An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.
A. risk B. asset
C. attack D. vulnerability
C. attack
Computer Science & Information Technology
You might also like to view...
Explain the functions of the MAC sublayer of the Data Link layer.
What will be an ideal response?
Computer Science & Information Technology
In the Mobile Content Simulator, the Touch and Gestures layer check box is used to make the application respond to touch and gesture events.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
SATA, SCSI, and USB are examples of:
a. External bus architectures b. Internal bus architectures c. Peripheral command protocols d. Mass storage adaptors
Computer Science & Information Technology
With the Rectangular Marquee Tool, select ____ to specify the exact dimensions of a rectangle.
a. Fixed Height/Width b. Fixed Ratio c. Fixed Size d. Fixed Dimensions
Computer Science & Information Technology