A computer is the ____________________ of an attack when it is the entity being targeted.

Fill in the blank(s) with the appropriate word(s).

object

Computer Science & Information Technology

You might also like to view...

A user who creates a network share and sets permissions on that share is employing which model of access control?

A. Attribute-based access control B. Role-based access control C. Mandatory access control D. Discretionary access control

Computer Science & Information Technology

Describe a purpose of databases and the functions of a database management system (DBMS).

What will be an ideal response?

Computer Science & Information Technology