Multiple Choice
Information security procedures protect information integrity by
A) preventing fictitious transactions.
B) reducing the system cost.
C) making the system more efficient.
D) making it impossible for unauthorized users to access the system.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q90: Kuzman Jovan called a meeting of the
Q91: The security technology that evaluates IP packet
Q92: _ is/are an example of a preventive
Q93: Which of the following is not a
Q94: Multi-factor authentication<br>A)involves the use of two or
Q95: This protocol specifies the procedures for dividing
Q96: There are "white hat" hackers and "black
Q98: Describe what a man-trap is and how
Q99: Which of the below keeps a record
Q100: Which of the following is not one