What kind of treats of software was incurring in front of us ( ).
A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses
查看答案
What is the possible negative responses to a security threat or risk ( )?
A. Mitigate
B. Transfer
C. Accept
D. Reject
What isn’t the goal of information security ( ).
A. Revised periodically with the evolving environment.
B. Defined for each category of threats.
C. Ensure information conformance
D. Ensure information adequacy
The principle of Integrity means somethings but ( )
A. Maintaining the accuracy of data over its entire life-cycle.
B. Assuring the completeness of data over its entire life-cycle.
C. Information is not made available or disclosed to unauthorized individuals
Data cannot be modified in an unauthorized or undetected manner.
The principle of Non-repudiation means somethings but ( ).
A. The information must be available when it is needed
B. Fulfill obligations to a contract.
Cannot deny having received a transaction
D. Cannot deny having sent a transaction