Programs that can run independently and travel from machine
to machine across network connections, with the ability to
destroy data or utilize tremendous computer and
communication resources, are referred to as:
A. trojan horses.
D. logic bombs.
Answers were Sorted based on User's Feedback
Answer / guest
Worms are nonreplicating programs that can run independently
and travel from machine to machine. A trojan horse resembles
a commonly used authorized program that does something
unrelated to its stated or intended purpose causing a
malicious or fraudulent action or event to occur. Viruses
are malicious program code inserted into other executable
code that can self-replicate and spread from computer to
computer. Logic bombs are programmed threats that lie
dormant in commonly used software for an extended period of
time until they are triggered.
|Is This Answer Correct ?||5 Yes||2 No|
Answer / david
|Is This Answer Correct ?||3 Yes||0 No|
Answer / s.m.feroz ahmed
C.Worms and Viruses.
|Is This Answer Correct ?||3 Yes||1 No|
Answer / naani
A - Trojan Horses
|Is This Answer Correct ?||2 Yes||2 No|
Answer / ashutosh
|Is This Answer Correct ?||0 Yes||0 No|
Answer / s.m.feroz ahmed
C.Worms and Viruses.
|Is This Answer Correct ?||0 Yes||2 No|
An IS auditor performing a review of the backup processing facilities should be MOST concerned that: A. adequate fire insurance exists. B. regular hardware maintenance is performed. C. offsite storage of transaction and master files exists. D. backup processing facilities are tested fully.
The PKI element that manages the certificate life cycle, including certificate directory maintenance and certificate revocation list (CRL) maintenance and publication is the: A. certificate authority. B. digital certificate. C. certification practice statement. D. registration authority.
A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy: A. payroll reports should be compared to input forms. B. gross payroll should be recalculated manually. C. checks (cheques) should be compared to input forms. D. checks (cheques) should be reconciled with output reports.
Many IT projects experience problems because the development time and/or resource requirements are underestimated. Which of the following techniques would provide the GREATEST assistance in developing an estimate of project duration? A. Function point analysis B. PERT chart C. Rapid application development D. Object-oriented system development
Which of the following is an example of a passive attack, initiated through the Internet? A. Traffic analysis B. Masquerading C. Denial of service D. E-mail spoofing
An IS auditor should be concerned when a telecommunication analyst: A. monitors systems performance and tracks problems resulting from program changes. B. reviews network load requirements in terms of current and future transaction volumes. C. assesses the impact of the network load on terminal response times and network data transfer rates. D. recommends network balancing procedures and improvements.
Disaster recovery planning addresses the: A. technological aspect of business continuity planning. B. operational piece of business continuity planning. C. functional aspect of business continuity planning. D. overall coordination of business continuity planning.
The act that describes a computer intruder capturing a stream of data packets and inserting these packets into the network as if it were another genuine message stream is called: A. eavesdropping. B. message modification. C. a brute-force attack. D. packet replay.
An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.
Which of the following network configuration options contains a direct link between any two host machines? A. Bus B. Ring C. Star D. Completely connected (mesh)
The process of using interpersonal communication skills to get unauthorized access to company assets is called: A. wire tapping. B. trap doors. C. war dialing. D. social engineering.
Which of the following data validation edits is effective in detecting transposition and transcription errors? A. Range check B. Check digit C. Validity check D. Duplicate check