Multiple Choice
An employee can pose an internal threat by entering false or fraudulent data into a computer,or changing or deleting existing data.This called _________.
A) data mining
B) data tampering
C) ransomware
D) a remote-access Trojan
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q20: The principle of _ acknowledges that the
Q21: _ are designed to monitor network traffic
Q22: A business impact analysis estimates the consequences
Q23: People who have their social security or
Q24: In Cybersecurity terminology,a threat is defined as
Q26: Botnets are stealth network attacks in which
Q27: Intrusion Detection Systems (IDS)are designed to monitor
Q28: Managers should expect less tolerant regulators and
Q29: _ are essential to the prevention and
Q30: The SEC and FTC impose huge fines