Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.

A. unauthorized disclosure

B. deception

C. disruption

D. usurpation

B. deception

Computer Science & Information Technology

You might also like to view...

Having common fields is important when you begin to build ________ between the tables

Fill in the blank(s) with correct word

Computer Science & Information Technology

Any Ribbon tools not available when worksheets are grouped will be ________

A) grayed out B) highlighted C) underlined D) italicized

Computer Science & Information Technology