An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.

A. risk B. asset

C. attack D. vulnerability

C. attack

Computer Science & Information Technology

You might also like to view...

Summary tasks in Project 2013 are italicized in the Summary table

Indicate whether the statement is true or false

Computer Science & Information Technology

What are Puppet Warp pins?

What will be an ideal response?

Computer Science & Information Technology