Multiple Choice
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
A) target
B) vulnerability
C) threat
D) key escrow
E) cipher
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q36: A _ examines each part of a
Q37: If the incident-response plan is not well-prepared,
Q38: Which of the following is considered a
Q39: Sarah was browsing an online shopping site
Q40: _ is a function pertaining to a
Q42: Most emails and IMs are protected by
Q43: Which of the following is a critical
Q44: Users of smart cards are required to
Q45: Which of the following is likely to
Q46: A person claiming to be from central