Multiple Choice
Actions that people are allowed to take on a resource comes under the heading of ________.
A) hacks
B) permissions
C) exploits
D) risks
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: Which of the following must be followed?<br>A)standards<br>B)guidelines<br>C)both
Q16: Authentication should generally be _.<br>A)as strong as
Q86: Users typically can eliminate a vulnerability in
Q100: The digital certificate provides the _.<br>A) private
Q138: Which of the following can thwart directly-propagating
Q139: A user picks the password tiger.This is
Q142: The threat environment includes _.<br>A)attackers<br>B)attacks<br>C)both A and
Q144: Passwords are widely used because they can
Q147: Spam can be used to _.<br>A)implement a
Q148: Tricking users into doing something against their