Which of the following is a type of action that has the potential to cause harm?
A. asset
B. vulnerability
C. threat
D. threat agent
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following is not considered one of the most common methods to create a form?
A) Blank Form B) Form Wizard C) Form Design D) Default Form
Computer Science & Information Technology
When working with random access files, the ____ function resets the current position to the start of the file.
A. rewind() B. reset() C. fseek() D. flush()
Computer Science & Information Technology