题目内容

Malicious cyber-attacks is referring to ( ).

A. Breach into public information
B. Release control of the internal systems
C. Release control of the external systems
D. Gain control of the internal systems

查看答案
更多问题

CIA is referring to below content except ( ).

A. Confidentiality
B. Integrity
C. Availability
D. Non-Repudiation

What kind of threats of information security was incurring in front of us ( ).

A. phishing attacks
B. Trojan horses
C. identity theft
D. worms

What kind of treats of software was incurring in front of us ( ).

A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses

What is the possible negative responses to a security threat or risk ( )?

A. Mitigate
B. Transfer
C. Accept
D. Reject

答案查题题库