Which of the following are tools used by hackers and Internet criminals to disrupt individual computers and entire company systems?

A) encryption and authentication
B) worms and viruses
C) sniffers and webinars
D) firewalls and decoders
E) passwords and private exchanges

B

Business

You might also like to view...

A weak moral person and a strong moral manager is called an Inconsistent leader

a. True b. False

Business

Presenting consolidated statements instead of individual financial statements is a change in a reporting entity

Indicate whether the statement is true or false.

Business