A(n) ____ threat permits unauthorized data disclosure.
A. ?secrecy
B. ?integrity
C. ?necessity
D. ?none of the above
Answer: A
Computer Science & Information Technology
You might also like to view...
In a one-to-many relationship, the common field in the first table is usually the table's ________ key
Fill in the blank(s) with correct word
Computer Science & Information Technology
The endnotes line can be removed from a document
Indicate whether the statement is true or false
Computer Science & Information Technology