What kind of threats of information security was incurring in front of us ( ).
A. phishing attacks
B. Trojan horses
C. identity theft
D. worms
查看答案
What kind of treats of software was incurring in front of us ( ).
A. Sabotage
B. information extortion
C. theft of equipment
D. Viruses
What is the possible negative responses to a security threat or risk ( )?
A. Mitigate
B. Transfer
C. Accept
D. Reject
What isn’t the goal of information security ( ).
A. Revised periodically with the evolving environment.
B. Defined for each category of threats.
C. Ensure information conformance
D. Ensure information adequacy
The principle of Integrity means somethings but ( )
A. Maintaining the accuracy of data over its entire life-cycle.
B. Assuring the completeness of data over its entire life-cycle.
C. Information is not made available or disclosed to unauthorized individuals
Data cannot be modified in an unauthorized or undetected manner.