Viruses
Trojans
Spams
All of the above
Malicious Software
Malicious Systems
Maliant Software
Maliant Systems
AVAST
SMAG
AVG
McAFee
Spyware
Worms
All of these
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
The website that was hacked
The person who had their identity stolen
The bank of the victim
Cracking
Jacking
Spoofing
Smarming
Performance
Reliability
Security
All the above
Availability
Integrity
Confidentiality
None of above
System access control
System design
Data access control
Interruption
Modification
All of Above
System access controls
Viewing and printing of data
Access to computing resources without difficulties
Separation and protection of the resources data
Hard to assure identity of user on a remote system
Insertion
Security patches
Refresh patches
Security breath fixes
Physical problem
Human problem
Authentication problem
Disrupt computer operation
Gather sensitive information
Both A and B
All of the Above
Privacy
Authentication
The weaper
The reaper
The seaper
None of the above