Multiple Choice
A(n) ____ is a technique or mechanism used to compromise a system.
A) exploit
B) signature
C) design
D) program
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: The impetus to begin a SDLC-based
Q23: According to the Information Technology Governance Institute
Q24: The information security governance framework generally
Q25: Which of the following is an information
Q26: List the twelve categories of threats to
Q28: According to Information Security Roles and
Q29: According to the Corporate Governance Task Force
Q31: According to the Corporate Governance Task Force
Q32: Operational plans are used by _.<br>A) managers<br>B)
Q122: A(n)_ is a category of objects,persons or