A computer is the ____________________ of an attack when it is the entity being targeted.
Fill in the blank(s) with the appropriate word(s).
object
Computer Science & Information Technology
You might also like to view...
A user who creates a network share and sets permissions on that share is employing which model of access control?
A. Attribute-based access control B. Role-based access control C. Mandatory access control D. Discretionary access control
Computer Science & Information Technology
Describe a purpose of databases and the functions of a database management system (DBMS).
What will be an ideal response?
Computer Science & Information Technology