Which is a program that can be useful in preventing cookies and Java applets from accessing a system.
Attackers have been known to search through company trash bins in order to collect potentially useful information
EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.