Match each item with a statement below.
-Malicious program that replicates itself constantly.
A) data custodian
B) Trojan horse
C) integrity
D) back door
E) balance
F) worm
G) accuracy
H) data owner
I) confidentiality
Correct Answer:
Verified
Q23: _ is a technique used to gain
Q24: Match each item with a statement below.
-Component
Q25: _ attacks may involve individuals posing as
Q26: The _ is primarily responsible for advising
Q27: Match each item with a statement below.
-Software
Q29: Match each item with a statement below.
-Responsible
Q30: A(n) _ is an application error that
Q31: Match each item with a statement below.
-Responsible
Q32: In a(n) _ attack, the attacker monitors
Q33: A prolonged increase in power is called
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents