Question 121

Software is considered malware based on:
  • Question 122

    .Function Point Analysis (FPA) provides an estimate of the size of an information system based only on the number and complexity of a system's inputs and outputs. True or false?
  • Question 123

    Which of the following technique is NOT used by a preacher against a Private Branch Exchange (PBX)?
  • Question 124

    During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
  • Question 125

    Sign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that in many cases the username and password are the same. The BEST control to mitigate this risk is to: