Multiple Choice
A control that limits the risk of network break-ins is the coding of data that makes data unreadable to those without the appropriate key.This process does not stop the breaches, but will make the data useless.
A) Encryption
B) Encoding
C) Repudiation
D) Hacking
Correct Answer:

Verified
Correct Answer:
Verified
Q32: The preparation of deposit slips on prenumbered
Q33: This type of highly integrated IT system
Q34: Bank reconciliation tasks include:<br>A)Procedures to ensure that
Q35: Input controls in an IT system that
Q36: The purposeful and organized changing of business
Q38: In the cash receipts process, what must
Q39: Which of the following would represent proper
Q40: In following proper segregation of duties, those
Q41: This type of highly integrated IT system,
Q42: An example of an independent verification in