A malicious program that enters program code or destroys data without authorization is an example of:
A) phishing.
B) encryption.
C) a password.
D) a virus.
Correct Answer:
Verified
Q38: 'Two-factor authentication' involves logging into a computer
Q45: Cash is the most liquid of all
Q48: Which of the following is a common
Q49: Which of the following statements is FALSE?
A)A
Q50: Which of the following is NOT a
Q51: 'Access creep' occurs when:
A)personnel move throughout the
Q53: Which of the following is a security
Q54: Which of the following describes collusion?
A)When bogus
Q55: When a cheque is issued, the party
Q56: Which of the following is retained by
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents