Multiple Choice
When a computer is the ____ of an attack, it is used as an active tool to conduct the attack.
A) subject
B) victim
C) object
D) direction
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q37: Match each item with a statement below.<br>-Responsible
Q38: Describe the balance between information security and
Q39: What is defense in depth?
Q40: A(n) _ is an application error that
Q41: Match each item with a statement below.<br>-Component
Q43: To make sound decisions about information security,
Q44: Match each item with a statement below.<br>-Involves
Q45: A(n) _ is a weakness or fault
Q46: The _ is primarily responsible for advising
Q47: Describe characteristic of utility as it relates