A computer abuse technique called a ____ involves a virus that replicates itself on disks, in memory, or across networks.
A) worm
B) back door
C) logic bomb
D) Trojan horse
Correct Answer:
Verified
Q67: _ are the policies and procedures that
Q68: The information process control goal which relates
Q69: As a result of an inadequate design,
Q70: Which of the following is not a
Q71: A deliberate act or untruth intended to
Q73: A control goal that is a measure
Q74: Establishing a viable internal control system is
Q75: A business event which is not properly
Q76: A(n) _ is a computer abuse technique
Q77: The section of Sarbanes Oxley that provides
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents