Malicious cyber-attacks is referring to ( ).
A. Breach into public information
B. Release control of the internal systems
C. Release control of the external systems
D. Gain control of the internal systems
查看答案
CIA is referring to below content except ( ).
A. Confidentiality
B. Integrity
C. Availability
D. Non-Repudiation
What kind of threats of information security was incurring in front of us ( ).
A. phishing attacks
B. Trojan horses
C. identity theft
D. worms
What kind of treats of software was incurring in front of us ( ).
A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses
What is the possible negative responses to a security threat or risk ( )?
A. Mitigate
B. Transfer
C. Accept
D. Reject