Multiple Choice
A technique used to compromise a system is known as a(n) ___________.
A) access method
B) asset
C) exploit
D) risk
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q63: According to the CNSS, <u>networking</u> is "the
Q64: MULTICS stands for<u>Multiple </u>Information and Computing Service.
Q65: A frequently overlooked component of an information
Q66: <u>Hardware</u> is the physical technology that houses
Q67: Network security focuses on the protection of
Q69: The history of information security begins with
Q70: The protection of tangible items, objects, or
Q71: The protection of all communications media, technology,
Q72: The Internet brought _ to virtually all computers
Q73: In the physical design phase, specific technologies are