Which of the following choices represents an example of a high risk?
A. Employees with limited database access leaving for job opportunities with competitors
B. Third party intruders that threaten to obtain access to database information and publish it
C. Sensitivity to the risk of disclosure by sales and marketing members who are approached to share information for financial gain
D. Competitors that regularly attempt to obtain access to database information or obtain a copy of it
Answer: D
You might also like to view...
Spam cannot be sent in a text message.
a. true b. false
Suppose that the class Mystery is derived from the class Secret. Consider the following statements.Secret secRef = new Secret();Mystery mysRef = new Mystery();Which of the following statements is legal in Java?(i) secRef = mysRef;(ii) mysRef = secRef;
A. Only (i) B. Only (ii) C. Both (i) and (ii) D. None of these
A _____ specifies the fields and identifies the primary key in a particular file.
A. frame design B. table design C. viewport D. window
The primary reason for networking standards is to:
a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor