Which of the 12 categories of threats best describes a situation where the adversary removes data from a victim's computer?

A. theft
B. espionage or trespass
C. sabotage or vandalism
D. information extortion


Answer: A

Computer Science & Information Technology

You might also like to view...

The feature that automatically changes something that you type in PowerPoint to something else is ________

A) AutoFormat B) AutoCorrect C) Contextual spelling D) the Spelling checker

Computer Science & Information Technology

What is the IEEE standard that defines the carrier access method used by Ethernet?

What will be an ideal response?

Computer Science & Information Technology

What option below represents an example of behavioral biometrics?

A. user dynamics B. keystroke dynamics C. facial recognition D. fingerprint recognition

Computer Science & Information Technology

Which property can be set to indicate whether text in the TextBox is read-only or not?

A. InputOnly B. AcceptsText C. ReadOnly D. TextInputOnly

Computer Science & Information Technology