In information security, which of the following is an example of a threat actor?
A. a force of nature such as a tornado that could destroy computer equipment
B. a virus that attacks a computer network
C. a person attempting to break into a secure computer network
D. all of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
Another name for commercial software is ________ software
Fill in the blank(s) with correct word
Computer Science & Information Technology
A security model defines ________.
a) privileges b) resource types c) subjects d) both a and c
Computer Science & Information Technology
Windows 8.1 can automatically create restore points after Windows Update downloads updates and before they are installed
Indicate whether the statement is true or false
Computer Science & Information Technology
Describe the contents of the Connections tab in the Internet Options applet.
What will be an ideal response?
Computer Science & Information Technology