Critical Thinking Questions 12-1
?
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
One of his firm's clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident?

A. Vandalism
B. Trespass and espionage
C. Extortion
D. Software attack


Answer: C

Computer Science & Information Technology

You might also like to view...

How many elements does the following array have?

int values[1000]; a. 1000 b. 999 c. 1001 d. cannot tell from the code

Computer Science & Information Technology

Which one of these is not the name of a C library function?

a. printf b. sqrt c. void d. scanf e. log

Computer Science & Information Technology

____________________ refers to changes in the requirements of the project as the project is being constructed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _______________ is a huge database that stores everything about your PC.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology