Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Philosophy
Study Set
Ethics in Information Technology Study Set 2
Quiz 3: Cyberattacks and Cybersecurity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?
Question 22
True/False
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
Question 23
Multiple Choice
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
Question 24
Multiple Choice
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?