One of the purposes of library control software is to allow:

A. programmers access to production source and object libraries.

B. batch program updating.

C. operators to update the control library with the
production version before testing is completed.

D. read-only access to source code.

Answers were Sorted based on User's Feedback



One of the purposes of library control software is to allow: A. programmers access to production ..

Answer / guest

Answer: D

An important purpose of library control software is to allow
read-only access to source code. Choices A, B, and C are
activities which library control software should help to
prevent or prohibit.

Is This Answer Correct ?    30 Yes 0 No

One of the purposes of library control software is to allow: A. programmers access to production ..

Answer / hemant kumar

The Library Control Procedure's primary purpose is to
provide protection & security for the source code that is
under development. Test objects are also controlled by the
library control procedure. Maintaining separate sets of
libraries for each testing level is one of the most
efficient methods of protection for any project. Separate
libraries make it easier to identify the different versions
of test-objects by eliminating the chance of confusion.
Transfer request forms are used to authorize transfers
between libraries that require reviews or approvals.
Promotions, demotions and re-promotions of test objects are
actions that are used to transfer test objects between
testing levels.

Is This Answer Correct ?    10 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

An audit charter should: A. be dynamic and change often to coincide with the changing nature of technology and the audit profession. B. clearly state audit objectives for the delegation of authority for the maintenance and review of internal controls. C. document the audit procedures designed to achieve the planned audit objectives. D. outline the overall authority, scope and responsibilities of the audit function.

2 Answers  


An IS auditor discovers that programmers have update access to the live environment. In this situation, the IS auditor is LEAST likely to be concerned that programmers can: A. authorize transactions. B. add transactions directly to the database. C. make modifications to programs directly. D. access data from live environment and provide faster maintenance.

1 Answers  


A tax calculation program maintains several hundred tax rates. The BEST control to ensure that tax rates entered into the program are accurate is: A. an independent review of the transaction listing. B. a programmed edit check to prevent entry of invalid data. C. programmed reasonableness checks with 20 percent data entry range. D. a visual verification of data entered by the processing department.

1 Answers  


A decrease in amplitude as a signal propagates along a transmission medium is known as: A. noise. B. crosstalk. C. attenuation. D. delay distortion.

1 Answers  


The extent to which data will be collected during an IS audit should be determined, based on the: A. availability of critical and required information. B. auditor's familiarity with the circumstances. C. auditee's ability to find relevant evidence. D. purpose and scope of the audit being done.

3 Answers  


The PRIMARY objective of a firewall is to protect: A. internal systems from exploitation by external threats. B. external systems from exploitation by internal threats. C. internal systems from exploitation by internal threats. D. itself and attached systems against being used to attack other systems.

1 Answers  


Which of the following pairs of functions should not be combined to provide proper segregation of duties? A. Tape librarian and computer operator B. Application programming and data entry C. Systems analyst and database administrator D. Security administrator and quality assurance

3 Answers  


Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card? A. Intrusion detection systems B. Data mining techniques C. Firewalls D. Packet filtering routers

1 Answers  


Structured programming is BEST described as a technique that: A. provides knowledge of program functions to other programmers via peer reviews. B. reduces the maintenance time of programs by the use of small-scale program modules. C. makes the readable coding reflect as closely as possible the dynamic execution of the program. D. controls the coding and testing of the high-level functions of the program in the development process.

1 Answers  


Which of the following is an example of a passive attack, initiated through the Internet? A. Traffic analysis B. Masquerading C. Denial of service D. E-mail spoofing

2 Answers  


Large-scale systems development efforts: A. are not affected by the use of prototyping tools. B. can be carried out independent of other organizational practices. C. require that business requirements be defined before the project begins. D. require that project phases and deliverables be defined during the duration of the project.

1 Answers  


A PING command is used to measure: A. attenuation. B. throughput. C. delay distortion. D. latency.

2 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)