Which of the following choices represents an example of a high risk?

A. Employees with limited database access leaving for job opportunities with competitors
B. Third party intruders that threaten to obtain access to database information and publish it
C. Sensitivity to the risk of disclosure by sales and marketing members who are approached to share information for financial gain
D. Competitors that regularly attempt to obtain access to database information or obtain a copy of it


Answer: D

Computer Science & Information Technology

You might also like to view...

Spam cannot be sent in a text message.

a. true b. false

Computer Science & Information Technology

Suppose that the class Mystery is derived from the class Secret. Consider the following statements.Secret secRef = new Secret();Mystery mysRef = new Mystery();Which of the following statements is legal in Java?(i)  secRef = mysRef;(ii)  mysRef = secRef;

A. Only (i) B. Only (ii) C. Both (i) and (ii) D. None of these

Computer Science & Information Technology

A _____ specifies the fields and identifies the primary key in a particular file.

A. frame design B. table design C. viewport D. window

Computer Science & Information Technology

The primary reason for networking standards is to:

a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor

Computer Science & Information Technology