Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except

a. gaining access to the output file and changing critical data values
b. using a remote printer and incurring operating inefficiencies
c. making a copy of the output file and using the copy to produce illegal output reports
d. printing an extra hardcopy of the output file

B

Business

You might also like to view...

The least amount of float is found:

A) In a resource-limited schedule. B) After a burst activity. C) On the critical path. D) After a merge activity.

Business

Which of the following is a system that provides iteration management?

A) Microsoft Word B) email attachment C) FTP D) Microsoft SkyDrive

Business