Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a______ to eliminate the problem
a. patch b. bot
c. rootkit d. Trojan horse
a
You might also like to view...
Which of the following tasks least describes the role of a brand manager?
A)? making the product relevant to its target market B)? protecting the company's trademark and brand C) ensuring that products are perceived as high in quality D) ?offering opportunities to enhance consumer brand loyalty E) ?being familiar with the kinds of emotions that push consumers to buy
A taxpayer has standing to sue only when he or she challenges an expenditure that
violates a constitutional limitation on that power. a. True b. False
How has cable television affected American life?
What will be an ideal response?
Interpretative rules of administrative agencies are automatically binding on the private parties the agency regulates
a. True b. False Indicate whether the statement is true or false