A. | system security monitor |
B. | software piracy |
C. | facility controls |
D. | fault tolerant |
Option: A Explanation : Click on Discuss to view users comments. |
A. | controls for end user computing |
B. | audit trade |
C. | auditing information systems |
D. | firewall |
Option: D Explanation : Click on Discuss to view users comments. |
Scrambling data during its transmission for
A. | encryption |
B. | control totals |
C. | disaster recovery |
D. | biometric controls |
Option: A Explanation : Click on Discuss to view users comments. |