A __________ is any action that compromises the security of information owned by an organization.
A. security mechanism B. security attack
C. security policy D. security service
B. security attack
Computer Science & Information Technology
You might also like to view...
A relationship is an association between two tables where the tables contain a common field of data
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is NOT a part of host hardening?
A. Unnecessary applications should be removed B. Default passwords for default accounts should be left unchanged C. Unnecessary accounts should be disabled D. Default accounts should be renamed, if possible
Computer Science & Information Technology