An existing system is being extensively enhanced by
extracting and reusing design and program components. This
is an example of:

A. reverse engineering.

B. prototyping.

C. software reuse.

D. reengineering.

Answers were Sorted based on User's Feedback



An existing system is being extensively enhanced by extracting and reusing design and program compo..

Answer / guest

Answer: D

Old (legacy) systems that have been corrected, adapted and
enhanced extensively require reengineering to continue to be
maintainable. Reengineering is a rebuilding activity to
incorporate new technologies into existing systems. Using
program language statements, reverse engineering involves
reversing a program's machine code into the source code in
which it was written to identify malicious content in a
program such as a virus, or to adapt a program written for
use with one processor for use with a differently designed
processor. Prototyping is development of a system through
controlled trial and error. Software reuse is the process of
planning, analyzing and using previously developed software
components. The reusable components are integrated into the
current software product systematically.

Is This Answer Correct ?    5 Yes 1 No

An existing system is being extensively enhanced by extracting and reusing design and program compo..

Answer / kasturi

Answer D. Reverse engineering is done on the exisitng system
to understand its logic and design. Reengineering is to
rebuild it after the incorporating this understanding into
the new system.Since the question states existing system is
being enhanced by reusing design, this is an example of
reengineering, using reverse engineering.

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CISA Certification Interview Questions

The MAJOR advantage of the risk assessment approach over the baseline approach to information security management is that it ensures: A. information assets are over protected. B. a basic level of protection is applied regardless of asset value. C. appropriate levels of protection are applied to information assets. D. an equal proportion of resources are devoted to protecting all information assets.

1 Answers  


When a complete segregation of duties cannot be achieved in an online system environment, which of the following functions should be separated from the others? A. Origination B. Authorization C. Recording D. Correction

1 Answers  


Which of the following can identify attacks and penetration attempts to a network? A. Firewall B. Packet filters C. Stateful inspection D. Intrusion detection system (IDs)

1 Answers  


Which of the following is the basic objective of a control self-assessment program?

4 Answers  


To reduce the possibility of losing data during processing, the FIRST point at which control totals should be implemented is: A. during data preparation. B. in transit to the computer. C. between related computer runs. D. during the return of the data to the user department.

2 Answers  






Which of the following is an object-oriented technology characteristic that permits an enhanced degree of security over data? A. Inheritance B. Dynamic warehousing C. Encapsulation D. Polymorphism

1 Answers  


Which of the following IS functions may be performed by the same individual, without compromising on control or violating segregation of duties? A. Job control analyst and applications programmer B. Mainframe operator and system programmer C. Change/problem and quality control administrator D. Applications and system programmer

4 Answers  


During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that: A. assessment of the situation may be delayed. B. execution of the disaster recovery plan could be impacted. C. notification of the teams might not occur. D. potential crisis recognition might be delayed.

1 Answers  


There are several methods of providing telecommunications continuity. The method of routing traffic through split cable or duplicate cable facilities is: A. alternative routing. B. diverse routing. C. long-haul network diversity. D. last mile circuit protection.

1 Answers  


Which of the following is a role of an IS steering committee? A. Initiate computer applications. B. Ensure efficient use of data processing resources. C. Prepare and monitor system implementation plans. D. Review the performance of the systems department.

1 Answers  


When reviewing an organization's logical access security, which of the following would be of the MOST concern to an IS auditor? A. Passwords are not shared. B. Password files are encrypted. C. Redundant logon IDs are deleted. D. The allocation of logon IDs is controlled.

1 Answers  


IS auditors who have participated in the development of an application system might have their independence impaired if they: A. perform an application development review. B. recommend control and other system enhancements. C. perform an independent evaluation of the application after its implementation. D. are involved actively in the design and implementation of the application system.

3 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)