Multiple Choice
Match each item with a statement below.
-Component in a system that allows the attacker to access the system at will, bypassing standard login controls.
A) data custodian
B) Trojan horse
C) integrity
D) back door
E) balance
F) worm
G) accuracy
H) data owner
I) confidentiality
Correct Answer:

Verified
Correct Answer:
Verified
Q36: <br>-According the to CSI/FBI Computer Crime and
Q37: Match each item with a statement below.<br>-Responsible
Q38: Describe the balance between information security and
Q39: What is defense in depth?
Q40: A(n) _ is an application error that
Q42: When a computer is the _ of
Q43: To make sound decisions about information security,
Q44: Match each item with a statement below.<br>-Involves
Q45: A(n) _ is a weakness or fault
Q46: The _ is primarily responsible for advising