Multiple Choice
Compromising confidential information comes under __________________________________________
A) bug
B) threat
C) vulnerability
D) attack
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q5: The information that gets transformed in encryption
Q6: From the options below, which of them
Q7: Release of Message Content and Traffic analysis
Q8: The full form of OSI is OSI
Q9: _Policy ensures that the organization is maintaining
Q11: When original data is changed to make
Q12: Which of the following are not security
Q13: Modification of Data is done in:<br>A)both active
Q14: A process of making the encrypted text
Q15: ATM pin while withdrawing money is an