The primary way to prevent active threats concerning fraud and sabotage is to implement successive layers of access controls.The second step behind the layered approach to access control is to
A) prevent unauthorized access to both data and program files.
B) physically separate unauthorized individuals from computer resources.
C) classify all data and equipment according to their importance and vulnerability.
D) keep unauthorized users from using the system.
Correct Answer:
Verified
Q98: Which individual listed below is placed in
Q99: An extremely risk-seeking perpetrator
A) will offer his
Q100: Sometimes computer programs are used to commit
Q101: General security procedures are essential in Internet
Q102: Controls can be designed to provide a
Q104: The type of backup which avoids the
Q105: An example of a fault tolerance at
Q106: The best general security procedure is
A) to
Q107: The primary way to prevent active threats
Q108: A Trojan horse program placed on one
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents