Answer:
Usually this term is used when it's too late for preventive technical mesures, so probably a system, an account, a file is considered to be compromised when unauthorised ( by the user/ administrator) access determined a breach in the security system.
Therefore your answer would be B. the potential for an intrusion
Click where you want to insert the picture on the slide.
On the Insert tab, in the Images group, click Pictures.
In the dialog box that opens, browse to the picture that you want to insert, click that picture, and then click Insert.
True is the answer to this
I gotchu my bro!!
it would be D. " clicking Convert Text to Table"
No
.................................. :)