What type of employee is the most dangerous when it comes to internal IT attacks?

A. IT professionals
B. data entry clerks
C. financial professionals
D. IT security professionals


D. IT security professionals

Computer Science & Information Technology

You might also like to view...

Call-by-reference can achieve the security of call-by-value when:

a. The value being passed is small. b. A large argument is passed in order to improve performance. c. A pointer to the argument is used. d. The const qualifier is used.

Computer Science & Information Technology

What is the effect of increased load on an algorithm?

a. Efficient algorithms will not increase their use of resources b. Performance degrades c. Algorithm has a different Big O complexity d. Memory use increases

Computer Science & Information Technology

The ____ filters add texture and changes in color, creating artistic 3-D effects and hand-drawn looks..

a. Sharpening b. Stylize c. Sketch d. Artistic

Computer Science & Information Technology

You can save an Excel file as a text file with which of the following file extensions?

A) .pdf B) .rtf C) .txt D) .csv

Computer Science & Information Technology