The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:
A) Intrusion detection
B) Virus management
C) Vulnerability assessment
D) Penetration testing
Correct Answer:
Verified
Q37: Which of the following is NOT one
Q38: The process of converting data into secret
Q39: A complete record of all dates, times,
Q40: General controls in IT systems are divided
Q41: A self-replicating piece of program code that
Q43: This encryption method, used with wireless network
Q44: The IT Governance Committee has several important
Q45: This form of encryption uses a public
Q46: This encryption method requests connection to the
Q47: This communication protocol is built into web
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents