An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.

A. risk B. asset

C. attack D. vulnerability


C. attack

Computer Science & Information Technology

You might also like to view...

Explain the functions of the MAC sublayer of the Data Link layer.

What will be an ideal response?

Computer Science & Information Technology

In the Mobile Content Simulator, the Touch and Gestures layer check box is used to make the application respond to touch and gesture events.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

SATA, SCSI, and USB are examples of:

a. External bus architectures b. Internal bus architectures c. Peripheral command protocols d. Mass storage adaptors

Computer Science & Information Technology

With the Rectangular Marquee Tool, select ____ to specify the exact dimensions of a rectangle.

a. Fixed Height/Width b. Fixed Ratio c. Fixed Size d. Fixed Dimensions

Computer Science & Information Technology