A __________ is any action that compromises the security of information owned by an organization.

A) security attack
B) security service
C) security alert
D) security mechanism


A) security attack

Computer Science & Information Technology

You might also like to view...

To see the image of the cat, you must…

``` ``` a.click the dog image b. move your mouse off the dog image c. roll your mouse over the dog image d. the image of the cat is already displayed so nothing needs to be done

Computer Science & Information Technology

A slide is a transparent plastic sheet used with overhead projectors that use light to project an image of the sheet on a wall or a screen

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ is a tool that can help guide a user through complex tasks

A) hub B) URL C) wizard D) device driver

Computer Science & Information Technology

A ____ sort algorithm computes the middle position of an array and recursively sorts its left and right subarrays, merges to two sorted subarrays into a single sorted array, then stops when the subarrays can no longer be subdivided.

A. stack B. merge C. quick D. recursive

Computer Science & Information Technology