Multiple Choice
The protection of information systems against unauthorized access to or modification of information that is stored,processed,or being sent over a network is referred to as
A) information assurance.
B) data integrity.
C) information integrity.
D) human firewall.
Correct Answer:

Verified
Correct Answer:
Verified
Q41: A macro virus or macro worm is
Q42: Access control is a mechanism that determines
Q43: Ninety-three percent of companies that suffer a
Q44: Security functions or characteristics of digital signatures
Q45: According to Sullivan (2011),vulnerabilities in IT and
Q47: _ is a crimeware technique used to
Q48: Fingerprint scanners,facial recognition systems,and voice recognition are
Q49: The Internet,or more specifically the Internet and
Q50: The key reasons why EC criminals cannot
Q51: Advantages of virtual private networks include each