CIA is referring to below content except ( ).
A. Confidentiality
B. Integrity
C. Availability
D. Non-Repudiation
查看答案
What kind of threats of information security was incurring in front of us ( ).
A. phishing attacks
B. Trojan horses
C. identity theft
D. worms
What kind of treats of software was incurring in front of us ( ).
A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses
What is the possible negative responses to a security threat or risk ( )?
A. Mitigate
B. Transfer
C. Accept
D. Reject
What isn’t the goal of information security ( ).
A. Revised periodically with the evolving environment.
B. Defined for each category of threats.
C. Ensure information conformance
D. Ensure information adequacy