Multiple Choice
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
A) Software
B) Administrative
C) Data security
D) Implementation
E) Authentication
Correct Answer:

Verified
Correct Answer:
Verified
Q8: _ identify the access points in a
Q9: An example of phishing is:<br>A) flooding a
Q10: Zeus is an example of a Trojan
Q12: To secure mobile devices, a company will
Q14: Your company, an online clothing store, has
Q16: Malicious software programs referred to as malware
Q17: _ refers to policies, procedures, and technical
Q23: Most computer viruses deliver a:<br>A)worm.<br>B)Trojan horse.<br>C)driveby download.<br>D)keylogger.<br>E)payload.
Q69: Sniffers enable hackers to steal proprietary information
Q82: One form of spoofing involves forging the