Which of the 12 categories of threats best describes a situation where the adversary removes data from a victim's computer?

A. theft
B. espionage or trespass
C. sabotage or vandalism
D. information extortion

Answer: A

Computer Science & Information Technology

You might also like to view...

The multiple Items form enables display or entry of multiple records, but with a simplified layout

Indicate whether the statement is true or false

Computer Science & Information Technology

If you have not made any changes to the default settings of Windows 8, which icons are available on the taskbar?

A) File Explorer and Internet Explorer B) File Explorer, Internet Explorer, and Microsoft Office C) Desktop and Start screen D) Internet Explorer and Snipping Tool

Computer Science & Information Technology