Multiple Choice
A process or procedure in an IT system to ensure that the person accessing the IT system is valid and authorized is called:
A) Hacking and other network break-ins
B) Physical environment and physical security
C) Authentication of users and limiting unauthorized access
D) Organizational structure
Correct Answer:

Verified
Correct Answer:
Verified
Q39: In entering client contact information in the
Q40: Which of the following URL's would indicate
Q41: This type of control is intended to
Q42: The procedures to collect and prepare source
Q43: To avoid the risks associated with a
Q45: Management of an internet retail company is
Q46: A self-replicating piece of program code that
Q47: The data preparation procedures are to be
Q48: Which of the following is NOT one
Q49: A proactive program for considering risks to