Question: Answer is complete but not entirely correct. 1 . _ _ _ _ _ _ _ _ _ _ _ may be used to mitigate

Answer is complete but not entirely correct.
1.___________ may be used to mitigate the risk of unauthorized access in computer operations.
Password systemsselected answer incorrect
2.____________ may be used to mitigate the risk of unauthorized changes to computer programs.
Controls over accessselected answer correct
3. Backup copies may be used to mitigate the risk of ____________. destruction of dataselected answer correct
4.____________ may be used to mitigate the risk of viruses in electronic commerce. Firewallsselected answer correct
5.____________ may be used to mitigate unauthorized access to programs. Testing of user applicationsselected answer incorrect

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!