Question

In: Computer Science

Which of the following would be the MOST effective countermeasure against malicious programming that rounds down...

Which of the following would be the MOST effective countermeasure against malicious programming that rounds down transaction amounts and transfers them to
the perpetrator’s account?

A. Ensure that proper controls exist for code review and release management
B. Set up an agent to run a virus-scanning program across platforms
C. Implement controls for continuous monitoring of middleware transactions
D. Apply the latest patch programs to the production operating systems

Correct Answer: A?????? or C??????

______________________

Note

■ Some experts claim that the correct answer is: "A. Ensure that proper controls exist for code review and release management"

■ Other experts claim that the correct answer is: "C. Implement controls for continuous monitoring of middleware transactions"

■ In my point of view, the best should be "A. Ensure that proper controls exist for code review and release management". For me the reply "C. Implement controls for continuous monitoring of middleware transactions" is "Mission Impossible!". A middleware should know the details of current accounts, rather than do its job as an intermediary over the parties. VERY STRANGE??!?!?!? OR NOT?!?!?!?!?

■ What do you think about that? Please explains: Why A and not C......or.......Why C and not A

Many thanks!

Solutions

Expert Solution

When someone uses a web application the defects in programming which is implemented on the client-side and server side can lead to vulnerabilities in websites. Now the client-side validations which are performed at the user browser are ineffective in preventing the attacks by an attacker since they can be easily bypassed by an attacker. The applications implement most of the validation at the client-side so that it provides good user experience and the server can also process requests faster as most of the computation is done at the client-side. To tackle this problem developers should alse verify the data submitted by the client at server-side for some malicious input. Doing this can prevent attack to some extent. So the option for the problem so should be (A). The other option (C) uses the middle ware which has other tasks to do and manage many things and also require tracking of users.


Related Solutions

Which of the following steps would be necessary to determine the most effective antibiotic for a...
Which of the following steps would be necessary to determine the most effective antibiotic for a bacterial infection using the Disk Diffusion Assay? Select three necessary steps and three unnecessary or incorrect steps, and explain why it is or is not necessary/correct. Collect a sample of bacteria from the infected patient. Collect samples of bacteria from the bathroom taps in the patient’s room. Collect samples of bacteria from other patients who seem to have the same infection. Soak disks in...
[Auditing] 3. Which of the following controls would be most effective in detecting a misstatement of...
[Auditing] 3. Which of the following controls would be most effective in detecting a misstatement of the completeness assertion with respect to accounts payable? a. A list of outstanding checks written to vendors is generated during the preparation of the monthly bank reconciliation. b. Purchase orders must be accompanied by properly approved purchase requisitions before they are submitted to vendors. c. The AIS purchases and disbursements application will not prepare a check to a supplier without a valid ID number...
Which internal control procedure would be most effective in dealing with the following threats? (a) Receiving-dock...
Which internal control procedure would be most effective in dealing with the following threats? (a) Receiving-dock personnel steal inventory and then claim the inventory was sent to the warehouse. (b) A company is late in paying a particular invoice. Consequently, a second invoice is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid.   (c) The petty cash custodian confesses to having “borrowed” $12,000 over the last five years.    (d)...
Which of the following would likely be considered Congress's greatest (most effective, impacting and significant) power?...
Which of the following would likely be considered Congress's greatest (most effective, impacting and significant) power? A. Its power to coin money. B. Its power to establish immigration laws C. Its power to set up post offices D. Its "power of the purse"
Predict which of the following would be the most effective anti-freeze, assuming equal weight of each...
Predict which of the following would be the most effective anti-freeze, assuming equal weight of each are used: methyl alcohol(CH3OH) ; sucrose(C12H22O11); ethyl alcohol (C2H5OH); ethylene glycol ( C2H4(OH)2). Explain your choise!
33. Which of the following would be most effective in a small owner/manager-operated business? a.cost centers...
33. Which of the following would be most effective in a small owner/manager-operated business? a.cost centers b.investment centers c.profit centers d.centralization 30. The following data relate to direct labor costs for March: Rate: standard, $12.00; actual, $12.25 Hours: standard, 18,500; actual, 17,955 Units of production: 9,450 The direct labor time variance is a.$2,362.50 unfavorable b.$6,540.00 unfavorable c.$2,362.50 favorable d.$6,540.00 favorable 29. The following data relate to direct materials costs for February: Materials cost per yard: standard, $1.94; actual, $2.05 Yards...
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats?...
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats? A purchasing agent orders materials from a supplier that he partially owns. Receiving-dock personnel steal inventory and then claim the inventory was sent to the warehouse. An unordered supply of laser printer paper delivered to the office is accepted and paid for because the “price is right.” After all of the laser printers are jammed, however, it becomes obvious that the “bargain” paper is...
1. Which of the following is the most effective goal? a. Add a new product to...
1. Which of the following is the most effective goal? a. Add a new product to the company's product line. b. Improve market share by 3 percent. c. Retain 75 percent of employees. d. Become the market share leader by 2020. 2. What do we call the number of employees that a manager supervises? a. centralized organization b. line organization c. organization chart d. span of control 3. ..........theory proposes that perceptions of fairness directly affect worker motivation; SelectMaslow's hierarchy...
Which of the following would be most detrimental for cellular respiration? That is, which one would...
Which of the following would be most detrimental for cellular respiration? That is, which one would result in the greatest reduction in the number of ATP molecules being generated? Select one: a. A strong reducing agent which is only active in the inter-membrane space of mitochondria b. A strong oxidizing agent which is only active in the mitochondrial matrix c. A strong reducing agent which can enter the cytoplasm but not the mitochondrial matrix d. A strong oxidizing agent which...
Suppose the Republic of Controllistan is hit by an epidemic against which masks are effective. As...
Suppose the Republic of Controllistan is hit by an epidemic against which masks are effective. As demand surges, the price of masks goes up too (suppliers are slow to respond). Troubled by this development, the President of Controllistan decides to impose a cap on the price of masks, setting the price of masks much lower than the current equilibrium price. Use simple demand and supply diagram to illustrate the consequences of the price cap and comment briefly.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT