Week 3 Chapter 5
Chapter: Chapter 5: IT Security, crime, Compliance, and Continuity
1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs.
a) Bad program
d) Zombie computer
2. Social networks and cloud computing increase vulnerabilities by providing _____.
a) a single point of failure
b) an easy way to steal data
c) an easier way for data to be read over networks
d) extra security
Words: 399 - Pages: 2