Which of the following is a document that spells out the exact security measures that should be taken with respect to the handling of data exchanged between the parties?

A. service level agreement (SLA)
B. third-party connection agreement (TCA)
C memorandum of understanding (MOM)
D. dynamic data agreement (DDA)


B
Explanation: A third-party connection agreement (TCA) is a document that spells out the exact security measures that should be taken with respect to the handling of data exchanged between the parties. This is a document that should be executed in any instance where a partnership involves depending upon another entity to secure company data.

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the four anomalies that may occur when creating database tables?

A) data redundancy B) update anomaly C) primary anomaly D) insert anomaly E) deletion anomaly

Computer Science & Information Technology

Manipulating data in ________ is preferable to changing data in Access

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Paste Options gallery, you would use the ________ option when you want to keep the destination spreadsheet file's theme without incorporating changes made to the source file

A) Use Destination Theme & Link Data B) Use Destination Theme & Embed Workbook C) Keep Source Formatting & Embed Workbook D) Keep Source Formatting & Link Data

Computer Science & Information Technology

Viruses that perform no explicit malicious behaviors are called bacteria or rabbits. Explain how such seemingly benign viruses can still have negative impacts on computer systems

What will be an ideal response?

Computer Science & Information Technology