_____ is a program that attaches itself to files or software so it can spread to other files or programs

a. A computer virus c. A worm
b. Spyware d. A Trojan horse

A

Business

You might also like to view...

Tate sells coffee machines to offices. He is trying to conclude the sale of a large coffee machine at the headquarters of a large management consulting company. He finally offers free delivery and eight coffee grinders at half price if the consulting firm representative agrees to purchase eight systems from Tateā€”one for each of its regional offices. Which closing technique is Tate using?

a. summary b. assumptive c. negotiation d. adaptive

Business

The offline print spooling feature of print servers should be carefully monitored to ensure that unauthorized viewing access to sensitive information is controlled and prevented. Which of the following issues is an IS auditor MOST concerned with?

A. Some users have the technical authority to print documents from the print spooler even though the users are not authorized with the appropriate classification to view the data they can print. B. Some users have the technical authority to modify the print spooler file even though the users do not have the subject classification authority to modify data within the file. C. Some users have the technical authority to delete the print job from the spooler even though the users do not have the authority to modify the data output of the print job. D. Some users have the technical authority to pause the print jobs of certain information even though they do not have the subject classification authority to create, modify, or view the data output of the print job.

Business