________ CONSISTS OF ACTIVITIES THAT VIOLATE A COMPANY'S IT USE PO...

38) ________ consists of activities that violate a company's IT use policies or ethics policies.A) FraudB) ExtortionC) HackingD) AbuseAnswer: DDiff: 2 Page Ref: 15Question: 3i