A) transaction authorization and validation
B) access controls
C) EDI audit trail
D) all of the above
Correct Answer
verified
Multiple Choice
A) antivirus software
B) database authorization table
C) passwords
D) voice prints
Correct Answer
verified
Essay
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) special materials used to insulate computer facilities
B) a system that enforces access control between two networks
C) special software used to screen Internet access
D) none of the above
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) value added networks can compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed
Correct Answer
verified
Multiple Choice
A) biometric controls
B) encryption controls
C) backup controls
D) inference controls
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) inspecting biometric controls
B) reconciling program version numbers
C) comparing job descriptions with access privileges stored in the authority table
D) attempting to retrieve unauthorized data via inference queries
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) message transaction log
B) data encryption standard
C) vertical parity check
D) request-response technique
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) checkpoint
B) backup database
C) transaction log
D) database authority table
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) spoofing.
B) spooling.
C) dual-homed.
D) screening.
Correct Answer
verified
Multiple Choice
A) Trojan horse
B) Worm
C) logic bomb
D) none of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) detection and correction of message loss due to equipment failure
B) prevention and detection of illegal access to communication channels
C) procedures that render intercepted messages useless
D) all of the above
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 96
Related Exams