Which of the 12 categories of threats best describes a situation where the adversary removes data from a victim's computer?
A. theft
B. espionage or trespass
C. sabotage or vandalism
D. information extortion
Answer: A
Computer Science & Information Technology
You might also like to view...
The multiple Items form enables display or entry of multiple records, but with a simplified layout
Indicate whether the statement is true or false
Computer Science & Information Technology
If you have not made any changes to the default settings of Windows 8, which icons are available on the taskbar?
A) File Explorer and Internet Explorer B) File Explorer, Internet Explorer, and Microsoft Office C) Desktop and Start screen D) Internet Explorer and Snipping Tool
Computer Science & Information Technology