An existing system is being extensively enhanced by
extracting and reusing design and program components. This
is an example of:

A. reverse engineering.

B. prototyping.

C. software reuse.

D. reengineering.

Answers were Sorted based on User's Feedback



An existing system is being extensively enhanced by extracting and reusing design and program compo..

Answer / guest

Answer: D

Old (legacy) systems that have been corrected, adapted and
enhanced extensively require reengineering to continue to be
maintainable. Reengineering is a rebuilding activity to
incorporate new technologies into existing systems. Using
program language statements, reverse engineering involves
reversing a program's machine code into the source code in
which it was written to identify malicious content in a
program such as a virus, or to adapt a program written for
use with one processor for use with a differently designed
processor. Prototyping is development of a system through
controlled trial and error. Software reuse is the process of
planning, analyzing and using previously developed software
components. The reusable components are integrated into the
current software product systematically.

Is This Answer Correct ?    5 Yes 1 No

An existing system is being extensively enhanced by extracting and reusing design and program compo..

Answer / kasturi

Answer D. Reverse engineering is done on the exisitng system
to understand its logic and design. Reengineering is to
rebuild it after the incorporating this understanding into
the new system.Since the question states existing system is
being enhanced by reusing design, this is an example of
reengineering, using reverse engineering.

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CISA Certification Interview Questions

Which of the following is an implementation risk within the process of decision support systems? A. Management control B. Semistructured dimensions C. Inability to specify purpose and usage patterns D. Changes in decision processes

1 Answers  


An IS auditor is auditing the controls relating to employee termination. Which of the following is the MOST important aspect to be reviewed? A. The related company staff are notified about the termination B. User ID and passwords of the employee have been deleted C. The details of employee have been removed from active payroll files D. Company property provided to the employee has been returned

1 Answers  


A request for a change to a report format in a module (subsystem) was made. After making the required changes, the programmer should carry out: A. unit testing. B. unit and module testing. C. unit, module and regression testing. D. module testing.

2 Answers  


Involvement of senior management is MOST important in the development of: A. strategic plans. B. IS policies. C. IS procedures. D. standards and guidelines.

1 Answers  


To prevent unauthorized entry to the data maintained in a dial-up fast response system, an IS auditor should recommend: A. online terminals be placed in restricted areas. B. online terminals be equipped with key locks. C. ID cards be required to gain access to online terminals. D. online access be terminated after three unsuccessful attempts.

1 Answers  






Which of the following BEST describes the role of a systems analyst? A. Defines corporate databases B. Designs systems based on the needs of the user C. Schedules computer resources D. Tests and evaluates programmer and optimization tools

1 Answers  


Which of the following would an IS auditor consider to be the MOST important to review when conducting a business continuity audit? A. A hot site is contracted for and available as needed. B. A business continuity manual is available and current. C. Insurance coverage is adequate and premiums are current. D. Media backups are performed on a timely basis and stored offsite.

1 Answers  


Separation of duties between computer opeartors and other data processing personnel is intended to: A. Prevent unauthorized modifications to program or data. B. Reduce overall cost of operations C. Allow operators to concentrate on their assigned duties D. Restrict operator access to data

2 Answers  


Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports

1 Answers  


Which of the following provides nonrepudiation services for e-commerce transactions? A. Public key infrastructure (PKI) B. Data encryption standard (DES) C. Message authentication code (MAC) D. Personal identification number (PIN)

1 Answers  


If a database is restored using before-image dumps, where should the process be restarted following an interruption? A. Before the last transaction B. After the last transaction C. The first transaction after the latest checkpoint D. The last transaction before the latest checkpoint

2 Answers  


When a systems development life cycle (SDLC) methodology is inadequate, the MOST serious immediate risk is that the new system will: A. be completed late. B. exceed the cost estimates. C. not meet business and user needs. D. be incompatible with existing systems.

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)