Multiple Choice
Which method is most likely to detect unauthorized access to the system?
A) message transaction log
B) data encryption standard
C) vertical parity check
D) request-response technique
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q85: Briefly define an operating system.
Q86: Firewalls are<br>A)special materials used to insulate computer
Q87: Audit objectives for communications controls include all
Q88: What is event monitoring?
Q89: The database attributes that individual users have
Q90: Network communication poses some special types of
Q91: The most frequent victims of program viruses
Q93: Public key encryption<br>A)uses one key for encoding
Q94: Firewalls are special materials used to insulate
Q95: When auditors examine and test the call-back