Sometimes computer programs are used to commit acts of sabotage.A destructive program masquerading as a legitimate one is called a
A) logic bomb.
B) worm.
C) virus.
D) Trojan horse.
Correct Answer:
Verified
Q88: A weakness in an information security system
Q89: An intruder who intercepts legitimate information and
Q90: In an information security system,security measures focus
Q91: When the qualitative approach to risk assessment
Q92: Which group of people listed below would
Q94: The most important personnel policy and practice
Q95: The method used in most cases of
Q96: Within the health-care sector the _ _
Q97: A significant benefit of the quantitative approach
Q98: Which individual listed below is placed in
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents