Deck 11: Cybersecurity
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/102
Play
Full screen (f)
Deck 11: Cybersecurity
1
________ developed the 10-domain Common Body of Knowledge (CBK)for IT security and controls.
International Information Systems Security Certification Consortium ((ISC)2)
2
What percent of electronic records breached were in the financial services industry?
A)84%
B)89%
C)93%
D)97%
A)84%
B)89%
C)93%
D)97%
C
3
Cybercrimes are crimes connected to what? (Select the best answer)
A)Information assets and IT
B)The financial services industry
C)Electronic payments
D)Electronic transfer of funds
A)Information assets and IT
B)The financial services industry
C)Electronic payments
D)Electronic transfer of funds
A
4
Laws related to cybersecurity originate from legislation, regulations, and case law.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
5
Phishing involves attempts to obtain passwords by sniffing messages sent between computers on the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
6
________ attacks are typically for very small amounts over numerous accounts that accumulate into significant sums.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
7
________ relates to the laws and regulations to prevent, investigate, and prosecute cybercrimes.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
8
________ involves attempts to obtain passwords by sniffing messages sent between computers on the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
9
Personal data, such as home address and credit card number, are stored on hotel card keys.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not part of the 10 domains of cybersecurity?
A)Application Security Domain
B)Database Security Domain
C)Information Security and Risk Management Domain
D)Control Access Domain
A)Application Security Domain
B)Database Security Domain
C)Information Security and Risk Management Domain
D)Control Access Domain
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
11
What percent of the breaches in the financial services industry were tied to organized crime?
A)34%
B)66%
C)84%
D)90%
A)34%
B)66%
C)84%
D)90%
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
12
List the 10 domains that comprise the 10-domain Common body of Knowledge (CBK)?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
13
The IT used in the accounting system can actually create vulnerabilities to cyberattacks of this confidential data.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
14
While dumpster diving is unethical, it may not be illegal.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
15
________ are crimes connected to information assets and IT.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
16
________ refers to rummaging through garbage for discarded documents or digital media.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
17
The civil code, legislation passed by federal or state legislatures specifying civil penalties, is enforced by governmental agencies with monetary penalties and prison sentences.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
18
________ involves collecting, examining, and preserving evidence of cybercrimes.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
19
Dumpster diving attacks involve manipulating and tricking an individual into divulging confidential information to be used for fraudulent purposes.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
20
________ attacks involve manipulating and tricking an individual into divulging confidential information to be used for fraudulent purposes.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
21
In the government sector, unauthorized disclosure of data with this classification might be harmful to national security.
A)Sensitive But Unclassified
B)Top Secret
C)Confidential
D)Secret
A)Sensitive But Unclassified
B)Top Secret
C)Confidential
D)Secret
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
22
________ software are computer programs used for managing computer hardware.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
23
List and define the information sensitivity classifications for the private sector.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
24
What percent of breaches were aided by significant errors?
A)45%
B)67%
C)78%
D)87%
A)45%
B)67%
C)78%
D)87%
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
25
________ architecture consists of computer hardware components and computer software.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
26
List and define the fundamental principles of information security.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
27
Bridges connect LANs of similar or different types to create an intranet.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
28
To understand cybersecurity and how to evaluate whether cybersecurity is adequate for an accounting system, a basic understanding of IT architecture is not needed.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
29
Which legislation requires each federal agency to develop, document, and implement an agency-wide information security program?
A)Employee Privacy Issues
B)Federal Information Security Management Act of 2002 (FISMA)
C)Computer Fraud and Abuse Act
D)Federal Privacy Act of 1974
A)Employee Privacy Issues
B)Federal Information Security Management Act of 2002 (FISMA)
C)Computer Fraud and Abuse Act
D)Federal Privacy Act of 1974
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
30
In the private sector, data with this classification requires higher than normal security measures to ensure data integrity and security.
A)Confidential
B)Sensitive
C)Private
D)Public
A)Confidential
B)Sensitive
C)Private
D)Public
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not part of cyber forensics?
A)Collecting evidence of cyber crime
B)Preserving evidence of cyber crime
C)Examining evidence of cyber crime
D)Prevent cybercrime
A)Collecting evidence of cyber crime
B)Preserving evidence of cyber crime
C)Examining evidence of cyber crime
D)Prevent cybercrime
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
32
Enterprise security architecture studies the enterprise architecture and business environment to develop an overall strategy and plan that best fits enterprise-specific needs.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
33
Wide area networks (WANs)cover a large geographic region, such as the lower Midwest.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
34
It is the first day of your new job as an accounting intern. In the elevator on the way to your cubicle, a gentleman in the elevator (that you later learn is the controller of the company)says to you, "A salami attack." Shaking his head, he repeats, "It sounds more like someone being hit over the head with a sausage. It's just a small amount, so why should we care? You are our new intern, aren't you? Well, why don't you send me an email by this afternoon explaining how what is a salami attack and why we should prevent them."
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
35
Information security consists of the policies and procedures required to secure information assets, including IT hardware, software, and stored data.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
36
What percent of breaches came from within a corporation?
A)20%
B)35%
C)50%
D)68%
A)20%
B)35%
C)50%
D)68%
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
37
Which legislation requires financial institutions to provide customers with privacy notices and prohibits the institutions from sharing customer information with nonaffiliated third parties?
A)Federal Privacy Act of 1974
B)Sarbanes-Oxley
C)Gramm-Leach-Bliley Act
D)Computer Security Act of 1987
A)Federal Privacy Act of 1974
B)Sarbanes-Oxley
C)Gramm-Leach-Bliley Act
D)Computer Security Act of 1987
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
38
List and define information sensitivity classification for governmental sector.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
39
The Internet is a collection of many networks of various types, connecting different LANs
MANs, and WANs together.
MANs, and WANs together.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
40
Application software are computer programs used for managing computer hardware.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
41
Match the network protocol with the appropriate definition.
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Electronic data interchange (EDI)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Electronic data interchange (EDI)
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
42
Match the network protocol with the appropriate definition.
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Transport control protocol (TCP)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Transport control protocol (TCP)
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
43
________ is the electrical transmission of data through analog or digital transmission media.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
44
Match the network protocol with the appropriate definition.
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Internet protocol (IP)
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Internet protocol (IP)
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
45
Which domain covers security for the electrical transmission of data through analog or digital transmission media?
A)Security architecture and design
B)Telecommunications
C)Application security
D)Cryptography
A)Security architecture and design
B)Telecommunications
C)Application security
D)Cryptography
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
46
In IT architecture security, what is not part of the software application ring?
A)Accounting software
B)Web browsers
C)Word processing applications
D)Relational database management system
A)Accounting software
B)Web browsers
C)Word processing applications
D)Relational database management system
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a computer input device?
A)Touch screen
B)Plotter
C)Speakers
D)Flash drive
A)Touch screen
B)Plotter
C)Speakers
D)Flash drive
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
48
________ firewall is a special type of firewall located on a server used to intercept and inspect all incoming messages prior to delivering them to the intended recipients.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
49
Securing computer architecture involves three rings of protection. What is in each ring? Provide examples.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
50
Security of the IT architecture should be considered in which phase of the system development life cycle (SDLC)?
A)All the phases
B)Design phase
C)Install phase
D)Build/purchase phase
A)All the phases
B)Design phase
C)Install phase
D)Build/purchase phase
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
51
What is a microcomputer?
A)A computer with moderate computing power
B)A personal computer or laptop
C)A smart phone
D)A powerful, high-speed computer used for complex numerical calculations
A)A computer with moderate computing power
B)A personal computer or laptop
C)A smart phone
D)A powerful, high-speed computer used for complex numerical calculations
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
52
What are the basic hardware components of a computer?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
53
Which routing device connects the enterprise's intranet to the Internet?
A)Router
B)Bridge
C)Gateway
D)A and C
A)Router
B)Bridge
C)Gateway
D)A and C
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
54
The network administrator must know how to identify potential vulnerabilities and troubleshoot effectively.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
55
Which network protocol (software)is commonly used to connect computers to create a LAN?
A)Internet protocol (IP)
B)Ethernet protocol
C)Electronic data interchange (EDI)
D)Transport control protocol (TCP)
A)Internet protocol (IP)
B)Ethernet protocol
C)Electronic data interchange (EDI)
D)Transport control protocol (TCP)
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
56
What does network hardware include? Please describe each component.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
57
When application software is updated to fix an error or add a new feature, a section of coding called a ________ is inserted into the program.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
58
Network cyberattacks typically target ________ because they offer access to the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
59
Match the network protocol with the appropriate definition.
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Ethernet protocol
A)A software program that provides message transportation services between sending and receiving computers
B)A software program commonly used to connect computers to create a LAN
C)A software program that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines
D)A software program that provides routing services to messages transmitted over the Internet
Ethernet protocol
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
60
Which network protocol (software)allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines?
A)Transport control protocol (TCP)
B)Ethernet protocol
C)Internet protocol (IP)
D)Electronic data interchange (EDI)
A)Transport control protocol (TCP)
B)Ethernet protocol
C)Internet protocol (IP)
D)Electronic data interchange (EDI)
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
61
The physical and environmental security domain addresses
A)Activities and procedures required to keep information technology running securely
B)The physical security of information technology components, such as hardware and software
C)Security for telecommunications, networks, and the Internet
D)Security for access to the enterprise system, including computers, networks, routers, and databases
A)Activities and procedures required to keep information technology running securely
B)The physical security of information technology components, such as hardware and software
C)Security for telecommunications, networks, and the Internet
D)Security for access to the enterprise system, including computers, networks, routers, and databases
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
62
What is a honeypot and why is it used?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
63
Which access control threat are programs or devices that examine traffic on the enterprise network?
A)Password attack
B)Network sniffer
C)Identify theft
D)Spoofing at log-on
A)Password attack
B)Network sniffer
C)Identify theft
D)Spoofing at log-on
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
64
What is point-to-point protocol? How does it unauthorized access to a network?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
65
________ controls ensure that reports and messages reach intended recipients.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
66
The company where you work is opening offices in another state. Because the manager of the new office is determined to keep costs down, she does not want to purchase additional firewall software for the routers and bridges being installed behind the corporate firewall. The IT department has asked you for help. Prepare a memo explaining the need for additional firewalls.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
67
Which authentication method involves analyzing the user's retina?
A)Single sign-on
B)Biometrics
C)Token device
D)Dynamic password
A)Single sign-on
B)Biometrics
C)Token device
D)Dynamic password
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is not a network access point?
A)Keyboard
B)Bridge
C)Computer
D)Router
A)Keyboard
B)Bridge
C)Computer
D)Router
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is not considered a deterrent to the physical access to corporate offices?
A)GPS tracking
B)Locked doors
C)Fences
D)Cameras
A)GPS tracking
B)Locked doors
C)Fences
D)Cameras
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
70
IT security management responsibility includes
A)Developing contingency plans for virus attacks
B)Input/output controls
C)Maintaining security devices and software
D)Training to all employees to inform and educate them regarding security policies and procedures
A)Developing contingency plans for virus attacks
B)Input/output controls
C)Maintaining security devices and software
D)Training to all employees to inform and educate them regarding security policies and procedures
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
71
What is the purpose of installing firewalls on bridges, routers, and gateways?
A)Ensuring unauthorized access to the network
B)Preventing data from moving too quickly over the network
C)Detecting unauthorized access to the network
D)Preventing unauthorized access to the network
A)Ensuring unauthorized access to the network
B)Preventing data from moving too quickly over the network
C)Detecting unauthorized access to the network
D)Preventing unauthorized access to the network
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
72
A honeypot is used to
A)Store the company web site
B)Distract hackers
C)Catch hackers
D)B and C
A)Store the company web site
B)Distract hackers
C)Catch hackers
D)B and C
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
73
________, such as Symantec Enterprise Security Systems, are used to detect the damage caused by intruders and fix the applications.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
74
When an organization wants high traffic on its web site, what type of firewall is used?
A)Proxy firewall
B)Medium-level security firewall
C)Low-level security firewall
D)High-level security firewall
A)Proxy firewall
B)Medium-level security firewall
C)Low-level security firewall
D)High-level security firewall
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
75
A ________ is a hardware device containing a password generator protocol that creates a new password each time the token is used.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
76
Match the malware with the appropriate definition.
A)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
B)Similar to a virus except it does not need a host application to function or reproduce
C)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
D)Software executes when a specified event happens within the computer
E)A relatively small program that infects other application software by attaching to it and disrupting application function
Worms
A)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
B)Similar to a virus except it does not need a host application to function or reproduce
C)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
D)Software executes when a specified event happens within the computer
E)A relatively small program that infects other application software by attaching to it and disrupting application function
Worms
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
77
Operations security refers to
A)Security for access to the enterprise system, including computers, networks, routers, and databases
B)Security for telecommunications, networks, and the Internet
C)The physical security of information technology components, such as hardware and software
D)Activities and procedures required to keep information technology running securely
A)Security for access to the enterprise system, including computers, networks, routers, and databases
B)Security for telecommunications, networks, and the Internet
C)The physical security of information technology components, such as hardware and software
D)Activities and procedures required to keep information technology running securely
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
78
Match the malware with the appropriate definition.
A)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
B)Similar to a virus except it does not need a host application to function or reproduce
C)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
D)Software executes when a specified event happens within the computer
E)A relatively small program that infects other application software by attaching to it and disrupting application function
Bots
A)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
B)Similar to a virus except it does not need a host application to function or reproduce
C)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
D)Software executes when a specified event happens within the computer
E)A relatively small program that infects other application software by attaching to it and disrupting application function
Bots
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
79
Physical security frameworks are useful to provide guidance on how to secure the physical facilities, grounds, and IT assets.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
80
Match the malware with the appropriate definition.
A)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
B)Similar to a virus except it does not need a host application to function or reproduce
C)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
D)Software executes when a specified event happens within the computer
E)A relatively small program that infects other application software by attaching to it and disrupting application function
Viruses
A)Tiny piece(s)of programming code that install themselves on the infected computer called a Zombie
B)Similar to a virus except it does not need a host application to function or reproduce
C)Code is disguised as a legitimate program, that can be downloaded and installed by users without realizing it is malware
D)Software executes when a specified event happens within the computer
E)A relatively small program that infects other application software by attaching to it and disrupting application function
Viruses
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck