Threats are _____.
A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy
Correct Answer:
Verified
Q8: Confidentiality is defined as _.
A)guarding against improper
Q9: Availability is defined as _.
A)guarding against improper
Q10: A denial-of-service attack _.
A)blocks traffic from any
Q11: Encryption is the process of _.
A)rendering information
Q12: In symmetric key encryption _.
A)the key used
Q14: Network security _.
A)protects information against dangers created
Q15: The limitations of firewalls include all the
Q16: Authorization is _.
A)hiding information
B)providing an alternate identity
C)the
Q17: In the context of network security,the de-militarized
Q18: In the context of network security,patching _.
A)applies
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents