题目内容

CIA is referring to below content except ( ).

A. Confidentiality
B. Integrity
C. Availability
D. Non-Repudiation

查看答案
更多问题

What kind of threats of information security was incurring in front of us ( ).

A. phishing attacks
B. Trojan horses
C. identity theft
D. worms

What kind of treats of software was incurring in front of us ( ).

A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses

What is the possible negative responses to a security threat or risk ( )?

A. Mitigate
B. Transfer
C. Accept
D. Reject

What isn’t the goal of information security ( ).

A. Revised periodically with the evolving environment.
B. Defined for each category of threats.
C. Ensure information conformance
D. Ensure information adequacy

答案查题题库