Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) a complete audit trail of EDI transactions is maintained
D) backup procedures are in place and functioning properly
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) antivirus software
B) database authorization table
C) passwords
D) voice prints
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) spoofing
B) spooling
C) dual-homing
D) screening
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) authorized trading partners have access only to approved data
D) a complete audit trail is maintained
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) verifying that the security group monitors and reports on fault tolerance violations
B) confirming that backup procedures are adequate
C) ensuring that authorized users access only those files they need to perform their duties
D) verifying that unauthorized users cannot access data files
Correct Answer
verified
Multiple Choice
A) echo check
B) encryption
C) vertical parity bit
D) horizontal parity bit
Correct Answer
verified
Multiple Choice
A) logic bomb
B) Trojan horse
C) worm
D) back door
Correct Answer
verified
Multiple Choice
A) operating system
B) database management system
C) utility system
D) facility system
Correct Answer
verified
Showing 21 - 40 of 95
Related Exams