A. | controls for end user computing |
B. | audit trade |
C. | auditing information systems |
D. | firewall |
Option: D Explanation : Click on Discuss to view users comments. |
Scrambling data during its transmission for
A. | encryption |
B. | control totals |
C. | disaster recovery |
D. | biometric controls |
Option: A Explanation : Click on Discuss to view users comments. |
A. | security codes |
B. | network security |
C. | ethical philosophies |
D. | ethical models |
Option: C Explanation : Click on Discuss to view users comments. |