A __________ is any action that compromises the security of information owned by an organization.

A. security mechanism B. security attack

C. security policy D. security service

B. security attack

Computer Science & Information Technology

You might also like to view...

A relationship is an association between two tables where the tables contain a common field of data

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT a part of host hardening?

A. Unnecessary applications should be removed B. Default passwords for default accounts should be left unchanged C. Unnecessary accounts should be disabled D. Default accounts should be renamed, if possible

Computer Science & Information Technology