A programmer managed to gain access to the production
library, modified a program that was then used to update a
sensitive table in the payroll database and restored the
original program. Which of the following methods would MOST
effectively detect this type of unauthorized changes?
A. Source code comparison
B. Executable code comparison
C. Integrated test facilities (ITF)
D. Review of transaction log files
Answer Posted / guest
Answer: D
Changes made to the payroll database table would appear in
the transaction log files. Because the original program was
restored, source and executable code comparisons are
ineffective. ITF is less effective than source code
comparison, because it is difficult to know what to look for.
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers