第1题
You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.
You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
A.Implement merge replication.
B.Implement snapshot replication.
C.Implement transactional replication.
D.Schedule replication to run continuously.
E.Schedule replication to run during off-peak hours.
第2题
The shared permissions and NTFS permissions are shown in the following table.
Share permissions:
Everyone: FULL Control
NTFS permissions
Domain Admins: Read
Katrin: Full Control
Katrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted.
Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions for other files in the HR-Data folder. You want your actions to have least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file.
What should you do?
A.Grant yourself Full Control permission for only the HR-data folder and not its subobjects. Delete the file. Then remove Full Control permission for HR-Data folder.
B.Take ownership of the HR-Data folder. When prompted, take ownership of the existing files. Grant yourself Full Control permission for the file. Delete the file.
C.Take ownership of the file. Grant yourself Modify permission for the file. Delete the file.
D.Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.
第3题
A. Set the Account lockout duration value to 0.
B. Set the Account lockout duration value to 3.
C. Set the Account lockout threshold value to 0.
D. Set the Account lockout threshold value to 3.
E. Set the Reset account lockout counter after value to 0.
F. Set the Reset account lockout counter after value to 3.
第4题
A. Perform a normal backup every week.
B. Perform a copy backup every week.
C. Perform a differential backup every week.
D. Perform an incremental backup every week
E. Perform a normal backup every day.
F. Perform a copy backup every day.
G. Perform a differential backup every day.
H. Perform an incremental backup every day.
第5题
A.ThecontentsofasharedfolderontheactivenodeshouldbeencryptedbyusingEncryptingFileSystem(EFS)
B.Youshouldrestoreabackuptotheactivenode
C.Youshouldgetridofthesharedarrayfromtheactivenode
D.Fromtheactivenode,youhavetouplugthenetworkcable(s)
第6题
A.YoushouldcreateajobwhichisassignedtotheDatabaseMaintenancecategory
B.YoushouldcreateanAlertwhichwillrunanothertodeletethemaintenancejob.
C.Youshouldcreateajob.Youschedulethejobtorunonlyonce.
D.Youshouldcreateajob.ThejobusestheAutomaticallydeletejoboption
第7题
Sycamore’s previous finance director left the company in December 2014 after it was discovered that he had been claiming fraudulent expenses from the company for a significant period of time. A new finance director was appointed in January 2015 who was previously a financial controller of a bank, and she has expressed surprise that Maple & Co had not uncovered the fraud during last year’s audit.
During the year Sycamore has spent $1·8 million on developing several new products. These projects are at different stages of development and the draft financial statements show the full amount of $1·8 million within intangible assets. In order to fund this development, $2·0 million was borrowed from the bank and is due for repayment over a ten-year period. The bank has attached minimum profit targets as part of the loan covenants.
The new finance director has informed the audit partner that since the year end there has been an increased number of sales returns and that in the month of May over $0·5 million of goods sold in April were returned.
Maple & Co attended the year-end inventory count at Sycamore’s warehouse. The auditor present raised concerns that during the count there were movements of goods in and out the warehouse and this process did not seem well controlled.
During the year, a review of plant and equipment in the factory was undertaken and surplus plant was sold, resulting in a profit on disposal of $210,000.
Required:
(a) State Maples & Co’s responsibilities in relation to the prevention and detection of fraud and error. (4 marks)
(b) Describe SIX audit risks, and explain the auditor’s response to each risk, in planning the audit of Sycamore Science Co. (12 marks)
(c) Sycamore’s new finance director has read about review engagements and is interested in the possibility of Maple & Co undertaking these in the future. However, she is unsure how these engagements differ from an external audit and how much assurance would be gained from this type of engagement.
Required:
(i) Explain the purpose of review engagements and how these differ from external audits; and (2 marks)
(ii) Describe the level of assurance provided by external audits and review engagements. (2 marks)
第8题
A.UsethesecurityconfigurationandanalysisconsoletoimprovetheHISECWSsecurity templatefile.
B.Usethelocalcomputerpolicytodisabletheaccessthiscomputerfromthenetworkoption.
C.UseSECEDITtoreconfigurethecomputerdefaultsecuritysettingstonotallowanonymous accesstothecomputer.
D.Createapolicythatexcludeswriteaccesstothewindows2000computersthenapplythe policytoallnon-windows2000computers.
E.Noneoftheabove,Windows9Xsystemscannotbesecuredusingsecuritytemplatefiles.
第9题
matters that have been left for your attention on the audit working paper file for the year ended 30 September
2005:
(i) Jinack holds an extensive range of inventory and keeps perpetual inventory records. There was no full
physical inventory count at 30 September 2005 as a system of continuous stock checking is operated by
warehouse personnel under the supervision of an internal audit department.
A major systems failure in October 2005 caused the perpetual inventory records to be corrupted before the
year-end inventory position was determined. As data recovery procedures were found to be inadequate,
Jinack is reconstructing the year-end quantities through a physical count and ‘rollback’. The reconstruction
exercise is expected to be completed in January 2006. (6 marks)
Required:
Identify and comment on the implications of the above matters for the auditor’s report on the financial
statements of Jinack Co for the year ended 30 September 2005 and, where appropriate, the year ending
30 September 2006.
NOTE: The mark allocation is shown against each of the matters.
第10题
YoudecidetocreateaJavaScriptfilenamedDataScript.js.Thefollowingcodesegmentwaswrittentocreatethisfile:
TheDataScript.jsfileisinsertedasaresourceinaClassLibraryproject.ThenamespaceforthisprojectisData.Resources.TheJavaScriptMessagesobjectisusedbytheJavaScriptfunctioninordertoretrievemessagesfromaresourcefile.Thisresourcefileisnamed
TestMsgResources.resx.IntheASP.NETapplicationyouaddanAJAXWebformaswellas
referencingtheClassLibrary.ThereafteranASP.NETAJAXScriptReferenceelementisaddedtotheAJAXWebform.
YoureceiveaninstructionfrommanagementtomakesurethattheJavaScriptfunctionisabletoaccesstheerrormessagesdefinedintheresourcefile.YoushouldthusdeterminetheappropriatecodesegmentthatshouldbeaddedtotheAssemblyInfo.vbfile.
Whatshouldyoudo?()
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!