All of the following tests of controls will provide evidence that access to the data files is limited except

A. inspecting biometric controls
B. reconciling program version numbers
C. comparing job descriptions with access privileges stored in the authority table
D. attempting to retrieve unauthorized data via inference queries


Answer: B

Computer Science & Information Technology

You might also like to view...

The default implementation of method ToString of Object returns a String representing ________.

a. the object’s type b. the object class name c. namespace_name.object_class_name d. None of the above

Computer Science & Information Technology

When method printf requires multiple arguments, the arguments are separated with ________.

a. colons (:). b. semicolons (;). c. commas (,). d. periods (.).

Computer Science & Information Technology

A(n) ________ is used to display webpages and navigate the Internet

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can think of the DOM as a hierarchical arrangement of the content of an HTML document into a tree-like structure, which is known as a DOM root. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology