Programs that can run independently and travel from machine
to machine across network connections, with the ability to
destroy data or utilize tremendous computer and
communication resources, are referred to as:
A. trojan horses.
D. logic bombs.
Answers were Sorted based on User's Feedback
Answer / guest
Worms are nonreplicating programs that can run independently
and travel from machine to machine. A trojan horse resembles
a commonly used authorized program that does something
unrelated to its stated or intended purpose causing a
malicious or fraudulent action or event to occur. Viruses
are malicious program code inserted into other executable
code that can self-replicate and spread from computer to
computer. Logic bombs are programmed threats that lie
dormant in commonly used software for an extended period of
time until they are triggered.
|Is This Answer Correct ?||5 Yes||2 No|
Answer / david
|Is This Answer Correct ?||3 Yes||0 No|
Answer / s.m.feroz ahmed
C.Worms and Viruses.
|Is This Answer Correct ?||3 Yes||1 No|
Answer / naani
A - Trojan Horses
|Is This Answer Correct ?||2 Yes||2 No|
Answer / ashutosh
|Is This Answer Correct ?||0 Yes||0 No|
Answer / s.m.feroz ahmed
C.Worms and Viruses.
|Is This Answer Correct ?||0 Yes||2 No|
The reliability of an application system's audit trail may be questionable if: A. user IDs are recorded in the audit trail. B. the security administrator has read-only rights to the audit file. C. date time stamps record when an action occurs. D. users can amend audit trail records when correcting system errors.
During a review of the controls over the process of defining IT service levels, an IS auditor would MOST likely interview the: A. systems programmer. B. legal staff. C. business unit manager. D. application programmer.
Which of the following would an IS auditor consider to be the MOST helpful when evaluating the effectiveness and adequacy of a computer preventive maintenance program? A. A system downtime log B. Vendors' reliability figures C. Regularly scheduled maintenance log D. A written preventive maintenance schedule
Applying a retention date on a file will ensure that: A. data cannot be read until the date is set. B. data will not be deleted before that date. C. backup copies are not retained after that date. D. datasets having the same name are differentiated.
An independent software program that connects two otherwise separate applications sharing computing resources across heterogeneous technologies is known as: A. middleware. B. firmware. C. application software. D. embedded systems.
Which of the following concerns about the security of an electronic message would be addressed by digital signatures? A. Unauthorized reading B. Theft C. Unauthorized copying D. Alteration
An IS auditor performing a review of the backup processing facilities should be MOST concerned that: A. adequate fire insurance exists. B. regular hardware maintenance is performed. C. offsite storage of transaction and master files exists. D. backup processing facilities are tested fully.
Which of the following is the MOST critical element of an effective disaster recovery plan (DRP)? A. Offsite storage of backup data B. Up-to-date list of key disaster recovery contacts C. Availability of a replacement data center D. Clearly defined recovery time objective (RTO)
Which of the following are data file controls? A. Internal and external labeling B. Limit check and logical relationship checks C. Total items and hash totals D. Report distribution procedures
Which of the following is the MOST important issue to the IS auditor in a business process re-engineering (BPR) project would be? A. The loss of middle management, which often is a result of a BPR project B. That controls are usually given low priority in a BPR project C. The considerable negative impact that information protection could have on BPR D. The risk of failure due to the large size of the task usually undertaken in a BPR project
Which of the following is a role of an IS steering committee? A. Initiate computer applications. B. Ensure efficient use of data processing resources. C. Prepare and monitor system implementation plans. D. Review the performance of the systems department.
The PRIMARY purpose of undertaking a parallel run of a new system is to: A. verify that the system provides required business functionality. B. validate the operation of the new system against its predecessor. C. resolve any errors in the program and file interfaces. D. verify that the system can process the production load.