A threat action in which sensitive data are directly released to an unauthorized entity is __________.

A. corruption
B. disruption
C. intrusion
D. exposure


D. exposure

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. vi lets you move lines from one place in your file to another. 2. The vi editor uses 9 temporary buffers named 1 to 9. 3. The contents of the numbered buffers are out of your reach. 4. The alphabetic buffers and numbered buffers are the same buffers named differently. 5. Line numbers produced by number option become part of your text.

Computer Science & Information Technology

____ text is text for which a user can use the mouse to drag across the text to highlight it and then copy the text to the system's Clipboard.

a. Clippable b. Dynamic c. Static d. Selectable

Computer Science & Information Technology

The flowchart shape for a process is a(n) ________

A) parallelogram B) rectangle C) oval D) diamond

Computer Science & Information Technology

? Critical Thinking Questions Case 10-1 ? Robin is interested in sewing clothes for children. Since she received a lot of support and appreciation for her work, she converted her hobby into a small business. Since the business has just started, she plans to start an online journal to share new information and to keep her customers engaged. Which of the following should Robin use for this purpose??

A. ?Instagram B. ?LinkedIn C. ?Facebook D. ?Blog

Computer Science & Information Technology