Multiple Choice
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
A) logic bomb
B) proxy server
C) firewall
D) backdoor
Correct Answer:

Verified
Correct Answer:
Verified
Q106: Which federal law requires IT professionals to
Q107: Which of the following is not considered
Q108: Application-filtering firewalls are less expensive than packet-filtering
Q109: A level 3 security system focuses on
Q110: A _ is a type of an
Q112: The Committee on National Security Systems (CNSS)proposed
Q113: In the event of disaster, organizations should
Q114: _ is a type of data encryption
Q115: A hot site, an alternative site to
Q116: _ is a computer crime that involves