Multiple Choice
The risk of unauthorized access to data through electronic eavesdropping is minimized by using:
A) Data encryption
B) Routing verification procedures
C) Message acknowledgement procedures
D) EDC
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q65: Control totals are used as a basic
Q66: A technique for controlling identification numbers (part
Q67: We can classify IT controls based on
Q68: A Disaster Recovery Plan is primarily operational
Q69: We can classify IT-related controls based on
Q71: An effective control for maintaining the privacy
Q72: In an online, real-time system, which of
Q73: Check digits have which of the following
Q74: Because of the integrative nature of database
Q75: Which of the following is not a