Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about ? On this page you'll find 2 study documents about .

All 2 results

Sort by

CIS430 Unit 7 Self Quiz C16
  • CIS430 Unit 7 Self Quiz C16

  • Exam (elaborations) • 4 pages • 2019
  • Question 1 A software program that allows access to a system without going through the normal logon procedures is called back door. True False Question 2 A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse. True False Response Feedback: It is called a worm. Question 3 The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems. True False Question 4 Encryption is the conv...
    (0)
  • $7.49
  • + learn more
CIS430 Unit 7 Self Quiz C16
  • CIS430 Unit 7 Self Quiz C16

  • Exam (elaborations) • 4 pages • 2018
  • Question 1 A software program that allows access to a system without going through the normal logon procedures is called back door. True False Question 2 A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse. True False Response Feedback: It is called a worm. Question 3 The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems. True False Question 4 Encryption is the conv...
    (0)
  • $10.49
  • + learn more