Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except
A. gaining access to the output file and changing critical data values
B. using a remote printer and incurring operating inefficiencies
C. making a copy of the output file and using the copy to produce illegal output reports
D. printing an extra hardcopy of the output file
Answer: B
Computer Science & Information Technology
You might also like to view...
The term blog is derived from the phrase ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The Telecommunications Act of 1996 allows for collection and use of "empty" communications, which means nonverbal and nontext communications, such as GPS information.
a. true b. false
Computer Science & Information Technology