Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except

A. gaining access to the output file and changing critical data values
B. using a remote printer and incurring operating inefficiencies
C. making a copy of the output file and using the copy to produce illegal output reports
D. printing an extra hardcopy of the output file

Answer: B

Computer Science & Information Technology

You might also like to view...

The term blog is derived from the phrase ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Telecommunications Act of 1996 allows for collection and use of "empty" communications, which means nonverbal and nontext communications, such as GPS information.

a. true b. false

Computer Science & Information Technology