Multiple Choice
Match each statement with an item below.
-A person who uses and creates computer software to gain access to information illegally.
A) Threat agent
B) Intellectual property
C) Hacker
D) Computer viruses
E) Trojan
F) Risk management
G) Likelihood
H) Residual risk
I) Standards
Correct Answer:

Verified
Correct Answer:
Verified
Q24: Information has the characteristic of _ when
Q25: A _ attack seeks to deny legitimate
Q26: <i>Match each statement with an item below.</i><br>-Something
Q27: <i>Match each statement with an item below.</i><br>-Includes
Q28: A(n)_ is any clearly identified attack on
Q30: Once the project team for information security
Q31: IRP focuses more on preparations completed before
Q32: _ hack systems to conduct terrorist activities
Q33: _ is the control approach that attempts
Q34: A(n)_ is an investigation and assessment of