Multiple Choice
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
A) access
B) assets
C) exploits
D) risk
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q20: The roles of information security professionals are
Q21: The _ is the individual primarily responsible
Q22: During the early years of computing, the
Q23: Key end users should be assigned to
Q24: The _ component of an information system
Q26: During the _ phase, specific technologies are
Q27: The <u>Analysis</u> phase of the SDLC examines
Q28: Of the two approaches to information security
Q29: A(n) _ is a formal approach to
Q30: The probability of an unwanted occurrence, such