题目内容

In information technology security field, computer could be treat as ( ).

A. Computing devices with network connected only.
B. Typical device which is unmovable such as home desktop.
C. Any device with a processor and some memory.
D. Any device with a processor and storage.

查看答案
更多问题

Malicious cyber-attacks is referring to ( ).

A. Breach into public information
B. Release control of the internal systems
C. Release control of the external systems
D. Gain control of the internal systems

CIA is referring to below content except ( ).

A. Confidentiality
B. Integrity
C. Availability
D. Non-Repudiation

What kind of threats of information security was incurring in front of us ( ).

A. phishing attacks
B. Trojan horses
C. identity theft
D. worms

What kind of treats of software was incurring in front of us ( ).

A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses

答案查题题库