A software program that replicates itself in areas of idle memory until the system fails is called a
A) Trojan horse
B) worm
C) logic bomb
D) none of the above
Correct Answer:
Verified
Q34: Electronic data interchange customers may be given
Q35: Passwords are secret codes that users enter
Q36: Which is not a biometric device?
A)password
B)retina prints
C)voice
Q37: Malicious and destructive programs cause millions of
Q38: Audit trails cannot be used to
A)detect unauthorized
Q40: Which of the following is considered an
Q41: In an electronic data interchange environment,customers routinely
Q42: When auditors examine and test the call-back
Q43: All of the following techniques are used
Q44: Many techniques exist to reduce the likelihood
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents