All of the following are categories of a computer security threat EXCEPT ____.
A. ?secrecy
B. ?subterfuge
C. ?integrity
D. ?necessity
Answer: B
You might also like to view...
An array itself can be passed to a method by:
a) value b) reference c) both a and b d) None of the above
Examining the sequence diagram you produced in Exercise 5–4, identify the associations between these objects.
What will be an ideal response?
Which of the following is NOT an application of stacks in computer science?
A. implementation of a hash-based database search function B. managing computer memory in support of function calls C. supporting the undo feature in a text editor D. maintaining a history of visited links by a web browser
Communications for which you specify one or more recipients would be classified as public.
Answer the following statement true (T) or false (F)