Match each term with the correct statement below.
-Determines what an individual can do in the system
A) Rootkit
B) File virus
C) Logic bomb
D) Authentication
E) Spam"
F) Macro viruses
G) Trojan horse
H) Phishing
I) Authorization
Correct Answer:
Verified
Q30:
Match each term with the correct statement
Q31: Generally speaking,the weakest link in setting up
Q32: _ is the default authentication protocol used
Q33: A(n)_ is a program that replicates by
Q34: As part of the authentication process,rather than
Q36: As a part of managing the security
Q37: As a defensive and offensive measure to
Q38: In the computer arena,_ is the practice
Q39: A _ virus is a combination of
Q40: A _ is a small program contained
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents