Security threats can originate from ________.

a) malicious users
b) malicious software
c) outside the system via a network connection
d) all of the above

d) all of the above

Computer Science & Information Technology

You might also like to view...

Files created in Access 2013 are saved with the Access 2010 file format, which displays in the title bar

Indicate whether the statement is true or false

Computer Science & Information Technology

What component allows multiple computers to share a keyboard?

A) UPS B) KVM C) Docking station D) Projector

Computer Science & Information Technology