Multiple Choice
According to Sullivan (2011) ,vulnerabilities in IT and EC systems include each of the following except
A) poor application security.
B) weak boundary security.
C) lack of environmental support.
D) unencrypted communications.
Correct Answer:

Verified
Correct Answer:
Verified
Q40: A malicious hacker who may represent a
Q41: A macro virus or macro worm is
Q42: Access control is a mechanism that determines
Q43: Ninety-three percent of companies that suffer a
Q44: Security functions or characteristics of digital signatures
Q46: The protection of information systems against unauthorized
Q47: _ is a crimeware technique used to
Q48: Fingerprint scanners,facial recognition systems,and voice recognition are
Q49: The Internet,or more specifically the Internet and
Q50: The key reasons why EC criminals cannot