
d) Processor serving the interrupt request depends upon the priority of the current task under execution.
87.
Word alignment is?
a) aligning the address to the next word boundary of the machine.
b) aligning to an even boundary.
c) aligning to a word boundary.
d) none of the above.
88.
Max number of satellite hops allowed in voice communication is:
a) only one
b) more han one
c) two hops
d) four hops