Risk exposures associated with creating an output file as an intermediate step in the printing process (spooling) include all of the following actions by a computer criminal except
A) gaining access to the output file and changing critical data values
B) using a remote printer and incurring operating inefficiencies
C) making a copy of the output file and using the copy to produce illegal output reports
D) printing an extra hardcopy of the output file
Correct Answer:
Verified
Q81: Which input control check would detect a
Q84: Which of the following is an example
Q84: The employee entered "40" in the "hours
Q85: Which of the following is an example
Q85: Which statement is not correct? The goal
Q86: Which of the following is correct?
A) check
Q87: Which input control check would detect a
Q88: An example of a hash total is
A)total
Q91: Which statement is not true? A batch
Q91: Supervision is often called a(n)_ control.
A)access
B)verification
C)compensating
D)input
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents