A transaction log is an example of which form of data security?
a) scanning
b) firewall
c) internet controls
d) lock
A set combination of software and hardware that prevent unauthorized access
a) scanning
b) firewall
c) internet controls
d) lock
The virus known for wiping out the entire contents of a computer’s hard disk was called…
a) Jerusalem
b) Melissa
c) Michelangelo
d) Cascade
The virus that infects MS word macros and emails attached copies of the macros to outlook email recipients is called……
a) Jerusalem
b) Melissa
c) Michelangelo
d) Cascade
The virus attached itself to operating system and drop text letters to the bottom of screen is called
a) Jerusalem
b) Melissa
c) Michelangelo
d) Cascade
The virus that activates itself every Friday the 13th and erases program files from the disk is called……
a) Jerusalem
b) Melissa
c) Michelangelo
d) Cascade