Multiple Choice
A threat action in which sensitive data are directly released to an unauthorized entity is __________.
A) corruption
B) intrusion
C) disruption
D) exposure
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Security implementation involves four complementary courses of
Q4: Misappropriation and misuse are attacks that result
Q6: The assets of a computer system can
Q7: Release of message contents and traffic analysis
Q18: The OSI security architecture focuses on security
Q24: A _ is any action that compromises
Q29: Confidentiality, Integrity, and Availability form what is
Q32: A loss of _ is the disruption
Q37: In the United States, student grade information
Q40: Threats are attacks carried out.