System security

Due to a malfunction in the online security system, the database was left open and ......... to attack.
palpable
negotiable
vulnerable
operable

The customers' information was hijacked and ......... to a rival company.
on sold
undersold
oversold
sold

After the company's data records mysteriously went missing overnight, new password protection programs were ..........
implemented
illustrated
instilled
instigated

The computer hacker paid his fellow worker ......... money not to speak to anyone about his criminal activities.
hush
calm
silent
quiet

By day, the accountant went about his work in a professional manner. No one suspected that at night, he was ......... the books.
logging
cooking
drawing
overturning

According to ......... theory, the longer a password is, the more difficult it is to guess. Unfortunately this also makes it more difficult to remember!
compatible
constructive
convenient
contemporary

Patents do not protect a product from being duplicated. Many countries simply do not ......... patent laws.
recognise
regale
neglect
discover

The PR company hoped that by ......... potential employees to personality profiling tests, they would discover if any candidates were untrustworthy.
instructing
submitting
demanding
attending

......... wisdom holds that one should upload new files only if they have been checked with virus-detection software.
Concise
Convivial
Conventional
Correctional

The man's employment ......... were not good. He had a criminal record for credit card fraud.
prospects
negotiations
applications
negations