Recently, a hacker used a social engineering attack to discover the passwords of several users. Which security tenet was compromised as a result of this attack?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
A
Explanation: Confidentiality was compromised as a result of this attack. User passwords should be considered confidential information.
You might also like to view...
________ is/are used to copy a series of data based on a pattern into adjacent cells
A) A fill handle B) Cut and Paste C) Paste Special D) Copy and Paste
Consider the statement int list[10][8];. Which of the following about list is true?
A. list has 10 rows and 8 columns. B. list has 8 rows and 10 columns. C. list has a total of 18 components. D. list has a total of 108 components.
Which of the following is a mode of operation that includes EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates?
A. WPA3-Personal B. WPA2-Personal C. WPA3-Enterprise D. WPA2-Enterprise
Why is the audit trail necessary?
What will be an ideal response?