A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Social engineering
B) Spam
C) E-mail attachment
D) Mobile code
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) virus
B) directly-propagating worm
C) DoS
D) bot
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Data entry clerks
B) Financial professionals
C) IT professionals
D) IT security professionals
Correct Answer
verified
Multiple Choice
A) piggybacking
B) shoulder surfing
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A cookie
B) A keystroke logger
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) 3 days
B) 3 weeks
C) 3 months
D) It never went down.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) exploit
B) compromise
C) payload
D) vector
Correct Answer
verified
Multiple Choice
A) breach
B) compromise
C) incident
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 103
Related Exams