Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.
A. unauthorized disclosure
B. deception
C. disruption
D. usurpation
B. deception
Computer Science & Information Technology
You might also like to view...
Having common fields is important when you begin to build ________ between the tables
Fill in the blank(s) with correct word
Computer Science & Information Technology
Any Ribbon tools not available when worksheets are grouped will be ________
A) grayed out B) highlighted C) underlined D) italicized
Computer Science & Information Technology