The letter "X" is used for multiplication in Excel.
Answer the following statement true (T) or false (F)
False
Computer Science & Information Technology
You might also like to view...
Most PKIs use a web of trust model
Indicate whether the statement is true or false
Computer Science & Information Technology
The internal audit group discovered that unauthorized users are making unapproved changes to various system configuration settings. This issue occurs when previously authorized users transfer from one department to another and maintain the same credentials. Which of the following controls can be implemented to prevent such unauthorized changes in the future?
A. Periodic access review B. Group based privileges C. Least privilege D. Account lockout
Computer Science & Information Technology