
微信扫一扫
实时资讯全掌握
Which of the following statements is most accurate regarding the data security of an on-line computer system protected by an internal user-to-data access control program?
A. Access to data is controlled by restricting specific terminals to specific applications. B. Access to data is controlled by restricting specific applications to specific files. C. The use of this type of access control software will eliminate any significant control weaknesses. D. Security will be dependent upon the controls over the issuance of user ID’s and user authentication. |