Multiple Choice
A Trojan horse
A) burrows into a computer's memory and replicates itself into areas of idle memory
B) is a destructive program triggered by some predetermined event
C) allows unauthorized access to a system without going through normal log-on procedures
D) captures IDs and passwords from unsuspecting users
Correct Answer:

Verified
Correct Answer:
Verified
Q67: What are the three security objectives of
Q68: A value-added network can detect and reject
Q69: Electronic data interchange customers may be given
Q70: Describe two tests of controls that would
Q71: All of the following will reduce the
Q73: Electronic data interchange translation software interfaces with
Q74: What is an operating system? What does
Q75: All of the following tests of controls
Q76: What is a database authorization table?
Q77: Explain how transactions are audited in an