Which of the following is a document that spells out the exact security measures that should be taken with respect to the handling of data exchanged between the parties?
A. service level agreement (SLA)
B. third-party connection agreement (TCA)
C memorandum of understanding (MOM)
D. dynamic data agreement (DDA)
B
Explanation: A third-party connection agreement (TCA) is a document that spells out the exact security measures that should be taken with respect to the handling of data exchanged between the parties. This is a document that should be executed in any instance where a partnership involves depending upon another entity to secure company data.
You might also like to view...
Which of the following is not one of the four anomalies that may occur when creating database tables?
A) data redundancy B) update anomaly C) primary anomaly D) insert anomaly E) deletion anomaly
Manipulating data in ________ is preferable to changing data in Access
Fill in the blank(s) with correct word
In the Paste Options gallery, you would use the ________ option when you want to keep the destination spreadsheet file's theme without incorporating changes made to the source file
A) Use Destination Theme & Link Data B) Use Destination Theme & Embed Workbook C) Keep Source Formatting & Embed Workbook D) Keep Source Formatting & Link Data
Viruses that perform no explicit malicious behaviors are called bacteria or rabbits. Explain how such seemingly benign viruses can still have negative impacts on computer systems
What will be an ideal response?