Correct Answer
verified
Multiple Choice
A) Misuse
B) Misappropriation
C) Interception
D) Repudiation
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) zombie
B) bot
C) flooder
D) worm
Correct Answer
verified
Multiple Choice
A) Privacy
B) Availability
C) Data confidentiality
D) Integrity
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) integrity
B) confidentiality
C) availability
D) authenticity
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) Data confidentiality
B) System integrity
C) Privacy
D) Data integrity
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) intrusion
B) exposure
C) interception
D) inference
Correct Answer
verified
Multiple Choice
A) keylogger
B) rootkit
C) scanner
D) sniffer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 45
Related Exams