One type of attack on the security of a computer system or network that impacts
the availability of a system (e.g. destruction of a resource in the system) is
referred to as ___________.
A. interruption B. interception
C. modification D. all of the above
A
You might also like to view...
You are planning to buy a stock, the risk on which is dependent on two factors: (1) the change over the last year in the inflation rate and (2) the spread between ten-year Treasury bonds and three-month Treasury bills. Suppose the average risk-free interest rate is 1 percent. The beta coefficients of the stock associated with the change in inflation rate and spread between ten-year Treasury bonds and three-month Treasury bills are -2 and 5 respectively. If you expect the inflation rate to rise 1 percentage point and you think the spread will be 3 percentage points. What is the expected return to this stock? Use the arbitrage-pricing theory.
A. 11 percent B. 12 percent C. 14 percent D. 18 percent
From a sample of 500 items, 30 were found to be defective. The point estimate of the population proportion defective will be
A. 0.06. B. 30.0. C. 470. D. 0.94.
Big City Lumber Inc. has a levered beta of 1.70, a debt-equity ratio of 0.40, and a tax rate of 25%. What is the value of the firm's unlevered beta?
A) 0.78 B) 1.00 C) 1.31 D) 1.70
Which IPv4 header field is used to specify quality of service?
A) type of service B) version number C) ECN D) differentiated services control point