An existing system is being extensively enhanced by
extracting and reusing design and program components. This
is an example of:
A. reverse engineering.
B. prototyping.
C. software reuse.
D. reengineering.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Old (legacy) systems that have been corrected, adapted and
enhanced extensively require reengineering to continue to be
maintainable. Reengineering is a rebuilding activity to
incorporate new technologies into existing systems. Using
program language statements, reverse engineering involves
reversing a program's machine code into the source code in
which it was written to identify malicious content in a
program such as a virus, or to adapt a program written for
use with one processor for use with a differently designed
processor. Prototyping is development of a system through
controlled trial and error. Software reuse is the process of
planning, analyzing and using previously developed software
components. The reusable components are integrated into the
current software product systematically.
| Is This Answer Correct ? | 5 Yes | 1 No |
Answer / kasturi
Answer D. Reverse engineering is done on the exisitng system
to understand its logic and design. Reengineering is to
rebuild it after the incorporating this understanding into
the new system.Since the question states existing system is
being enhanced by reusing design, this is an example of
reengineering, using reverse engineering.
| Is This Answer Correct ? | 0 Yes | 2 No |
An IS auditor attempting to determine whether access to program documentation is restricted to authorized persons would MOST likely: A. evaluate the record retention plans for off-premises storage. B. interview programmers about the procedures currently being followed. C. compare utilization records to operations schedules. D. review data file access records to test the librarian function.
Utilizing audit software to compare the object code of two programs is an audit technique used to test program: A. logic. B. changes. C. efficiency. D. computations.
IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that: A. a substantive test would be too costly. B. the control environment is poor. C. inherent risk is low. D. control risks are within the acceptable limits.
A referential integrity constraint consists of: A. ensuring the integrity of transaction processing. B. ensuring that data are updated through triggers. C. ensuring controlled user updates to database. D. rules for designing tables and queries.
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan: A. incorporates state of the art technology. B. addresses the required operational controls. C. articulates the IT mission and vision. D. specifies project management practices.
Which of the following findings would an IS auditor be MOST concerned about when performing an audit of backup and recovery and the offsite storage vault? A. There are three individuals with a key to enter the area. B. Paper documents also are stored in the offsite vault. C. Data files, which are stored in the vault, are synchronized. D. The offsite vault is located in a separate facility.
Which of the following is the basic objective of a control self-assessment program?
Which of the following is the MOST reasonable option for recovering a noncritical system? A. Warm site B. Mobile site C. Hot site D. Cold site
Which of the following provides the GREATEST assurance of message authenticity? A. The pre-hash code is derived mathematically from the message being sent. B. The pre-hash code is encrypted using the sender's private key. C. Encryption of the pre-hash code and the message using the secret key. D. Sender attains the recipient's public key and verifies the authenticity of its digital certificate with a certificate authority.
When a PC that has been used for the storage of confidential data is sold on the open market the: A. hard disk should be demagnetized. B. hard disk should be mid-level formatted.s C. data on the hard disk should be deleted. D. data on the hard disk should be defragmented.
The act that describes a computer intruder capturing a stream of data packets and inserting these packets into the network as if it were another genuine message stream is called: A. eavesdropping. B. message modification. C. a brute-force attack. D. packet replay.
The responsibilities of a disaster recovery relocation team include: A. obtaining, packaging and shipping media and records to the recovery facilities, as well as establishing and overseeing an offsite storage schedule. B. locating a recovery site if one has not been predetermined and coordinating the transport of company employees to the recovery site. C. managing the relocation project and conducting a more detailed assessment of the damage to the facilities and equipment. D. coordinating the process of moving from the hot site to a new location or to the restored original location.