Multiple Choice
__________ threats exploit service flaws in computers to inhibit use by legitimate users.
A) Information access
B) Reliability
C) Passive
D) Service
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: A _ takes place when one entity
Q29: _ is the use of a trusted
Q30: Security services include access control,data confidentiality and
Q32: The OSI security architecture provides a systematic
Q32: A loss of _ is the disruption
Q33: _ is the protection of transmitted data
Q35: Irreversible _ mechanisms include hash algorithms and
Q36: _ prevents either sender or receiver from
Q38: The protection of the information that might
Q43: Verifying that users are who they say