?Critical Thinking Questions
?
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident??

A. ?Vandalism
B. ?Trespass and espionage
C. ?Extortion
D. ?Software attack


Answer: C

Computer Science & Information Technology

You might also like to view...

_______________ antennas have a shorter range but do not have to be precisely aimed at the receiver.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To test for multiple conditions, you would use a basic IIf function

Indicate whether the statement is true or false

Computer Science & Information Technology

In a functional specification for a project, the ________ requirements are those related to the computer hardware and software capabilities

A) functional B) environmental C) technical D) pseudo-code

Computer Science & Information Technology

Some Internet Service Providers (ISPs) offer Internet search capabilities as part of their service

Indicate whether the statement is true or false

Computer Science & Information Technology