Multiple Choice
The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:
A) Intrusion detection
B) Virus management
C) Vulnerability assessment
D) Penetration testing
Correct Answer:

Verified
Correct Answer:
Verified
Q27: The software that controls the basic input
Q28: Which programmed input validation check determines whether
Q29: The IT Governance Committee has several important
Q30: The risk that an unauthorized user would
Q31: The software that accomplishes end user tasks
Q33: Nonrepudiation means that:<br>A)A user is not authorized
Q34: This encryption method, used with wireless network
Q35: The IT system includes this type of
Q36: AICPA Trust Principles describe five categories of
Q37: This form of encryption uses a single