Multiple Choice
When the database and software library are made available to persons not entitled to have access, the type of information security risk is:
A) unauthorized destruction and denial of service.
B) unauthorized use.
C) unauthorized disclosure and theft.
D) unauthorized modification.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q50: Insider threat prediction tools have been developed
Q51: Who is the CIAO and to whom
Q52: A control is a mechanism that is
Q53: Identification and authentication make use of _.
Q54: Identification and authentication make use of_ ,
Q56: Which of the following is not a
Q57: The backup plan where hardware, software, and
Q58: Which type of control is built into
Q59: Cryptography is the use of coding by
Q60: Identify the four steps of information security