Any action that threatens one or more of the classic security services of confidentiality, integrity, availability, accountability, authenticity, and reliability in a system constitutes a(n) ________.
Fill in the blank(s) with the appropriate word(s).
incident
You might also like to view...
You can leave notes open to the screen while you continue using Outlook, or you can close them and view them in the ____ window.
A. Notes B. Navigation C. Prioritized D. Extras
A ____ defines the appearance and shape of the letters, numbers, and special characters used in text.
a. resolution b. typeface c. shadow d. point
How do you reorder worksheets in a workbook?
What will be an ideal response?
A customer comes into the computer store where you are working looking for a cable with which you are unfamiliar. The best course of action is for you to ____
A) Tell the customer you do not know what that is. B) Ask the customer to explain to you the purpose of the cable. C) Tell the customer there is no such cable. D) Refer the customer to the service desk. E) Ask your supervisor for assistance.