Examlex
Q5: Keystroke loggers and screen scrapers are examples
Q52: Only one person can update a TPS
Q53: You buy the right to use software,not
Q58: Retailers are the prime example of companies
Q65: The cost of running the Internet is
Q66: _ occurs when an unauthorized individual attempts
Q67: _ portals automate the business processes involved
Q68: Slack is not as invasive as a
Q102: Which of the following was NOT used
Q128: _ is an unintentional threat.<br>A)Espionage<br>B)Identity theft<br>C)Social engineering<br>D)Software