Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a______ to eliminate the problem

a. patch b. bot
c. rootkit d. Trojan horse


a

Business

You might also like to view...

Which of the following tasks least describes the role of a brand manager?

A)? making the product relevant to its target market B)? protecting the company's trademark and brand C) ensuring that products are perceived as high in quality D) ?offering opportunities to enhance consumer brand loyalty E) ?being familiar with the kinds of emotions that push consumers to buy

Business

A taxpayer has standing to sue only when he or she challenges an expenditure that

violates a constitutional limitation on that power. a. True b. False

Business

How has cable television affected American life?

What will be an ideal response?

Business

Interpretative rules of administrative agencies are automatically binding on the private parties the agency regulates

a. True b. False Indicate whether the statement is true or false

Business