Multiple Choice
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.
A) Software
B) Administrative
C) Data security
D) Implementation
E) Input
Correct Answer:

Verified
Correct Answer:
Verified
Q12: Name and describe four firewall screening technologies.
Q23: Most computer viruses deliver a:<br>A)worm.<br>B)Trojan horse.<br>C)driveby download.<br>D)keylogger.<br>E)payload.
Q48: Which of the following statements about botnets
Q50: An acceptable use policy defines the acceptable
Q51: Application controls:<br>A)can be classified as input controls,processing
Q54: The term cracker is used to identify
Q59: The Gramm-Leach-Bliley Act:<br>A)requires financial institutions to ensure
Q62: Which of the following statements about passwords
Q69: Sniffers enable hackers to steal proprietary information
Q90: How does disaster recovery planning differ from