Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except
a. gaining access to the output file and changing critical data values
b. using a remote printer and incurring operating inefficiencies
c. making a copy of the output file and using the copy to produce illegal output reports
d. printing an extra hardcopy of the output file
B
Business
You might also like to view...
The least amount of float is found:
A) In a resource-limited schedule. B) After a burst activity. C) On the critical path. D) After a merge activity.
Business
Which of the following is a system that provides iteration management?
A) Microsoft Word B) email attachment C) FTP D) Microsoft SkyDrive
Business