In information technology security field, computer could be treat as ( ).
A. Computing devices with network connected only.
B. Typical device which is unmovable such as home desktop.
C. Any device with a processor and some memory.
D. Any device with a processor and storage.
查看答案
Malicious cyber-attacks is referring to ( ).
A. Breach into public information
B. Release control of the internal systems
C. Release control of the external systems
D. Gain control of the internal systems
CIA is referring to below content except ( ).
A. Confidentiality
B. Integrity
C. Availability
D. Non-Repudiation
What kind of threats of information security was incurring in front of us ( ).
A. phishing attacks
B. Trojan horses
C. identity theft
D. worms
What kind of treats of software was incurring in front of us ( ).
A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses