Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 1
Quiz 4: Internal Controls and Risks in IT Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as a(n) :
Question 42
Multiple Choice
The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:
Question 43
Multiple Choice
This encryption method, used with wireless network equipment, is symmetric in that both the sending and receiving network nodes must use the same encryption key.It has been proven to be susceptible to hacking.