Multiple Choice
From the options below, which of them is not a threat to information security?
A) disaster
B) eavesdropping
C) information leakage
D) unchanged default password
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Examples of User Policies is/are:<br>A)password policies<br>B)internet usage<br>C)system
Q2: Which of the following attack can actively
Q3: In layer, vulnerabilities are directly associated with
Q4: _ attack is when original data is modified
Q5: The information that gets transformed in encryption
Q7: Release of Message Content and Traffic analysis
Q8: The full form of OSI is OSI
Q9: _Policy ensures that the organization is maintaining
Q10: Compromising confidential information comes under _ <br>A)bug<br>B)threat<br>C)vulnerability<br>D)attack
Q11: When original data is changed to make