All of the following are categories of a computer security threat EXCEPT ____.

A. ?secrecy
B. ?subterfuge
C. ?integrity
D. ?necessity


Answer: B

Computer Science & Information Technology

You might also like to view...

An array itself can be passed to a method by:

a) value b) reference c) both a and b d) None of the above

Computer Science & Information Technology

Examining the sequence diagram you produced in Exercise 5–4, identify the associations between these objects.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT an application of stacks in computer science?

A. implementation of a hash-based database search function B. managing computer memory in support of function calls C. supporting the undo feature in a text editor D. maintaining a history of visited links by a web browser

Computer Science & Information Technology

Communications for which you specify one or more recipients would be classified as public.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology