Which of the following is a type of action that has the potential to cause harm?

A. asset
B. vulnerability
C. threat
D. threat agent

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is not considered one of the most common methods to create a form?

A) Blank Form B) Form Wizard C) Form Design D) Default Form

Computer Science & Information Technology

When working with random access files, the ____ function resets the current position to the start of the file.

A. rewind() B. reset() C. fseek() D. flush()

Computer Science & Information Technology