Making mistakes that can lead to security vulnerabilities is also referred to as ______.

a. malicious intent
b. human error
c. interference
d. espionage


b. human error

Criminal Justice

You might also like to view...

The first step in a ____________ is to establish the perpetrator's path of entry and exit

Fill in the blank(s) with the appropriate word(s).

Criminal Justice

The electromagnetic pulse (EMP) SIG focuses on threats that could cause nationwide long-term critical infrastructure collapse

Indicate whether the statement is true or false

Criminal Justice

Castoff

A. Active B. Passive

Criminal Justice

Data for the NCVS is collected by

a. the Federal Bureau of Investigation. b. the Census Bureau. c. the Department of Homeland Security. d. university researchers.

Criminal Justice