Multiple Choice
Controls designed to restrict access and activities are called:
A) schemas.
B) business rules.
C) encryption controls.
D) authorization rules.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q126: Explain what primary, secondary and unique key
Q127: Guidelines for server security should include all
Q128: An appropriate datatype for adding a sound
Q129: One field or combination of fields for
Q130: The restore/rerun technique involves reprocessing the day's
Q132: Discuss coding techniques and how they could
Q133: Requirements for response time, data security, backup,
Q134: What is a journalizing facility?
Q135: A file organization is a named portion
Q136: All of the following are advantages to