Which group represents the most likely source of an asset being lost through inappropriate computer use?
A. Hackers
B. Employees
C. Crackers
D. Flood
Answer: B. Employees
You might also like to view...
The ________ command reverses the most recent action
Fill in the blank(s) with correct word
Boeing MSL LAN and Honeywell SCOMP systems have which of the following security ratings?
a. B1 b. B3 c. A1 d. A2
____________________ systems are software programs that can make decisions and draw conclusions, similar to a human expert.
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. More detail is achievable through using a process called "exploding the diagrams." 2. Data flow diagrams must be drawn working from left to right on the page. 3. Data stores must always have data flow into them in a proper diagram. 4. Linear data flow from process to process is normal in higher level data flow diagrams.