1. Integrity ensures that only authorized users can view the information* True False 2. RootKit is a set of software tools that break into a PC, obtain special privileges and then hide all traces of its existence.* True False 3. Script Kiddies download and run hacking programs without understanding technology* True False 4. Backdoors allow the attacker to return to the PC at a later time and bypass any security settings.* True False 5. Virus self replicate without user interaction* True False 6. Universally Connected Devices is an attacks which can come from anywhere* True False 7. Cyber Terrorists highly motivated, less likely to take risks, better funded, more determined than hackers* True False 8. Macro Virus lie dormant until it is triggered by a specific logical event* True False 9. Vishing is a technique used by Social Engineers to scam people* True False 10. Worm self replicate with help from user.* True False 11. Resident Virus is a program that advertises one activity but performs some other malicious activity.* True False 12. Confidentiality ensures that data is NOT altered* True False 13.Social Engineering relies on tricking and deceiving someone to provide secure information* True False 14. Zero Day Attack is an Attack which occurs when an attacker exploits a previously unknown flaw* True False 15. Spies are knowledgeable techies hired to hack specific systems (hired gun slingers)* True False.