Multiple Choice
_________ are best described as someone who accesses a computer or computer network unlawfully.
A) Hackers
B) Virus/worms/Trojans
C) Information thief
D) Disgruntled employees
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q29: According to Kovach and Tansey (2000)_ is
Q30: According to Kovach and Tansey (2000)_ is
Q31: Please list and briefly describe the four
Q32: Which of the following is considered a
Q33: Information availability means that the individuals must
Q34: Integrity of information means data must be
Q35: What are some of the best practices
Q37: Information security in HRIS pertains to protecting
Q38: What are some of the best practices
Q39: If you were an HR manager how