A programmer managed to gain access to the production
library, modified a program that was then used to update a
sensitive table in the payroll database and restored the
original program. Which of the following methods would MOST
effectively detect this type of unauthorized changes?

A. Source code comparison

B. Executable code comparison

C. Integrated test facilities (ITF)

D. Review of transaction log files

Answer Posted / guest

Answer: D

Changes made to the payroll database table would appear in
the transaction log files. Because the original program was
restored, source and executable code comparisons are
ineffective. ITF is less effective than source code
comparison, because it is difficult to know what to look for.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2826


purchase orders issued to vendors have been authorized as per the authorization matrix

1080