One type of attack on the security of a computer system or network that impacts

the availability of a system (e.g. destruction of a resource in the system) is
referred to as ___________.

A. interruption B. interception

C. modification D. all of the above


A

Business

You might also like to view...

You are planning to buy a stock, the risk on which is dependent on two factors: (1) the change over the last year in the inflation rate and (2) the spread between ten-year Treasury bonds and three-month Treasury bills.  Suppose the average risk-free interest rate is 1 percent. The beta coefficients of the stock associated with the change in inflation rate and spread between ten-year Treasury bonds and three-month Treasury bills are -2 and 5 respectively. If you expect the inflation rate to rise 1 percentage point and you think the spread will be 3 percentage points. What is the expected return to this stock? Use the arbitrage-pricing theory.

A. 11 percent B. 12 percent C. 14 percent D. 18 percent

Business

From a sample of 500 items, 30 were found to be defective. The point estimate of the population proportion defective will be

A. 0.06. B. 30.0. C. 470. D. 0.94.

Business

Big City Lumber Inc. has a levered beta of 1.70, a debt-equity ratio of 0.40, and a tax rate of 25%. What is the value of the firm's unlevered beta?

A) 0.78 B) 1.00 C) 1.31 D) 1.70

Business

Which IPv4 header field is used to specify quality of service?

A) type of service B) version number C) ECN D) differentiated services control point

Business