A(n) ____ threat permits unauthorized data disclosure.

A. ?secrecy
B. ?integrity
C. ?necessity
D. ?none of the above

Answer: A

Computer Science & Information Technology

You might also like to view...

In a one-to-many relationship, the common field in the first table is usually the table's ________ key

Fill in the blank(s) with correct word

Computer Science & Information Technology

The endnotes line can be removed from a document

Indicate whether the statement is true or false

Computer Science & Information Technology