Multiple Choice
Compromising confidential information comes under _________
A) bug
B) threat
C) vulnerability
D) attack
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q13: In Symmetric schemes requires both parties to
Q14: AES stands for ?<br>A)authorized encryption standard<br>B)advance encryption
Q15: _is used to create the organisation's overall
Q16: An attempt to harm, damage or cause
Q17: What is the 4th step in DES
Q19: What is full form of DDoS?<br>A)derived denial
Q20: The full form of OSI is OSI
Q21: Conversion of Cypher text to plain text?<br>A)encryption<br>B)decryption<br>C)simple
Q22: An act of protecting information from unauthorised
Q23: A hacker guessing suggested password to a