Multiple Choice
Of the following actions or events that can result in a breach of data security, the one that is not necessarily deliberate is ____.
A) unauthorized computer access
B) intercepting data communications
C) spreading computer viruses
D) stealing disks or computers
E) damaging computer hardware
Correct Answer:

Verified
Correct Answer:
Verified
Q37: In the "mirrored databases" backup and recovery
Q38: Backward recovery is an alternative to forward
Q39: Recommended places to locate a mainframe computer
Q40: In Secure Socket Layer (SSL) technology on
Q41: With the combination of the logical view
Q43: Damaged hardware can result in unusable or
Q44: Locks should never be used because of
Q45: The combination of views and the SQL
Q46: All of the following are types of
Q47: All of the following are true about