__________ threats exploit service flaws in computers to inhibit use by legitimate users.

A) Information access
B) Reliability
C) Passive
D) Service

D) Service

Computer Science & Information Technology

You might also like to view...

Generation 2 virtual machines support Legacy Network Adapters

Indicate whether the statement is true or false

Computer Science & Information Technology

Bob sends Alice an encrypted message using AES. What key would Alice need to use to decrypt the message?

A. Bob's public key B. Bob's private key C. Alice's public key D. The same key that Bob used to encrypt the message

Computer Science & Information Technology