Critical Thinking Questions 12-1
?
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
One of his firm's clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident?
A. Vandalism
B. Trespass and espionage
C. Extortion
D. Software attack
Answer: C
Computer Science & Information Technology
You might also like to view...
How many elements does the following array have?
int values[1000]; a. 1000 b. 999 c. 1001 d. cannot tell from the code
Computer Science & Information Technology
Which one of these is not the name of a C library function?
a. printf b. sqrt c. void d. scanf e. log
Computer Science & Information Technology
____________________ refers to changes in the requirements of the project as the project is being constructed.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The _______________ is a huge database that stores everything about your PC.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology