What type of employee is the most dangerous when it comes to internal IT attacks?
A. IT professionals
B. data entry clerks
C. financial professionals
D. IT security professionals
D. IT security professionals
You might also like to view...
Call-by-reference can achieve the security of call-by-value when:
a. The value being passed is small. b. A large argument is passed in order to improve performance. c. A pointer to the argument is used. d. The const qualifier is used.
What is the effect of increased load on an algorithm?
a. Efficient algorithms will not increase their use of resources b. Performance degrades c. Algorithm has a different Big O complexity d. Memory use increases
The ____ filters add texture and changes in color, creating artistic 3-D effects and hand-drawn looks..
a. Sharpening b. Stylize c. Sketch d. Artistic
You can save an Excel file as a text file with which of the following file extensions?
A) .pdf B) .rtf C) .txt D) .csv