
微信扫一扫
实时资讯全掌握
Which of the following exploits to Information Systems can occur over and over again without any direct action after the initial exploit? A. Unauthorized modifications to software that skims transactions and diverts funds (e.g. rounding fractions into an expense account for reimbursement). B. Data input manipulation (e.g. intentionally mis-entering information). C. Sabotaging the servers that run the data processing (e.g. unplugging the servers or removing their hard drives). D. Data being stolen on removable storage devices (e.g. hard drive, USB memory).
|