The greatest threat to business security is often internal rather than external.
A). True
B). False
A transaction log shows before and after images of records that have been modified by transactions.
A). True
B). False
Authorization tables contain highly sensitive data and should be protected by stringent security rules.
A). True
B). False
Failure to control confidentiality may lead to loss of competitiveness.
A). True
B). False
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
A). True
B). False