In information security, which of the following is an example of a threat actor?

A. a force of nature such as a tornado that could destroy computer equipment
B. a virus that attacks a computer network
C. a person attempting to break into a secure computer network
D. all of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

Another name for commercial software is ________ software

Fill in the blank(s) with correct word

Computer Science & Information Technology

A security model defines ________.

a) privileges b) resource types c) subjects d) both a and c

Computer Science & Information Technology

Windows 8.1 can automatically create restore points after Windows Update downloads updates and before they are installed

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe the contents of the Connections tab in the Internet Options applet.

What will be an ideal response?

Computer Science & Information Technology