题目内容

What kind of threats of information security was incurring in front of us ( ).

A. phishing attacks
B. Trojan horses
C. identity theft
D. worms

查看答案
更多问题

What kind of treats of software was incurring in front of us ( ).

A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses

What is the possible negative responses to a security threat or risk ( )?

A. Mitigate
B. Transfer
C. Accept
D. Reject

What isn’t the goal of information security ( ).

A. Revised periodically with the evolving environment.
B. Defined for each category of threats.
C. Ensure information conformance
D. Ensure information adequacy

The principle of Integrity means somethings but ( )

A. Maintaining the accuracy of data over its entire life-cycle.
B. Assuring the completeness of data over its entire life-cycle.
C. Information is not made available or disclosed to unauthorized individuals
Data cannot be modified in an unauthorized or undetected manner.

答案查题题库