Which term identifies a single instance of an information asset suffering damage, unintended or unauthorized modification, or disclosure?

A. Exploit
B. Exposure
C. Vulnerability
D. Loss


Answer: D

Computer Science & Information Technology

You might also like to view...

List 5 of the 14 areas of common practice standardized in the EBK.

What will be an ideal response?

Computer Science & Information Technology

Graphics in documents help clarify and emphasize details so they appeal to audience members with different backgrounds.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A merged field is surrounded by:

A) single angle brackets. B) double angle brackets. C) exclamation points. D) commas.

Computer Science & Information Technology

When executed on Microsoft Windows, Ruby program file and path data must be specified using the backslash character.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology