Multiple Choice
Match each item with a statement below.
-Software programs that reveals its designed behavior only when activated.
A) data custodian
B) Trojan horse
C) integrity
D) back door
E) balance
F) worm
G) accuracy
H) data owner
I) confidentiality
Correct Answer:

Verified
Correct Answer:
Verified
Q18: Describe a dictionary attack.
Q28: What important organizational functions are performed by
Q29: A prolonged increase in power is called
Q30: The threat of _ involves a malicious
Q31: A majority of organizations use information systems
Q33: An individual who hacks the public telephone
Q34: Match each item with a statement below.<br>-Information
Q35: Describe the difference between direct and indirect
Q36: <br>-According the to CSI/FBI Computer Crime and
Q37: Match each item with a statement below.<br>-Responsible