?Critical Thinking Questions
?
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident??
A. ?Vandalism
B. ?Trespass and espionage
C. ?Extortion
D. ?Software attack
Answer: C
Computer Science & Information Technology
You might also like to view...
State which of the following statements are true and which are false. If a statement is false, explain why.
1) Concatenation of string objects can be performed with the addition assignment operator, +=. 2) Characters within a string begin at index 0. 3) The assignment operator, =, copies a string. 4) A C-style string is a string object.
Computer Science & Information Technology
The WEBrick web server monitors which of the following ports?
A. 1000 B. 2000 C. 3000 D. 5000
Computer Science & Information Technology