Multiple Choice
A computer abuse technique called a ____ involves a virus that replicates itself on disks, in memory, or across networks.
A) worm
B) back door
C) logic bomb
D) Trojan horse
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q55: Figure TB-7.1 depicts the objective setting
Q56: Risk assessment is best described by:<br>A) Internal
Q57: The section of Sarbanes Oxley that makes
Q58: The control goal called ensure _ is
Q59: _ relate to a specific AIS process,
Q61: The control goal called efficiency of operations
Q62: A computer abuse technique called a _
Q63: With the issuance of the SEC Interpretative
Q64: SAS No. 99 emphasizes auditors should brainstorm
Q65: A(n) _ control plan is designed to