Which is a program that can be useful in preventing cookies and Java applets from accessing a system.
Attackers have been known to search through company trash bins in order to collect potentially useful information
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.