A __________ is any action that compromises the security of information owned by an organization.

A) security attack
B) security service
C) security alert
D) security mechanism

A) security attack

Computer Science & Information Technology

You might also like to view...

In Access, when you click the Advanced Filter/Sort button, a list of all the field names is displayed

Indicate whether the statement is true or false

Computer Science & Information Technology

A way in which tasks can be organized in a hierarchical structure in Project 2013 is by creating a ________

A) Work Breakdown Structure B) task calendar C) project plan D) list of critical tasks

Computer Science & Information Technology