Beruflich Dokumente
Kultur Dokumente
II. Identification. Identify the term/s that is described in the statement. Write your answer on
the space provided
1. Attempt to get unauthorized access to the target computer or restricted data and view,
compromise or exploit its contents. __________
2. A program that replicates by appending a piece of its code to an otherwise harmless
executable file. __________
1. WWW
2. HTTP
3. B2B
4. SMS
5. MMS
6. ISACA
7. ISC
8. B2B
9. MOD
10. URL