Multiple Choice
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
A) target
B) vulnerability
C) threat
D) key escrow
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Natural disasters present the largest risk for
Q59: Define pretexting, phishing, spoofing, and sniffing.
Q75: Describe six malware safeguards.
Q82: Kenneth is working on a confidential government
Q84: Unauthorized data disclosure is possible due to
Q85: Which of the following statements is true
Q88: When an employee is terminated, IS administrators
Q89: _ take computers with wireless connections through
Q90: Which of the following is likely to
Q91: Mark is transferring funds online through the