Multiple Choice
All of the following are methods of breaching data security, except ____.
A) unauthorized computer access
B) intercepting data communications
C) stealing disks or computers
D) spreading computer viruses
E) using public key encryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q49: Forward recovery is used to recreate a
Q50: A proxy server is firewall software that
Q51: All of the following are characteristics of
Q52: Of the following choices, the most advisable
Q53: Data that has been encrypted has to
Q54: All of the following are good rules
Q56: Backward recovery uses as inputs the log
Q57: The lost update problem can occur when
Q58: A computer virus is a malicious piece
Q59: Stealing disks is a method of breaching