____ includes any acts of malicious destruction to a computer or computer resource.

A. Phishing attacks
B. Blocking attacks
C. Computer sabotage
D. Spoofing attacks


Answer: C

Computer Science & Information Technology

You might also like to view...

The _____  model has become the most popular database model.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?

A) Service level agreements B) Security framework C) “Five A’s” of information security D) CIA security model

Computer Science & Information Technology

Exporting an InDesign layout to an SWF file format creates two files: an index.swf file and a(n) _______________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You must tell the user what value to type to end the loop for ____.

A. counter-controlled loops B. state-controlled loops C. sentinel-controlled loops D. any type of loop

Computer Science & Information Technology