Which of the following is the MOST effective type of
antivirus software?
A. Scanners
B. Active monitors
C. Integrity checkers
D. Vaccines
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
"Integrity checkers compute a binary number on a known
virus-free program that is then stored in a database file.
The number is called a cyclical redundancy check (CRC). When
that program is called to execute, the checker computes the
CRC on the program about to be executed and compares it to
the number in the database. A match means no infection
a mismatch means that a change in the program has occurred.
A change in the program could mean a virus. Scanners look
for sequences of bits called signatures that are typical of
virus programs. They examine memory, disk boot sectors,
executables and command files for bit patterns that match a
known virus. Scanners, therefore, need to be updated
periodically to remain effective. Active monitors interpret
DOS and ROM basic input-output system (BIOS) calls, looking
for virus-like actions. Active monitors can be annoying
because they cannot distinguish between a user request and a
program or virus request. As a result, users are asked to
confirm actions like formatting a disk or deleting a file or
set of files. Vaccines are known to be good antivirus
software. However, they also need to be updated periodically
to remain effective."
| Is This Answer Correct ? | 12 Yes | 0 No |
In a risk-based audit approach, an IS auditor should FIRST complete :
Information for detecting unauthorized input from a terminal would be BEST provided by the: A. console log printout. B. transaction journal. C. automated suspense file listing. D. user error report.
An IS auditor has just completed a review of an organization that has a mainframe and a client-server environment where all production data reside. Which of the following weaknesses would be considered the MOST serious? A. The security officer also serves as the database administrator (DBA.) B. Password controls are not administered over the client/server environment. C. There is no business continuity plan for the mainframe system?s non-critical applications. D. Most LANs do not back up file server fixed disks regularly.
Which of the following forms of evidence for the auditor would be considered the MOST reliable? A. An oral statement from the auditee B. The results of a test performed by an IS auditor C. An internally generated computer accounting report D. A confirmation letter received from an outside source
The MOST likely explanation for the use of applets in an Internet application is that: A. it is sent over the network from the server. B. the server does not run the program and the output is not sent over the network. C. they improve the performance of both the web server and network. D. it is a JAVA program downloaded through the web browser and executed by the web server of the client machine.
Accountability for the maintenance of appropriate security measures over information assets resides with the: A. security administrator. B. systems administrator. C. data and systems owners. D. systems operations group.
During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that: A. assessment of the situation may be delayed. B. execution of the disaster recovery plan could be impacted. C. notification of the teams might not occur. D. potential crisis recognition might be delayed.
Which of the following would MOST likely ensure that a system development project meets business objectives? A. Maintenance of program change logs B. Development of a project plan identifying all development activities C. Release of application changes at specific times of the year D. User involvement in system specification and acceptance
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be PRIMARILY concerned about: A. the soundness of the impact analysis. B. hardware and software compatibility. C. differences in IS policies and procedures. D. frequency of system testing.
The PRIMARY advantage of a continuous audit approach is that it: A. does not require an IS auditor to collect evidence on system reliability while processing is taking place. B. requires the IS auditor to review and follow up immediately on all information collected. C. can improve system security when used in time-sharing environments that process a large number of transactions. D. does not depend on the complexity of an organization's computer systems.
The PRIMARY objective of a logical access controls review is to: A. review access controls provided through software. B. ensure access is granted per the organization's authorities. C. walkthrough and assess access provided in the IT environment. D. provide assurance that computer hardware is protected adequately against abuse.
Which of the following controls would BEST detect intrusion? A. User ids and user privileges are granted through authorized procedures. B. Automatic logoff is used when a workstation is inactive for a particular period of time. C. Automatic logoff of the system after a specified number of unsuccessful attempts. D. Unsuccessful logon attempts are monitored by the security administrator.