Programs that can run independently and travel from machine
to machine across network connections, with the ability to
destroy data or utilize tremendous computer and
communication resources, are referred to as:
A. trojan horses.
B. viruses.
C. worms.
D. logic bombs.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Worms are nonreplicating programs that can run independently
and travel from machine to machine. A trojan horse resembles
a commonly used authorized program that does something
unrelated to its stated or intended purpose causing a
malicious or fraudulent action or event to occur. Viruses
are malicious program code inserted into other executable
code that can self-replicate and spread from computer to
computer. Logic bombs are programmed threats that lie
dormant in commonly used software for an extended period of
time until they are triggered.
| Is This Answer Correct ? | 10 Yes | 2 No |
Answer / yashika verma
The newer is option C.
Worms are independent and replicates in a network.
Viruses need a host and trojan horses are installed by Worms.
Hope this answer works!
| Is This Answer Correct ? | 0 Yes | 0 No |
Which of the following is an output control objective? A. Maintenance of accurate batch registers B. Completeness of batch processing C. Appropriate accounting for rejections and exceptions D. Authorization of file updates
Which of the following statements relating to packet switching networks is CORRECT? A. Packets for a given message travel the same route. B. Passwords cannot be embedded within the packet. C. Packet lengths are variable and each packet contains the same amount of information. D. The cost charged for transmission is based on packet, not distance or route traveled.
1 Answers Karura Community Chapel,
Which of the following testing methods is MOST effective during the initial phases of prototyping? A. System B. Parallel C. Volume D. Top-down
When auditing security for a data center, an IS auditor should look for the presence of a voltage regulator to ensure that the: A. hardware is protected against power surges. B. integrity is maintained if the main power is interrupted. C. immediate power will be available if the main power is lost. D. hardware is protected against long-term power fluctuations.
In planning an audit, the MOST critical step is the identification of the:
Which of the following is a threat? A. Lack of security B. Loss of goodwill C. Power outage D. Information services
In a small organization, where segregation of duties is not practical, an employee performs the function of computer operator and application programmer. Which of the following controls should the IS auditor recommend? A. Automated logging of changes to development libraries B. Additional staff to provide segregation of duties C. Procedures that verify that only approved program changes are implemented D. Access controls to prevent the operator from making program modifications
Which of the following functions should be performed by the application owners to ensure an adequate segregation of duties between IS and end users? A. System analysis B. Authorization of access to data C. Application programming D. Data administration
Which of the following Internet security threats could compromise integrity? A. Theft of data from the client B. Exposure of network configuration information C. A trojan horse browser D. Eavesdropping on the net
Which of the following is the MOST important function to be performed by IS management when a service has been outsource? A. Ensuring that invoices are paid to the provider B. Participating in systems design with the provider C. Renegotiating the provider's fees D. Monitoring the outsourcing provider's performance
Which of the following is the basic objective of a control self-assessment program?
Which of the following controls will detect MOST effectively the presence of bursts of errors in network transmissions? A. Parity check B. Echo check C. Block sum check D. Cyclic redundancy check