A debugging tool, which reports on the sequence of steps
executed by a program, is called a/an:
A. output analyzer.
B. memory dump.
C. compiler.
D. logic path monitor.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Logic path monitors report on the sequence of steps executed
by a program. This provides the programmer with clues to
logic errors, if any, in the program. An output analyzer
checks the results of a program for accuracy by comparing
the expected results with the actual results. A memory dump
provides a picture of the content of a computer's internal
memory at any point of time, often when the program aborted,
thus providing information on inconsistencies in data or
parameter values. Though compilers have some potential to
provide feedback to a programmer, they are not generally
considered a debugging tool.
| Is This Answer Correct ? | 11 Yes | 0 No |
Answer / rfruelda
D. Logic path monitor
Logic path monitors report on the sequence of steps
executed by a program. This provides the programmer with
clues to logic errors, if any, in the program. An output
analyzer checks the results of a program for accuracy by
comparing the expected results with the actual results. A
memory dump provides a picture of the content of a
computer's internal memory at any point in time, often when
the program is aborted, thus providing information on
inconsistencies in data or parameter values. Though
compilers have some potential to provide feedback to a
programmer, they are not generally considered a debugging
tool.
| Is This Answer Correct ? | 3 Yes | 0 No |
The device that connects two networks at the highest level of the ISO-OSI framework ( i.e., application layer) is a A. Gateway B. Router C. Bridge D. Brouter
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator? A. READ access to data B. DELETE access to transaction data files C. Logged READ/EXECUTE access to programs D. UPDATE access to job control language/script files
Which of the following message services provides the strongest protection that a specific action has occurred? A. Proof of delivery B. Nonrepudiation C. Proof of submission D. Message origin authentication
In an audit of a business continuity plan, which of the following findings is of MOST concern? A. There is no insurance for the addition of assets during the year. B. BCP manual is not updated on a regular basis. C. Testing of the backup of data has not been done regularly. D. Records for maintenance of access system have not been maintained.
An IS auditor should be concerned when a telecommunication analyst: A. monitors systems performance and tracks problems resulting from program changes. B. reviews network load requirements in terms of current and future transaction volumes. C. assesses the impact of the network load on terminal response times and network data transfer rates. D. recommends network balancing procedures and improvements.
With reference to the risk management process, which of the following statements is correct? A. Vulnerabilities can be exploited by a threat. B. Vulnerabilities are events with the potential to cause harm to IS resources. C. Vulnerability exists because of threats associated with use of information resources. D. Lack of user knowledge is an example of a threat.
Which of the following would not prevent the loss of an asset but would assist in recovery by transferring part of the risk to a third party? A. Full system backups B. Insurance C. Testing D. Business impact analysis
An integrated test facility is considered a useful audit tool because it: A. is a cost-efficient approach to auditing application controls. B. enables the financial and IS auditors to integrate their audit tests. C. compares processing output with independently calculated data. D. provides the IS auditor with a tool to analyze a large range of information.
Which of the following will help detect changes made by an intruder to the system log of a server? A. Mirroring of the system log on another server B. Simultaneously duplicating the system log on a write-once disk C. Write protecting the directory containing the system log D. Storing the backup of the system log offsite
An organization is experiencing a growing backlog of undeveloped applications. As part of a plan to eliminate this backlog, end-user computing with prototyping, supported by the acquisition of an interactive application generator system is being introduced. Which of the following areas is MOST critical to the ultimate success of this venture? A. Data control B. Systems analysis C. Systems programming D. Application programming
The review of router access control lists should be conducted during a/an: A. environmental review. B. network security review. C. business continuity review. D. data integrity review.
To meet pre-defined criteria, which of the following continuous audit techniques would BEST identify transactions to audit? A. Systems Control Audit Review File and Embedded Audit Modules (SCARF/EAM) B. Continuous and Intermittent Simulation (CIS) C. Integrated Test Facilities (ITF) D. Audit hooks